IDC IT Security Summit 2018

This site uses cookie including third parties cookies which helps us provide and improve our services. Find more on our Cookie Policy


IDC IT Security Summit 2018

Delivering Pervasive Security for the Digital Era

Muscat, March 29, 2018


Digital” has, in the recent past, heralded a metamorphosis in the way organizations in Middle East  approach and transact their business. Leaders envisage a new world order triggered by a transformation in Business Models, Customer Experience, Worksource and Information Management.

With a subsequent rapid rise in “Digital”, the threat landscape for organizations also stands to undergo enhanced levels of complexity and diversity in the coming years. Already, we have been witness to large scale Cyber Security incidents (WannaCry) that have shook the foundations of the existing security postures of organizations both in Middle East and globally. In such a scenario, it will become all the more imperative for organizations to build appropriate levers for security in their business strategy.

IDC Security Roadshow 2018 will examine the current security landscape and explore the challenges that organizations are likely to encounter as they embark on their digital transformation efforts. It will also explore the issues that organizations will need to address in the digitally transformed era and outline what factors they need to consider in their security road maps for the future.


Time Event Speakers

Registrations, Networking & Welcome Tea & Coffee


Early Bird Raffle Draw – Win a two-night stay for a couple at the Crowne Plaza


Welcome Address

Megha Kumar
Research Director, Software, Middle East & Africa

Security Metrics for the Digital Era

Megha Kumar
Research Director, Software, Middle East & Africa



Integrated Cyber Defense at the Heart of Digital Transformation


This session starts by discussing the key trends in digitization across various industries along with the cyber security challenges being faced today. It then focuses on the typical attack surfaces organizations are trying to defend in their environments and how core technologies from Symantec can support them. There is a specific focus on building an Integrated Cyber Defense platform followed by how organizations need to begin this journey by incorporating a Cyber Resilience strategy. We close by discussing what key questions the board should ask in order to stay engaged in building this integrated future


Digital Transformation: Cure-all, Placebo or Poison Pill?

Hadi Tannous
Computer Communication Engineer, Fortinet

Are you really ready for Digital Transformation? While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to any number of standards and legal requirements are all challenges to any DX efforts. If your organization is moving into the Digital future, you need to make sure that your security infrastructure isn’t stuck in the past.

This session will provide the insight towards a comprehensive and adaptive security architecture that can support your organization’s changing objectives and more importantly, evolve as the cyber threat challenge evolves as well.



Complete attack surface visibility - an essential component for mature cyber security

Ben Vaux
Technical Director Middle East, Skybox Security


Tea & Coffee and Networking (Exhibit room)


Implementing Critical Infrastructure Security

Maiysa Al Dhanki
Cyber security Cooperation Specialist, Information Technology Authority Sultanate Of Oman

This presentation will explain how organizations can address critical infrastructure security and outline strategies for collaborating


A contingency plan for ever-rising cyber threats

Pavish Kumar R
IT Security Analyst and Developer, ManageEngine

The very fundamentals of our technological architectures are flawed, making large-scale attacks, a common occurrence. After the discovery of vulnerabilities like Spectre and Meltdown, the rise of record-breaking DDoS attacks like the 1.35 Tbps DDoS attack on GitHub, the global reach of ransomware like WannaCry, and ever-increasing data breaches like the Equifax breach, what can businesses do to keep their cyberspace safe?This session will discuss the placement of an effective strategy, that can be implemented in your network to prevent such attacks and the remedial measures that should be taken to save your business, if an attack occurs.


Stepping Up to GEN V Cybersecurity

Prashant Menon
Channel Sales & Product Management, Checkpoint

In 2017, an unprecedented number of large-scale, multi-vector cyberattacks damaged the reputations and operations of businesses around the world. As these 'Gen V' cyberattacks occurred across all networks, endpoints, cloud systems, and mobile platforms, organizations will now need to adopt a consolidated cybersecurity architecture that fully protects their assets. This session will examine how such an architecture can resolve the complexities of the expanding threat landscape by sealing security gaps, enabling automatic threat intelligence sharing across all environments, and unifying security management operations.


Why do Cyber Attacks Increase? Who’s next?


Emerging technology in improving cybersecurity

Saleh Said Khamis Al Hashmi
Director of Government Security Service, Information Technology Authority Sultanate Of Oman

Insider Risk – The Achilles Heel of Security Strategies


Panel Discussion: Security Strategies for the Digital Era

Digital transformation is changing the way we engage with customers, suppliers, and employees, requiring organizations to change the way they incorporate security into their ecosystems. This panel discussion will explore a series of best-practice strategies for proactively addressing security in the modern enterprise.


Roadmap for 2018

Megha Kumar
Research Director, Software, Middle East & Africa

Raffle Draw – win an Apple Airpod


Lunch & Networking

General Information

Date and Time

Thursday, March 29, 2018



Registration Fee

  • Free of Charge : For End Users (not IT +consultant companies)


For More Information, contact:

Sughand Tolani - 04 3642189 / 056 4145987 /


ICT Partner(s)

Platinum Partner(s)

Gold Partner(s)

Silver Partner(s)

Exhibit Partner(s)

Partnership Opportunities

Why sponsor the IT Security 2018?

  • Brand association with Senior IT Decision Makers, CISOs and Influencers via the extensive promotional campaign pre- and post-event
  • Position your company as one of the leading Security Solutions players in the Region
  • Meet face-to-face and build connections with a targeted group of qualified end users and decision makers
  • Hold meaningful conversations with potential customers – generous time set aside for networking
  • Secure post show appointments by collecting leads & conducting surveys through the exhibition


Crowne Plaza Hotel


Shabana Mahadiwala

Conference Director

+971 4 375 7019

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit