IDC Security Webinar

Elevating Security for Digital Trust & Risk Management

Saudi Arabia, June 22, 2020


The security industry has passed an inflection point, security operational excellence now a prerequisite for every organization to function securely, efficiently, and effectively. Risk management goes hand in hand with that, quantifying security measures in the context of the business to demonstrate the business value of security.

IDC views the achievement of lasting "digital trust" as the apex — the realization of full alignment between security and business, providing a fundamental basis of trust that connects the organization, employees, partners, and customers

IDC Security Webinar will provide participants from Saudi Arabia a vision to navigate the security landscape of the new digital business environment.




Key Topics


Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.


Risk Management

A risk-driven security strategy will have greater impact and justify security investment.


Security Governance

Setting a governance model that links business objectives and security goals is key to sustaining enterprise performance.


Digital Trust

Trust is the outcome of full alignment between security and business throughout the organization, enhancing governance, transactions, and supply ecosystems.


Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.


AI, ML, and Security Automation

Harnessing ML and AI for security automation empowers analysts to build security seamlessly into business processes.

Who Is It For?

The IDC Saudi Arabia Security Webinar has been designed as an information-sharing forum and networking platform for select groups of 70–150 senior security decision makers from the most prominent enterprises in each country.
Every year, IDC conducts surveys and collects feedback from our event audiences. As such, the agenda is guaranteed to reflect the most pressing global security challenges, while also addressing the current needs of the local market and providing ample scope for in-depth and engaging discussions.

Why Attend?


Explore key trends shaping security decisions across the region


Learn about proven best practices through real-life case studies


Get inspired by the professional stories shared by industry pioneers and IDC analysts


Gain a clearer understanding of current security challenges


Time Event & Speakers

First 100 early bird logins will receive E-Gift Vouchers


Welcome Address

Hamza Naqshbandi
Country Manager (Saudi Arabia & Bahrain), IDC

Elevating Security for Digital Trust & Risk Management

David Reinsel
Sr. Vice President, Global Datasphere, IoT, Mobility, Security, Consumer, Semiconductors, Telecom, Client Computing and Imaging/Print/Document Solutions, IDC
The changing face of technology, brought about by digital transformation (DX) and the leaps in how business is done, necessitates a shift in the perception of enterprise-wide IT security. If the past decade has shown us anything, it's that no organization is immune to cyberattacks. The proliferation of handheld devices, cloud-based platforms, and remote access points has significantly increased the vulnerability of organizations to such attacks. Indeed, experience has proven that enacting a radical shift in an organization’s approach to cybersecurity is the only way to evolve at speed to preempt these risks. Deploying emerging technologies such as AI, machine learning, IoT, and big data analytics for an advanced behavioral analytics framework that is both proactive and predictive.

Endpoint Detection and Response, Rapidly Uncover and Contain the Most Sophisticated Threat

Feras Alqaisi
Senior Security Consultant, Kaspersky

Cybercriminals are becoming ever more sophisticated and capable of successfully bypassing existing protection. Every area of your business can be exposed to risk, disrupting business-critical processes, damaging productivity and increasing operating costs.

Ask questions and stand a chance to win shopping e-voucher!


Designing Security for a Hybrid Multi-Cloud Environment

Hamzh Koujan
Senior Cyber Security Consultant, Trend Micro
As public cloud adoption increases, many organizations are shifting towards a hybrid multi-cloud environment. Addressing security for such an environment is challenging and requires a holistic approach. Securing private clouds, validating the security of public cloud services, and ensuring compliance with data sovereignty models are just some of the key elements that must be considered when pursuing a multi-cloud strategy.

Ask questions and stand a chance to win shopping e-voucher!


The Threat Hunting Challenge: Detect, Prevent, Respond and Hunt - Every Second, Every Day

Jan Tietze
Director of Security Strategy (EMEA), SentinelOne

Antivirus is dead and EDR (Endpoint Detection & Response) technologies pick up where antivirus technologies leave off.In this session you will learn how EDR provides rich forensic data, mitigates threats, performs network isolation, and auto-immunizes the endpoints against newly discovered threats. You will understand why EDR should be an essential part in every Endpoint Security Strategy.

Ask questions and stand a chance to win shopping e-voucher!


Tackling Today's Threat Landscape : Next Generation Security Operations

Çağlar Doğan
Security Specialist (EMEA), Splunk
The use of legacy security solutions and the hiring of more security experts are now inadequate as attackers act and evolve much master than ever before. Given that digital trust has become essential for organizational survival, the utilization of SOCs has now come under the spotlight. This session will explore how organizations can monitor threats in real time and respond quickly to incidents by giving security teams the power to use sophisticated quantitative methods to gain insights and prioritize efforts. Such analytic-driven methods and solutions enable organizations to shift from reactive to proactive and predictive security postures.

Ask questions and stand a chance to win shopping e-voucher!


Cyber Resiliency: Recovering from a Security Breach

Mohamed Saif Assaf
Senior Consultant Presales, DELL Technologies
Too often, organizations focus on guarding against a very specific type of cyberattack or cyberactor. This narrow focus can put them at risk because cyberattacks take many different forms and attackers may have a variety of motivations, techniques, and even platforms from which to launch their attacks. For example, an attack may be launched by a nation state as a weapon, an insider with an ax to grind, or a hacktivist is ideologically rather than financially motivated. A cyberattack launched by an insider is one of the most difficult to defend against, particularly as insiders tend to have physical access or full knowledge of the infrastructure. This session will show how a good strategy takes all these possibilities into account.

Ask questions and stand a chance to win shopping e-voucher!


Simplifying Your Journey Towards Regulatory Compliance

Ehab Nour
Systems Engineer (Middle East & Africa), Tripwire
As regulatory oversight increases globally, the pressure on organizations to improve compliance and governance is rising. Security is an integral part of many regulations, and with regulatory bodies setting strict guidelines that preserve information integrity on a national level, security teams must now sharpen their focus on ensuring compliance. With the wider proliferation of digital transformation, the regulatory environment can be expected to increase in complexity. While security strategies need to account for greater management of compliance, they also need to go further.

Ask questions and stand a chance to win shopping e-voucher!


Gold Track Sessions (Parallel Sessions)

Track A: Cloud Security – Risk, Resilience and Governance

13:30 - 13:35

Raffle Draw

13:35 - 14:15

Panel Discussion

Harish Dunakhe
Research Director, Research Director, Software and Cloud, META
Apollinaire Moreno
Regional Sales Manager, Public Cloud, Fortinet
Neil Thacker
CISO, Netskope
Ali Sleiman
Systems Engineering Director, (META region), Infoblox

Track B: Bridging the Security Skills Gap: Human & AI Threat Intel Working Together

13:30 - 13:35

Raffle Draw

13:35 - 14:15

Panel Discussion

Jawad Khalil
Program Manager, Telecoms KSA, IDC
Richard Cassidy
Senior Director, (Security Strategy), Exabeam
Ehsan Snober
Head of Cyber Security & Advanced Services (Eastern & Western Provinces, Saudi Arabia), MDS

Track C: Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint

13:30 - 13:35

Raffle Draw

13:35 - 14:15

Panel Discussion

Uzair Mujtaba
Program Manager — IDC Saudi Arabia
Rawad Zaki
Regional Manager (Saudi Arabia & Levant), Veeam
Philippe Maigrot
Solution Advocate (Middle East & Africa), Lenovo
Ahmad G. Abdallah
Country Manager, (Saudi Arabia), Thales

Ask questions in track sessions and stand a chance to win shopping e-voucher!


100 Delegates that complete the Plenary and Track Sessions will receive an exclusive e-gift voucher


Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Silver Partner
Silver Partner
Silver Partner

General Information





Monday, June 22, 2020



11:00 AM




Registration Fee
Free of Charge : For End Users (not IT + Consultant companies)


For More Information, contact: Dalia Jaarah - Senior Conference Specialist
Direct: +966 11 275 6115 | Mobile: +966 500 198 046 | Email:


To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Shabana Mahadiwala via email, at

Contact Us

Shabana Mahadiwala

AVP Conferences

+971 56 414 5986

Taher Hamdan

Senior Sales Manager, Conferences, IDC Middle East, Turkey & Africa


About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit