IDC Security Roadshow A New Security Paradigm in the Face of Uncertainty

DIGITAL Event | August 17, 2021

Overview

As the country continues to find its footing in the aftermath of COVID-19, cybersecurity has taken center stage. Threats have increased considerably as bad actors exploit the vulnerabilities presented as an unintended outcome of the pandemic. Since early 2020, cybersecurity professionals have become even more instrumental in driving organizational strategy, taking on leadership roles, and securing digital transformation initiatives.

The IDC Security Roadshow, South Africa is one of the year’s most eagerly awaited events & is the platform of choice for security professionals as they battle to keep pace with a threat landscape that’s evolving at a never-before-seen rate. The 2021 edition will bring together the region’s pre-eminent technology experts, providers, analysts, and speakers for a fully immersive experience. 

Join us for a detailed look into the post-COVID-19 security market and the biggest challenges facing the country’s governments and businesses. We will explore innovative, up-to-the-minute use cases and outline the key focus areas for organizations looking to minimize their cyber-risk exposure.

 

Agenda

Time Event & Speakers
10:00

Networking & Platform Familiarization

11:00

IDC Welcome Address

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
11:05

The New Normal Requires Trust

Frank Dickson

Program Vice President, Cybersecurity Products, IDC

The COVID-19 pandemic accelerated digital transformation as companies look to inject technology into business processes to gain efficiencies, deliver empathy at scale to customers or produce other positive outcomes. The entire architecture of IT has changed with new participants as half of IT spend now comes from line of business buyers. In this presentation, Frank Dickson will address the implications that today’s digital transformation is having on security, privacy, and trust overall.

11:15

Ransomware in Focus: How AI Surgically Contains the Threat

Max Heinemeyer

Director of Threat Hunting, Darktrace

In the immediate aftermath of a ransomware attack, executives are often forced to choose between paying a ransom or shutting down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad and destructive, with organizations taking days, weeks, or even months to recover. But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? This presentation will showcase how cyber AI is helping thousands of organizations fight back against ransomware. It will present real-world examples of ransomware detected by AI and highlight how self-learning AI can respond proportionately to ransomware, utilizing its deep understanding of organizational processes. The presentation will also delve into the impact of 'double extortion' ransomware and 'ransomware as a service.'

Ask questions and stand a chance to win shopping e-voucher!

11:30

Security Operational Excellence: Building 'Security by Design' into Company Culture

Brett van Rensburg

Sales Director, iOCO

Malware and ransomware attacks increased 358% and 435%, respectively, in 2020. Phishing attacks now account for more than 80% of reported security incidents – in fact, Google registered 2,145,013 phishing sites as of Jan 2021. Some 87% of organizations have also experienced an attempted exploit of an already-known, existing vulnerability. Coupled with the rapid evolution and complexity of technology, it is no surprise that security is at the top of organizational priority lists. Today, organizations need to manage a secure edge, wherever that may be. This presentation will showcase why security needs to become a living, breathing part of every organization. Participants will learn and understand how to build corporate security into their organizational DNA.

Ask questions and stand a chance to win shopping e-voucher!

11:45

See, Secure, and Unify Your IoT and OT Environments

Bachir Moussa

Regional Sales Director, Nozomi Networks

Ask questions and stand a chance to win shopping e-voucher!

12:00

The Power of Unified Security Operations

Çağlar Doğan

Principal Security Specialist, Splunk

Much has changed over the past 1.5 years, and organizations are starting to catch up with the fundamental changes in daily life and the shifting methods of doing business. With more activities moving online and becoming digital, cyberthreats have become more prominent than ever. As such, cybersecurity remains a top priority for organizations. This session will take a look at unified security operations and show how they can address new risks and enhance the end-to-end capabilities and efficiencies of SecOps teams.

Ask questions and stand a chance to win shopping e-voucher!

12:15

The Evolution of Encryption and Quantum Computing

Every security infrastructure known to man is reliant on encryption to keep data safe. With the giant leaps in computing power, the emergence of quantum simulators, and the eventual migration to quantum computing, encryption infrastructures will cease to exist, becoming vulnerable to undetectable quantum intrusion. What is the impact of quantum computing in light of COVID-19, and how can governments and organizations prepare for this encryption revolution?

 

Ask questions and stand a chance to win shopping e-voucher!

12:30

How COVID-19 Turbo Charged FinTech and Banking Transformation

Since we began using electronic communications as a means to share information, no event has been as disruptive as COVID-19. Despite the impact that mega events such as 9/11 and Category 5 hurricanes had on payment methods and banking, none initiated the global fallout and change in broad behaviors that we see today. As a result, FinTech innovation is being driven at speed and scale and regulators are being spurred to implement stricter security controls.

Ask questions and stand a chance to win shopping e-voucher!

12:45

Hitting Back: IoT Security Vulnerabilities

It is a known fact that bad actors don’t let a good crisis go to waste. Since COVID-19 began, security professionals are seeing a meteoric rise in attacks, orchestrated with surprising speed and sophistication, leaving IT teams that are already spread thin scrambling to defend their networks. The widespread adoption of IoT devices across organizations in the wake of the pandemic has served to make a tricky situation even trickier. What strategies can IT security leaders deploy to neutralize those threats?

Ask questions and stand a chance to win shopping e-voucher!

13:00

SOCs: New Strategies and Tools for a New Threat Landscape

Among the many changes brought about by COVID-19 are the way in which SOCs operate and the host of novel challenges they now face. Whether in terms of strategy, proximity, location, or tools, how SOCs work to monitor and respond instantly to potential threats requires a fresh outlook fit for a new normal. Building the next-generation SOC and outfitting it with the required tools and skills is critical to organizational survival.

Ask questions and stand a chance to win shopping e-voucher!

13:15

When Emerging Technologies Fall into the Wrong Hands

IT security leaders are increasingly implementing security solutions that incorporate machine learning, deep learning, and artificial intelligence for their wide-ranging benefits. At the same time, however, bad actors are utilizing these same emerging technologies to launch wide-scale attacks that can target organizations more accurately than ever before. What does the emerging technology-powered threat landscape look like today, how will it evolve, and what can you do to prepare for it?

13:30

Track Sessions (Parallel Sessions)

Cloud Security: Risk, Resilience, and Governance

13:30 - 13:35

Overview

Jonathan Tullett

Senior Research Manager, IT Services
13:35 - 13:50

TAKEN With a Vengeance

Thom Langford

Security Advocate, SentinelOne
13:49 - 13:50

Ask questions and stand a chance to win shopping e-voucher!

13:50 - 14:05

Securing the Cloud Journey with a Unified Cloud-Native Security Platform

14:04 - 14:05

Ask questions and stand a chance to win shopping e-voucher!

14:05 - 14:20

Implementing Cloud Governance Frameworks for the New Normal

14:19 - 14:20

Ask questions and stand a chance to win shopping e-voucher!

Endpoint Security: The Future of Trust

13:30 - 13:35

Overview

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
13:35 - 13:50

Protecting Key Endpoint Data in the Age of Diminishing Trust

Mike Styer

Country Manager, South Africa, GlassHouse
13:49 - 13:50

Ask questions and stand a chance to win shopping e-voucher!

13:50 - 14:05

Building a Zero Trust Strategy Across Your Infrastructure

14:04 - 14:05

Ask questions and stand a chance to win shopping e-voucher!

14:05 - 14:20

Ransomware as APT

Sam Curry

CSO, Cybereason
14:19 - 14:20

Ask questions and stand a chance to win shopping e-voucher!

Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint

13:30 - 13:35

Overview

Charlie Luis

Research Manager, Security & Software
13:35 - 13:50

Securing South Africa's Remote Workforce

Anna Collard

Evangelist & Senior Vice President of Content Strategy, KnowBe4 Africa
13:49 - 13:50

Ask questions and stand a chance to win shopping e-voucher!

13:50 - 14:05

The Challenges of Securing Distributed/Hybrid Work Environments

14:04 - 14:05

Ask questions and stand a chance to win shopping e-voucher!

14:05 - 14:20

Replacing Legacy VPN Remote Access Solutions with Modern Software-Defined Secure Access Solutions

14:19 - 14:20

Ask questions and stand a chance to win shopping e-voucher!

14:20

Networking & Gamification

15:20

Close of Event

Partners

Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner

Become a Partner

CIO Masterclass

KEY TOPICS

 

Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.

 

Risk Management

A risk-driven security strategy will have greater impact and justify security investment.

 

Security Governance

Setting a governance model that links business objectives and security goals is key to sustaining enterprise performance.

 

Digital Trust

Trust is the outcome of full alignment between security and business throughout the organization, enhancing governance, transactions, and supply ecosystems.

 

Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.

 

AI, ML, and Security Automation

Harnessing ML and AI for security automation empowers analysts to build security seamlessly into business processes.

Who Should Attend?

CIOs, IT directors, IT strategists

IT managers and heads of departments

IT infrastructure and operation managers

Heads of digital strategy

Purchase managers 

Leading IDC analysts

Seasoned local experts

General Information

 

 

 

Digital Event

 

 

 

 

 

Tuesday, August 17, 2020

 

 

 

 

11:00 AM (South Africa Time)

 

 

 Language
English

Registration Fee
Free of Charge : For End Users (not IT + Consultant companies)

Contact

For More Information, contact: Lizelle Jones - Senior Conference Manager-South Africa
Mobile: +27 73 4043099 | Email: ljones@idc.com

Contact Us

Lizelle Jones

Senior Conference Manager, IDC South Africa

Lydia Botha

Senior Sales Manager, IDC Soufth Africa

About IDC

57 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.