IDC Security Roadshow A New Security Paradigm in the Face of Uncertainty

Digital Event | August 17, 2021

Overview

As the country continues to find its footing in the aftermath of COVID-19, cybersecurity has taken center stage. Threats have increased considerably as bad actors exploit the vulnerabilities presented as an unintended outcome of the pandemic. Since early 2020, cybersecurity professionals have become even more instrumental in driving organizational strategy, taking on leadership roles, and securing digital transformation initiatives.

The IDC Security Roadshow, South Africa is one of the year’s most eagerly awaited events & is the platform of choice for security professionals as they battle to keep pace with a threat landscape that’s evolving at a never-before-seen rate. The 2021 edition will bring together the region’s pre-eminent technology experts, providers, analysts, and speakers for a fully immersive experience. 

Join us for a detailed look into the post-COVID-19 security market and the biggest challenges facing the country’s governments and businesses. We will explore innovative, up-to-the-minute use cases and outline the key focus areas for organizations looking to minimize their cyber-risk exposure.

 

Agenda

Time Event & Speakers
10:00

Networking & Platform Familiarization

11:00

IDC Welcome Address

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
11:05

The New Normal Requires Trust

Frank Dickson

Program Vice President, Cybersecurity Products, IDC

The COVID-19 pandemic accelerated digital transformation as companies look to inject technology into business processes to gain efficiencies, deliver empathy at scale to customers or produce other positive outcomes. The entire architecture of IT has changed with new participants as half of IT spend now comes from line of business buyers. In this presentation, Frank Dickson will address the implications that today’s digital transformation is having on security, privacy, and trust overall.

11:20

Ransomware in Focus: How AI Surgically Contains the Threat

Max Heinemeyer

Director of Threat Hunting, Darktrace

In the immediate aftermath of a ransomware attack, executives are often forced to choose between paying a ransom or shutting down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad and destructive, with organizations taking days, weeks, or even months to recover. But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? This presentation will showcase how cyber AI is helping thousands of organizations fight back against ransomware. It will present real-world examples of ransomware detected by AI and highlight how self-learning AI can respond proportionately to ransomware, utilizing its deep understanding of organizational processes. The presentation will also delve into the impact of 'double extortion' ransomware and 'ransomware as a service.'

Ask questions and stand a chance to win shopping e-voucher!

11:35

Security Operational Excellence: Building 'Security by Design' into Company Culture

Brett van Rensburg

Sales Director, iOCO

Malware and ransomware attacks increased 358% and 435%, respectively, in 2020. Phishing attacks now account for more than 80% of reported security incidents – in fact, Google registered 2,145,013 phishing sites as of Jan 2021. Some 87% of organizations have also experienced an attempted exploit of an already-known, existing vulnerability. Coupled with the rapid evolution and complexity of technology, it is no surprise that security is at the top of organizational priority lists. Today, organizations need to manage a secure edge, wherever that may be. This presentation will showcase why security needs to become a living, breathing part of every organization. Participants will learn and understand how to build corporate security into their organizational DNA.

Ask questions and stand a chance to win shopping e-voucher!

11:50

See, Secure, and Unify Your IoT and OT Environments

Bachir Moussa

Regional Sales Director, Nozomi Networks

Ask questions and stand a chance to win shopping e-voucher!

12:05

The Power of Unified Security Operations

Çağlar Doğan

Principal Security Specialist, Splunk

Much has changed over the past 1.5 years, and organizations are starting to catch up with the fundamental changes in daily life and the shifting methods of doing business. With more activities moving online and becoming digital, cyberthreats have become more prominent than ever. As such, cybersecurity remains a top priority for organizations. This session will take a look at unified security operations and show how they can address new risks and enhance the end-to-end capabilities and efficiencies of SecOps teams.

Ask questions and stand a chance to win shopping e-voucher!

12:20

What Great Cloud Security Posture Management Looks Like

Gordon Bailey-McEwan

Cloud Specialist, Palo Alto Networks
12:34

Ask questions and stand a chance to win shopping e-voucher!

12:35

Track Sessions (Parallel Sessions)

Securing the Future Enterprise

12:34 - 12:35

Overview

Jonathan Tullett

Senior Research Manager, IT Services
12:35 - 12:50

Combined Forces for Active Directory Security

Daniel Conrad

IAM Strategist, Quest/One Identity

Ask questions and stand a chance to win shopping e-voucher!

12:50 - 13:05

Securing the Cloud Today for Tomorrow

Paul Williams

Country Manager- SADC and Indian Ocean Islands, Fortinet

Ask questions and stand a chance to win shopping e-voucher!

13:05 - 13:20

Lockdown Your DNS Security

Mohammed Al-Moneer

Regional Director, Infoblox
13:19 - 13:20

Ask questions and stand a chance to win shopping e-voucher!

Endpoint Security: The Future of Trust

12:34 - 12:35

Overview

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
12:35 - 12:50

Protecting Key Endpoint Data in the Age of Diminishing Trust

Mike Styer

Country Manager, South Africa, GlassHouse

Ask questions and stand a chance to win shopping e-voucher!

12:50 - 13:05

TAKEN With a Vengeance

Thom Langford

Security Advocate, SentinelOne
13:04 - 13:05

Ask questions and stand a chance to win shopping e-voucher!

13:05 - 13:20

Ransomware as APT

Sam Curry

CSO, Cybereason
13:19 - 13:20

Ask questions and stand a chance to win shopping e-voucher!

Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint

12:34 - 12:35

Overview

Charlie Luis

Research Manager, Security & Software
12:35 - 12:50

Securing South Africa's Remote Workforce

Anna Collard

Evangelist & Senior Vice President of Content Strategy, KnowBe4 Africa

Ask questions and stand a chance to win shopping e-voucher!

12:50 - 13:05

Implementing Your Zero-Trust Security Model

Amrith Nawoor

Technology Software Engineering Director Middle East & Africa, Oracle
13:04 - 13:05

Ask questions and stand a chance to win shopping e-voucher!

13:05 - 13:20

The Role of AI in a Changing Security Paradigm: Why Prevention Is Always Better than Cure

Baldeep Dogra

Director of Solutions Marketing, BlackBerry
13:19 - 13:20

Ask questions and stand a chance to win shopping e-voucher!

Securing the Future Enterprise
12:34 - 12:35

Overview

12:35 - 12:50

Combined Forces for Active Directory Security

12:49 - 12:50

Ask questions and stand a chance to win shopping e-voucher!

12:50 - 13:05

Securing the Cloud Today for Tomorrow

13:04 - 13:05

Ask questions and stand a chance to win shopping e-voucher!

13:05 - 13:20

Lockdown Your DNS Security

13:19 - 13:20

Ask questions and stand a chance to win shopping e-voucher!

Endpoint Security: The Future of Trust
12:34 - 12:35

Overview

12:35 - 12:50

Protecting Key Endpoint Data in the Age of Diminishing Trust

12:49 - 12:50

Ask questions and stand a chance to win shopping e-voucher!

12:50 - 13:05

TAKEN With a Vengeance

13:04 - 13:05

Ask questions and stand a chance to win shopping e-voucher!

13:05 - 13:20

Ransomware as APT

13:19 - 13:20

Ask questions and stand a chance to win shopping e-voucher!

Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint
12:34 - 12:35

Overview

12:35 - 12:50

Securing South Africa's Remote Workforce

12:49 - 12:50

Ask questions and stand a chance to win shopping e-voucher!

12:50 - 13:05

Implementing Your Zero-Trust Security Model

13:04 - 13:05

Ask questions and stand a chance to win shopping e-voucher!

13:05 - 13:20

The Role of AI in a Changing Security Paradigm: Why Prevention Is Always Better than Cure

13:19 - 13:20

Ask questions and stand a chance to win shopping e-voucher!

13:20

Networking & Gamification

14:20

Close of Event

Partners

Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Silver Plus Partner

CIO Masterclass

KEY TOPICS

 

Security Operational Excellence

Enterprises need to build "security by design" into company culture and outsource to fill any gaps around scale and capability.

 

Risk Management

A risk-driven security strategy will have greater impact and justify security investment.

 

Security Governance

Setting a governance model that links business objectives and security goals is key to sustaining enterprise performance.

 

Digital Trust

Trust is the outcome of full alignment between security and business throughout the organization, enhancing governance, transactions, and supply ecosystems.

 

Building Resilience

A resilient infrastructure is crucial for maintaining operations despite attacks or outages, thus minimizing risk and losses.

 

AI, ML, and Security Automation

Harnessing ML and AI for security automation empowers analysts to build security seamlessly into business processes.

Who Should Attend?

CIOs, IT directors, IT strategists

IT managers and heads of departments

IT infrastructure and operation managers

Heads of digital strategy

Purchase managers 

Leading IDC analysts

Seasoned local experts

General Information

 

 

 

Digital Event

 

 

 

 

 

Tuesday, August 17, 2021

 

 

 

 

11:00 AM (South Africa Time)

 

 

 Language
English

Registration Fee
Free of Charge : For End Users (not IT + Consultant companies)

Contact

For More Information, contact: Lizelle Jones - Senior Conference Manager-South Africa
Mobile: +27 73 4043099 | Email: ljones@idc.com

Proceedings

To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Lizelle Jones via email, at ljones@idc.com.

Contact Us

Lizelle Jones

Senior Conference Manager, IDC South Africa

Lydia Botha

Senior Sales Manager, IDC South Africa

About IDC

57 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.