IDC Security Summit Agenda

The event's dynamic agenda will take you through a series of presentations, panel discussions, real-life use cases, and dedicated industry tracks, giving you a bird's eye view of the current market situation, the latest technological innovations, and strategies for propelling your organization to meet the unique challenges of these unprecedented times.

Time Event & Speakers

How to Measure Corporate Trust: Improving Vendor Relationships and Employee Reputation

Tuğba Öztürk

Information Security Director, Çalık Holding

Alper Ümit Yılmaz

Head of Infrastructure & Information Security,

Esat Yaşar Çağlayan

IT Security Technology Unit Manager, Intertech - DenizBank

Hasan Reyhanoğlu

Information Security and Risk Management Director, Softtech

Ünal Kocabaş

CISO, Fiba Holding

CISOs of the Future: Guardians of Digital Trust

Pete Lindstrom

Vice President, Security Strategies, IDC

Cybersecurity has changed significantly over the past year as organizations have been driven to assess and update their IT environments. Increasing cloud architectures with remote access for many have driven Cyber strategists everywhere to finally move from a defense-in-depth perimeter model to one that employs Zero Trust. But strategies in security are easy – what we really need is a plan. This session will provide key insights into the ways to translate strategy into architectural reality and the important steps needed to develop a robust zero trust architecture. Along the way, we will describe ways to enhance and develop that zero trust strategy into an even more robust environment that incorporates the concepts of digital integrity.


Security Trends & Opportunities in Turkey

Yeşim Öztürk

Research Manager, IDC Türkiye

The place of security in IT Organization and Cultivating of Human Resources in Security

Feridun Aktaş

EVP, Corporate Security, Garanti BBVA Teknoloji

Achieving Zero Trust for your Internal Networks

Tabrez Surve

Security Head, SEMEA, VMware

Strategic Security Priorities for 2021 and Beyond

Ozan Öncel

Modern Work & Security Business Group Lead, Microsoft Turkey

Cyber Security in IoT Systems – Managing Risks

Nurettin Erginöz

Cyber Security Group Manager, SabancıDx

New Generation Security Approaches in Data Driven World

Fatih Türkoğlu

Product & Services Director, Türk Telekom

How Adaptive Applications Can Secure and Deliver Extraordinary Digital Experiences for Your Customers & Users

Mohammed Abukhater

RVP for Sales, Middle East, Turkey & Africa, F5

Delivering the digital experiences that customers expect is non-negotiable. However, the complexity, vulnerability, and -frankly- fragility of the status quo is untenable.
In this talk we explore F5’s vision for applications that continuously adapt to their changing environment. This includes facilitating extraordinary digital experiences by:

  • Automating redundant processes for greater efficiencies.
  • Expanding and contracting based on performance needs.
  • Securing points of vulnerability.
  • Mining telemetry/data for better insights and accelerated, continuous evolution.



Swarm Intelligence in Cyber Security

Melih Kırkgöz

“Office of the CTO” Member, Regional Director, Systems Engineering, Fortinet

Change is the only constant in our era.

Digital Innovation, Pandemic, 5G, IoT, Blockchain, AI etc.. All these buzzwords for sure have something in common – they accelerate the expansion of Digital Attack Surface.

New working styles (home, hybrid), machine-machine communications (APIs), software-defined WAN/LAN transformation, hybrid/multi-cloud(s), industrial digitalization etc. have brought many new use-cases not considered previously by most security vendors.

It is time for a broad, integrated and automated Cyber Security Architecture – to consolidate technologies, simplify architectures, gain holistic visibility/control via integration and utilize automation to respond threats before it’s too late.



3 Mega Trends that are Redefining the Role of Cyber Security

Rafi Kretchmer

VP, Product Marketing, Check Point

Streamlining SecOps with Fastened, Real-Time Incident Response

Koray Kamek

Product Director, Logsign

Ransomware: Staying Ahead of the Increasing Global Threat

İsmail Cingil

Sales Account Manager – Turkey, Commvault

Ransomware is a pervasive threat to your business continuity and the attack is a classic ticking-clock scenario. It has already struck companies of all sizes across industries around the world. A complete ransomware strategy includes both reducing the risk of a successful attack and lessening the impact of an attack that does succeed. We will be discussing threats, trends, and readiness against ransomware attacks.


Introducing the Future of the Corporate Network

Barry Fisher

Director of Zero Trust Products, Cloudflare

As enterprises migrate applications and data to the cloud and adapt to a larger remote workforce over the foreseeable future, managing a network perimeter becomes costly and complicated. Today, more of the workloads in a modern enterprise run and are accessed outside the castle than inside. Why are enterprises still spending money applying band-aids to an increasingly ineffective moat rather than applying a zero trust approach everywhere?
In this session, Barry Fisher, Director of Zero Trust Products at Cloudflare, will discuss the challenges of managing a secure network and routing all traffic through it today, along with a new vision for how to utilize a cloud-native network at the internet edge to connect users to resources securely without performance tradeoffs.


Demystifying, Simplifying and Adopting a Zero-Trust Architecture

Roland Daccache

Sales Engineering Manager, EMEA, CrowdStrike

Deadringer (Who's behind the multiple intrusions targeting Telcos & why it matters to your organization)

Tarek Kuzbari

Regional Director, Middle East & Turkey, Cybereason

Recently the Cybereason Nocturnus Team released a major threat intelligance report detailing clusters of intrusions targeting the telecommunications industry. The research explored the discovery of several previously unidentified attack campaigns. Several clusters of attack activity were identified and assessed to be the work of multiple prominent APT groups. Join Tarek Kuzbari as he takes you through the highlights of this investigation and what your organization needs to be aware of.


Access Security in Remote Working, Cloud and Hybrid Infrastructures

Baran Barut

Solution Architect, Kron

Modern Practices in Intelligence Services

Aydın Can Fındıkcı

Presales Manager, Kaspersky

Threat intelligence services are an essential part of the cybersecurity ecosystem. Organizations are struggling to build intelligence capabilities and structuring public and private data as to what is relevant to them, their industry and their regional circumstances. In this session, we’ll dive into how organizations can efficiently acquire threat intelligence from the right sources with the right methods, and how to consume threat intelligence correctly so as to hunt for threats and indicators inside their own premises.


Fundamentally Strengthen the Network and Security Infrastructure in a Borderless Enterprise

Burcu Cansever Ezer

Territory Account Manager, Infoblox

Continuous Monitoring in Industrial Environment, Managing your Growing Surface Attacks

Neil Wilkins

Technical Manager, Garland Technology

Sean McCue

Principle IACS Cybersecurity Consultant Engineer, SCADAfence

Redefining Security with the Acceleration of eCommerce

Erkan Sertoğlu

Information Security Director,

Aydoğan Ovat

Information Security and Compliance Manager, GittiGidiyor

Onur Akkepenek

IT Security Manager, Migros

Hakkı Sarp

Risk & Control Manager, Yemeksepeti

Security in Industries (Parallel Sessions)

Session A

15:00 - 15:15

The Key to DevSecOps Success

Suzan Pektaş Acar

CISO, Aksigorta
15:15 - 15:30

@ The Speed of DevOps

Gökhan Hasköylü

Area SE Manager, Turkey & GCC, Check Point
15:30 - 15:40

End-to-End Security Approach with Data Leakage Consulting

Nurettin Erginöz

Cyber Security Group Manager, SabancıDx
15:40 - 15:55

Enhancing Cyber Security with Privileged Access Management

Tuna Verid

Solution Architect & Technical Business Analyst, Kron
15:55 - 16:10

360° SOC Approach

Muharrem Aras

Security Operation Center Group Manager, Türk Telekom
16:10 - 17:10

Security in Finance

Gökhan Yalçın

EVP, Yapı Kredi Teknoloji

Özer Gülce

Head of Information Security Management, Alternatif Bank

Salih Demirtaş

Information Security Manager, Bank of China

Gökhan Görmüş

Information Security Unit Manager, Türkiye Emlak Katılım Bankası

Alper Torun

Informaiton Security Manager, Halkbank

Burak Dündar

Information Security & Risk Management Leader, Intertech

Alpaslan Binici

Head of Information Security, Şekerbank

Akif Mert Avcı

Manager, Information Security, IT Process and Compliance, Vakıfbank
17:10 - 18:20

Security in Insurance

Yusuf Özer

Head of Information Security and Enterprise Governance, Sigorta Bilgi ve Gözetim Merkezi

Aytekin Güzeliş

Group Manager, Security Governance, Allianz Turkey

Suzan Pektaş Acar

CISO, Aksigorta

Onur Ayyıldız

Head of IT – Security & Infrastructure, Anadolu Sigorta

Rıfat Yıldırım

CISO, AXA Sigorta

Altuğ Şahin

Cyber Security Assistant Manager, HDI Sigorta

Gülçin Aktaş

IT Security, Risk & Compliance Manager, AgeSA Emeklilik ve Hayat
18:20 - 19:10

Security in Investment Companies

Evren Arslan

IT Manager, İş Yatırım Menkul Değerler

Can Gürergiller

Information Systems Security Manager, Kredi Kayıt Bürosu

Murat Çelebi

Information Security and Risk Management Director, CISO, Merkezi Kayıt Kuruluşu

Bertan Demirci

Infastructure and Security Manager, Oyak Yatırım

İlker Erek Duran

System and Network Vice President, QNB Finans Invest
19:10 - 20:15

Cyber Risk: The Essential Role of the CHRO

Barış Müstecaplıoğlu

HR Director, CK Enerji

Osman Ünal

CHRO, Yıldırım Group

Selim Arda Üçer

CHRO, Penti

Gülsüm Çetinkaya

HR VP, Vakıf Katılım Bankası

Session B

15:00 - 15:15

How to Manage Cyber Risks in the Pandemic Era

Burak Dündar

Information Security & Risk Management Leader, Intertech
15:15 - 15:30

Incident Response and Defensive Cyber Security Approach in the World of Cyber Security

Gökhan Tatar

Senior System Engineer, VMware
15:30 - 15:40

Live Demo: Reinforce Your Research with Threat Intelligence

Aydın Can Fındıkcı

Presales Manager, Kaspersky
15:40 - 15:55

Success Story: Risk Prioritization for Strengthened Security

Yeşim Öztürk

Research Manager, IDC Türkiye

Abdurrahman Şakar

Offensive Security Associate Director, Turkcell

Deniz Çevik

Chief Consultancy Officer, Cyberwise
15:55 - 16:15

Automate Threat Detection and Response

Rob Lefferts

Corporate VP, Threat Protection, Microsoft

Jeremy Chapman

Director 365, Microsoft
16:15 - 17:15

Security in Group Companies

Tolga Kormanlı

IT Group Manager, Infastructure & Operations, Information & Cyber Security, Kazancı Holding

Batu Akalın

Corporate IT Security Manager, AG Anadolu Grubu Holding

Emrah Yıldız

IT Director, Anadolu Birlik Holding

Nurdan Demirci

Digital Security and Risk Manager, Eczacıbaşı Holding

Elif Uslu

Cyber Security Executive (Southern Europe & Africa), Edenred

Murathan Gemicioğlu

Global Security Manager, Hayat Holding
17:15 - 18:20

Zero Trust – Objective or Tool?

Hakan Tokay

Infrastructure Security Manager, Turkcell

Alen Bohceylan

CISO, Coca Cola İçecek

Recep Çetin

IT Manager, Arzum Elektrikli Ev Aletleri

Cengiz Soyukan

IT and Systems Development Manager, ETİ Grup

Kıymet Acur

IT Manager, Şen Piliç

Güvenç Bolışık

Governance and Cyber Security Manager, TOFAŞ
18:00 - 19:00

Security in Public Services

Erol Özgüner

CIO, İstanbul Metropolitan Municipality

Tayfun İşbilen


Arcun Tanju


Nihat Narin

General Manager, İsttelkom

Yücel Karadeniz

General Manager, Belbim

Session C

15:00 - 15:15

Complete Packet Visibility in your Critical Infrastructure

Neil Wilkins

Technical Manager, Garland Technology
15:15 - 15:30

Protecting your IACS Environment

Sean McCue

Principle IACS Cybersecurity Consultant Engineer, SCADAfence
15:30 - 15:45

Implementing a NIST Cybersecurity Framework 2.0 for Ransomware Protection and Recovery

Anil Titus

Sales Engineering Manager (META), Commvault
15:45 - 16:00

Success Story: Security Fabric Experience

Polat Şahbazoğlu

Information Security and Telecommunication Manager, Arçelik

Burak Yalçın

Senior Systems Engineer, Fortinet

Sunay Musaoğlu

Systems Engineer, Fortinet
16:00 - 16:55

Securing OT Networks and Industrial Control Systems

Mehmet Karadeniz

Network & Cyber Security Manager, CK Enerji

Erhan Atalar

IT Manager, Aytemiz Akaryakıt

Cem Dursun

Cyber Security Group Manager, Enerjisa

Günay Faruk Özer

Global Head of Information & Communication Systems, Genel Energy

Çağrı Tuncay

Network & Security Manager, SEDAŞ

Can Sobutay

General Manager, Infrasis Siber Mühendislik
16:55 - 17:55

Security in Government

Kayıhan Altınöz

SVP of IT, Republic of Turkey Ministry of Interior

Ercan Cengiz

Manager, Information Security & Data Protection, Kızılay

Salih Talay

Cyber Security Unit Manager, Dijital Dönüşüm Ofisi

Dilek Şen Karakaya

ISMS Department Manager, T.C. Sağlık Bakanlığı
17:55 - 18:55

Cybersecurity in Education & Healthcare

Zühtü Hanedar

Information Systems Manager, Emsey Hospital

Ali Durdu

Head of IT, Ankara Sosyal Bilimler Üniversitesi

Prof. Dr. Bilgin Metin

Faculty Member, MIS, Bogazici University

Ahmet Karakaya

Network & Security Manager, Consultant, Amerikan Hastanesi


Contact Us

Merve Kaya

Conference Project Manager

+90 530 261 3562

Ceren Tugcu

Sales Manager

+90 533 599 5205

About IDC

57 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit