IDC Security Roadshow Elevating the Security of the Future Enterprise

In-Person Event | Johannesburg | August 18, 2022

Overview

Today’s security leaders are examining cybersecurity through a strategic-, business-,  and  industry-focused lens. Efficient and effective security across the entire   enterprise is a necessity at a time when networks are evaporating, endpoints are   proliferating, and relentless adversaries are  continually adapting their tactics, techniques, and procedures.

Organizations across the South Africa region are increasingly looking to enable comprehensive threat detection and response, all while elevating  their level of cybersecurity maturity. Per a  recent IDC survey of CIOs from across the region,  45% of respondents revealed that security is now embedded into the planning, initiation, and assessment phases of all new business initiatives.

Against a backdrop of ever-increasing security complexity, this event will explore why visibility and control over application security is now vital for organizational survival. Industry experts will explore transformative technologies, dissect the ever-growing threat landscape, and examine the increasingly sophisticated nature of cyberattacks, all while discussing other real challenges to the security of the future enterprise.

The South Africa edition of the IDC Security Roadshow 2022 will explore the latest developments in the region's security market, take an in-depth look at some of today’s hottest security-related topics, address the challenges organizations are facing in a rapidly changing threat landscape, and provide expert strategic guidance for the security professionals in attendance.

 

Agenda

Time Event & Speakers
8:00

Registration and Welcome Tea/Coffee

9:00

Welcome Address

Andries Lombaard

Country Manager, IDC South Africa
9:05

IDC Keynote: Elevating the Security of the Future Enterprise

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
9:25

Introducing the Future of the Corporate Network

As enterprises migrate applications and data to the cloud and adapt to a larger remote workforce, managing a network perimeter will become more costly and complicated. Today, more workloads in a modern enterprise are run and accessed from "outside the castle" than from inside. Why then are enterprises still spending money applying band-aids to an increasingly ineffective moat, rather than applying a zero-trust approach everywhere? What are the challenges of managing a secure network and routing all traffic through it today, and how can a cloud-native network at the internet edge be utilized to securely connect users to resources without performance trade-offs?

9:40

Developing a Holistic Cybersecurity Architecture for a Growing Attack Surface

Digital innovation, 5G, IoT, blockchain, AI... All these technologies have something in common –they accelerate the expansion of the digital attack surface. New working styles (home, hybrid), machine-to-machine communications (APIs), software-defined WAN/LAN transformation, hybrid clouds and multiclouds, and industrial digitalization have facilitated many new use cases not previously considered by most security vendors. It is time for a broad, integrated, and automated cybersecurity architecture that consolidates technologies, provides holistic visibility and control via integration, and utilizes automation to respond to threats.

9:55

Ransomware: Staying Ahead of the Intensifying Global Threat

Ransomware is a pervasive threat to business continuity, and such attacks present a classic ‘ticking-clock’ scenario. They have already struck companies of all sizes across industries around the world. A complete ransomware strategy aims to reduce the risk of a successful attack and lessen the impact of such an attack. This session will explore all the latest developments around ransomware attacks, from threats and trends to readiness assessments.

10:10

Proactive Security and Self-Healing Solutions: Enabling the Best Possible User Experiences for the Future of Work

The dramatic acceleration of digitalization has challenged organizations to adapt to new ways of maintaining and increasing end-user productivity. Securing endpoints has become a priority as the workforce becomes increasingly dispersed, with employees working in a hybrid mode from offices and their homes. What challenges have been brought about by the dramatic shift toward a mobile and productive workforce, and what best-practice strategies can be employed to address any potential threats head on?

10:25

Networking and Tea/Coffee Break

10:45

Implementing Resilient Endpoint Security

Over the past two years, IT departments, corporate management, and end users have endured numerous challenges, with the overnight switch to hybrid working practices being a prime example. This significant shift in workstyles moved the attack vector to outside the office, exposing end users to new vulnerabilities. Around the world, threat actors are continuously developing new attack strategies, exploiting every vector possible, and testing zero trust strategies to their limits. Understanding how current events and the multiple entry points utilized by threat actors impact an organization's attack surface can make the difference between a data breach and a successful cyberdefense.

11:00

The Role of AI in Achieving Sustainable Cyber-Resilience Through XDR

Predictive AI prevents the execution of previously unknown, known, and custom malware and signature-free payloads. Only advanced machine learning and native AI can guarantee a prevent-first approach that has the required speed and agility to secure effective end-to-end defense within an organization. As such, organizations are increasingly looking to improve visibility across all sources of data by using new frameworks such as XDR to stay ahead of the multiple threat vectors being employed.

11:15

Streamlining People, Processes, and Technology in the SOC

Great technology is meaningless if professionals have trouble using tools. Security operations centers (SOCs) are still process driven. Vendors would be wise to have integration modules that interconnect with other industry-leading software platforms. Anything that reduces work in the SOC –from better contextual awareness provided in software analytics and better dashboards and case management tools to more automated processes within platforms –will be viewed positively by businesses requiring cybersecurity products and services.

11:30

Incorporating Emerging Technologies into Identity and Access Management

As today's technology environment grows more and more complex and security threats continue to reach new heights, strong usernames and passwords are no longer adequate. How are identity management systems increasingly incorporating elements of biometrics, AI, machine learning, and risk-based authentication to address this critical challenge?

11:45

Networking Lunch Break

12:30

Parallel Tracks (Parallel Sessions)

Track A

12:30 - 12:35

Raffle Draw

12:35 - 12:40

IDC Overview

Mark Walker

Associate Vice President, Sub-Saharan Africa, IDC
12:40 - 12:55

Modern Practices in Intelligence Services

12:55 - 13:10

Incorporating Emerging Technologies into Identity and Access Management

13:10 - 13:25

The Rise of Security Services

13:25 - 13:40

Streamlining People, Processes,and Technology in the SOC

13:40 - 13:45

Summary & Close

Track B

12:30 - 12:35

Raffle Draw

12:35 - 12:40

IDC Overview

Jonathan Tullett

Senior Research Manager, IT Services
12:40 - 12:55

Trust and Secure Enterprise

12:55 - 13:10

Insider Threats are Increasing with Remote Working

13:10 - 13:25

Ransomware: Staying Ahead of the Intensifying Global Threat

13:25 - 13:40

Implementing Resilient Endpoint Security

13:40 - 13:45

Summary & Close

Track C

12:30 - 12:35

Raffle Draw

12:35 - 12:40

IDC Overview

Ranjit Rajan

Vice President, Research (META), IDC
12:40 - 12:55

Cloud Security: The Next and Inevitable Frontier

12:55 - 13:10

The Evolution of Encryption and Quantum Computing

13:10 - 13:25

Using New Technologies for Security & Corporate Trust

13:25 - 13:40

Hitting Back: IoT Security Vulnerabilities

13:40 - 13:45

Summary & Close

Track D

12:30 - 12:35

Raffle Draw

12:35 - 12:40

Uzair Mujtaba

Program Manager — IDC Saudi Arabia
12:40 - 12:55

SOCs: New Strategies and Tools for a New Threat Landscape

12:55 - 13:10

Orchestrating a Global Push Towards Digital Security

13:10 - 13:25

Stay in Control and Secure as Entire World Work Remotely

13:25 - 13:40

The True Resilience in Enterprise Security

13:40 - 13:45

Summary & Close

Track A
12:30 - 12:35

Raffle Draw

12:35 - 12:40

IDC Overview

12:40 - 12:55

Modern Practices in Intelligence Services

12:55 - 13:10

Incorporating Emerging Technologies into Identity and Access Management

13:10 - 13:25

The Rise of Security Services

13:25 - 13:40

Streamlining People, Processes,and Technology in the SOC

13:40 - 13:45

Summary & Close

Track B
12:30 - 12:35

Raffle Draw

12:35 - 12:40

IDC Overview

12:40 - 12:55

Trust and Secure Enterprise

12:55 - 13:10

Insider Threats are Increasing with Remote Working

13:10 - 13:25

Ransomware: Staying Ahead of the Intensifying Global Threat

13:25 - 13:40

Implementing Resilient Endpoint Security

13:40 - 13:45

Summary & Close

Track C
12:30 - 12:35

Raffle Draw

12:35 - 12:40

IDC Overview

12:40 - 12:55

Cloud Security: The Next and Inevitable Frontier

12:55 - 13:10

The Evolution of Encryption and Quantum Computing

13:10 - 13:25

Using New Technologies for Security & Corporate Trust

13:25 - 13:40

Hitting Back: IoT Security Vulnerabilities

13:40 - 13:45

Summary & Close

Track D
12:30 - 12:35

Raffle Draw

12:35 - 12:40
12:40 - 12:55

SOCs: New Strategies and Tools for a New Threat Landscape

12:55 - 13:10

Orchestrating a Global Push Towards Digital Security

13:10 - 13:25

Stay in Control and Secure as Entire World Work Remotely

13:25 - 13:40

The True Resilience in Enterprise Security

13:40 - 13:45

Summary & Close

General Information

 

 

 

 

Emperors Palace Hotel Casino Convention Resort

 

 

 

 

 

Thursday, August 18, 2022

 

 

 

 

09:30 AM (SAST) 

 Language
English

Registration Fee
Free of Charge : For End Users (not IT + Consultant companies)

Contact

For More Information, contact: Lizelle Jones - Senior Conference Manager

Mobile: +27 73 404 3099 | Email: ljones@idc.com

Contact Us

Vineshia Petersen

Senior Conference Manager

Lydia Botha

Senior Sales Manager, IDC Soufth Africa

About IDC

58 Years | 1200 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,200 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.