IDC Security Roadshow Elevating the Security of the Future Enterprise

In-Person Event | Crowne Plaza Riyadh RDC Hotel | June 27, 2022

Overview

Today’s security leaders are examining cybersecurity through a strategic-, business-, and industry-focused lens. Ensuring efficient and effective security across the entire enterprise is a necessity at a time when networks are evaporating, endpoints are proliferating, and relentless adversaries are continually adapting their tactics, techniques, and procedures.

Organizations across the Middle East, Turkey, and Africa (META) region are increasingly looking to enable comprehensive threat detection and response, all while elevating their level of cybersecurity maturity. According to a recent IDC survey, 54% of Saudi CIOs have embedded cybersecurity into the planning, initiation, and assessment phases of all new business initiatives.

As the market matures and regulatory compliance becomes increasingly critical, this event will provide a timely platform for industry experts to highlight transformative technologies, analyze the evolving threat landscape, and examine the increasingly sophisticated nature of cyberattacks that enterprises of the future must consider.

 

Agenda

Time Event & Speakers
8:30

Registration & Welcome Tea / Coffee

9:30

IDC Keynote: Elevating the Security of the Future Enterprise

Uzair Mujtaba

Program Manager — IDC Saudi Arabia

Digital transformation has become a major disruptor of how companies operate today, and its importance is only growing with time. As companies increasingly turn toward technology to drive and innovate their business models, they become more vulnerable to cyberattacks from hackers and other malicious actors who are now innovating their attack vectors in parallel. Recent research has revealed that developing security and resilience excellence — through establishing security operations and enhancing security skills and processes — is the biggest strategic investment planned by 58% of CIOs and CISOs over the coming two years. While striving for greater efficiency, agility, and speed is a major priority, the lack of skills needed to navigate the constantly evolving cybersecurity landscape presents its challenges, and finding the right balance sets apart successful and well thought out cybersecurity strategies.

9:40

Creating a Safer Future

Sultan Albaiz

Senior Account Executive, Networking & Advance Security, VMware

Cybersecurity remains at the top of every organization’s agenda. This keynote session will explore how public and private sector organizations, both large and small, address today’s most prominent security challenges. It will examine how they are securing the software supply chain, utilizing zero trust approaches, guarding against ransomware and other threats, and ensuring cloud governance and digital sovereignty. Whether transforming digitally in the cloud or operating mixed infrastructure, participants will learn about the latest security strategies to guarantee a safer future.

Ask Question and Stand a Chance to Win e-gift Voucher

9:55

Securing Modern Applications: What You Need to Know Now

Shabir Bhat

Regional Sales Director, Checkmarx

Ask Question and Stand a Chance to Win e-gift Voucher

10:10

Confronting the New Wave of Cyberattacks

Werno Gevers

Regional Manager (Middle East), Mimecast

Have companies begun to take cybersecurity more seriously? The State of Email Security 2022 findings stress the importance of a cyber resilience strategy, layered defenses, cyber awareness training, and the use of AI/ML for protection in the new digital landscape. With the number of publicly reported data breaches soaring past last year’s total, 2021 appears to be the worst year on record for cybersecurity.

Ask Question and Stand a Chance to Win e-gift Voucher

10:25

Proactive Security and Self-Healing Solutions: Enabling the Best Possible User Experiences for the Future of Work

Emad Haffar

Head of Presales (META), Kaspersky Lab

Ask Question and Stand a Chance to Win e-gift Voucher

10:40

Networking Tea & Coffee Break

11:10

Keeping Your Enterprise Business Safe with Security-First Cloud Infrastructure

Dragan Petkovic

Cloud Security Advisor, Oracle EMEA

Cloud security and compliance have always been key concerns for Saudi CISOs and CIOs keen to embark their organizations on a transformation journey to the cloud. Many businesses in the Kingdom have either moved or are planning to move their mission-critical workloads to the cloud for the values it brings, such as high performance and real-time elasticity for enterprise applications.

Hybrid cloud is also a popular option for organizations that have specific requirements for data sovereignty, security, latency, and field deployability. As enterprises continue to adopt new cloud services, they require more sophisticated capabilities to secure their entire cloud footprint. Partnering with a trusted cloud provider can bolster your enterprise's security and compliance posture with the latest defense-in-depth security designs.

Compliance with local regulations is also a key requirement for regulated industries such as the financial services, public, and telecommunications sectors. It imperative for organizations in these sectors to understand how their cloud provider caters for compliance with regulatory frameworks.

Join this session to learn more on:

• How your organization can better comply with national regulatory frameworks in Saudi Arabia enforced by regulators such as MCIT, NCA, SAMA, and CMA, along with international regulations and standards

• How you can implement and manage consistent security, identity, and access management policies across the hybrid datacenters while maintaining compliance

• How Saudi enterprises and organizations are managing their security and compliance in the cloud

 

Ask Question and Stand a Chance to Win e-gift Voucher

11:25

Managed Cyber Defense – When Professionals fight Professionals

Safwan Akram

MSS Director, Help AG

Cybercrime has turned into a booming business, with professional attackers leveraging advanced methods to devise and deploy increasingly sophisticated attacks that exploit the exponential digitalization of everything and the growing dependency on IT systems. Such attackers cost the global economy billions of dollars annually. In this context, it is not about if, but when, an incident happens. This session will consequently highlight the importance of a future-forward security operations center transformation. Such a transformation ensures effective incident response in the fight against advanced adversaries and builds resiliency in the cyber age.

Ask Question and Stand a Chance to Win e-gift Voucher

11:40

Streamlining People, Processes, and Technology in the SOC

Roland Daccache

Systems Engineering Manager, MEA, CrowdStrike

Ask Question and Stand a Chance to Win e-gift Voucher

11:55

Incorporating Emerging Technologies into Identity and Access Management

Ask Question and Stand a Chance to Win e-gift Voucher

12:10

Networking Lunch Break

13:00

Track Sessions (Parallel Sessions)

Cloud Security: Risk, Resilience, and Governance

13:00 - 13:15

Managing the Proportionate Growth of Cloud Complexity and the Attack Surface

Tamer Odeh

Regional Director, Middle East, SentinelOne
13:15 - 13:30

Implementing a Holistic Strategy towards Cloud Security

Irene Selia

Head of Global Development, ClearSkies™, Odyssey
13:30 - 13:45

Defense in Concert: Evolving Your SecOps Strategy

Gopan Sivasankaran

General Manager (META), Secureworks
13:45 - 14:00

Novel strategies to protect against the rise of Ransomware as a Service (RaaS)

Marwan AlHuthail

Enterprise Sales Manager, Saudi Arabia, Veeam Software

Endpoint Security: The Future of Trust

13:00 - 13:15

Elevating the Organization’s Cybersecurity Maturity

Jawad Khalil

Program Manager, Telecoms KSA, IDC
13:15 - 13:30

Elevating Prevention in Your Organization’s Endpoint Security Stack

13:30 - 13:45

Why XDR is a must have security tool for today’s organizations

13:45 - 14:00

The Increased Integration and Bundling of Endpoint Management and Security Technologies

Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint

13:00 - 13:15

Transforming Cybersecurity to be a Value Enabler

13:15 - 13:30

Identifying and Mitigating the Organization’s Security Gaps

13:30 - 13:45

Building Resiliency Against Ransomware and Supply Chain Attacks

13:45 - 14:00

OT/IT Continue to Converge and What it Means for your Organization’s Security Strategy

Bridging the Security Skills Gap: Human & AI Threat Intel Working Together

13:00 - 13:15

AI Enhanced security in Intelligent Digital Workspace Ecosystems

13:15 - 13:30

Utilizing AI Enhancements for Anomalous Behavior and Threat Detection

13:30 - 13:45

The Growing Promise of AI-powered Cloud Security Tools

13:45 - 14:00

Ensuring Data Quality and Security with AI

Cloud Security: Risk, Resilience, and Governance
13:00 - 13:15

Managing the Proportionate Growth of Cloud Complexity and the Attack Surface

13:15 - 13:30

Implementing a Holistic Strategy towards Cloud Security

13:30 - 13:45

Defense in Concert: Evolving Your SecOps Strategy

13:45 - 14:00

Novel strategies to protect against the rise of Ransomware as a Service (RaaS)

Endpoint Security: The Future of Trust
13:00 - 13:15

Elevating the Organization’s Cybersecurity Maturity

13:15 - 13:30

Elevating Prevention in Your Organization’s Endpoint Security Stack

13:30 - 13:45

Why XDR is a must have security tool for today’s organizations

13:45 - 14:00

The Increased Integration and Bundling of Endpoint Management and Security Technologies

Going Beyond Perimeter-Based Security: Securing the Ever-Expanding Digital Footprint
13:00 - 13:15

Transforming Cybersecurity to be a Value Enabler

13:15 - 13:30

Identifying and Mitigating the Organization’s Security Gaps

13:30 - 13:45

Building Resiliency Against Ransomware and Supply Chain Attacks

13:45 - 14:00

OT/IT Continue to Converge and What it Means for your Organization’s Security Strategy

Bridging the Security Skills Gap: Human & AI Threat Intel Working Together
13:00 - 13:15

AI Enhanced security in Intelligent Digital Workspace Ecosystems

13:15 - 13:30

Utilizing AI Enhancements for Anomalous Behavior and Threat Detection

13:30 - 13:45

The Growing Promise of AI-powered Cloud Security Tools

13:45 - 14:00

Ensuring Data Quality and Security with AI

14:00

Summary & Close

Partners

Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner

Become a Partner

General Information

In-Person Event

Monday, 27th June 2022

08:30 am 

 

Language
English

Registration Fee
Free of Charge: For End Users (not IT + Consultant companies)

Contact
For more information, please contact: Dalia Jaarah,  Mobile: +966 500 198 046, Email: djaarah@idc.com

Location

Crowne Plaza Riyadh RDC Hotel & Convention

 
Location

Contact Us

Shabana Mahadiwala

AVP Conferences

+971 56 414 5986

Taher Hamdan

Senior Sales Manager, Conferences, IDC Middle East, Turkey & Africa

+971506591320

About IDC

58 Years | 1200 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,200 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.