IDC Security Roadshow Elevating the Security of the Future Enterprise

Digital Event | Middle East | November 29, 2022

Overview

Today’s security leaders are examining cybersecurity through a strategic-, business-, and industry-focused lens. Efficient and effective security across the entire enterprise is a necessity at a time when networks are evaporating, endpoints are proliferating, and relentless adversaries are continually adapting their tactics, techniques, and procedures. Organizations across the Middle East, Turkey, and Africa (META) region are increasingly looking to enable comprehensive threat detection and response, all while elevating their level of cybersecurity maturity. Per a recent IDC survey of CIOs from across the region, 45% of respondents revealed that security is now embedded into the planning, initiation, and assessment phases of all new business initiatives. Against a backdrop of ever-increasing security complexity, this event will explore why visibility and control over application security is now vital for organizational survival. Industry experts will explore transformative technologies, dissect the ever-growing threat landscape, and examine the increasingly sophisticated nature of cyberattacks, all while discussing other real challenges to the security of the future enterprise.

Agenda

Time Event & Speakers
11:00

IDC Keynote: Elevating the Security of the Future Enterprise

11:20

Introducing the Future of the Corporate Network

As enterprises migrate applications and data to the cloud and adapt to a larger remote workforce, managing a network perimeter is becoming more costly and complicated. Today, more workloads in a modern enterprise are run and accessed from "outside the castle" than from the inside. Why are enterprises still spending money applying band-aids to an increasingly ineffective moat rather than applying a zero-trust approach everywhere? What are the challenges of managing a secure network and routing all traffic through it today, along with a new vision for how to utilize a cloud-native network at the internet edge to connect users to resources securely without performance trade-offs?

Ask questions and stand a chance to win shopping e-voucher!

11:35

Developing A Holistic Cybersecurity Architecture for a Growing Attack Surface

Digital innovation, 5G, IoT, blockchain, AI... All these technologies have something in common – they accelerate the expansion of the digital attack surface. New working styles (home, hybrid), machine-to-machine communications (APIs), software-defined WAN/LAN transformation, hybrid clouds and multicloud, and industrial digitalization have facilitated many new use cases not considered previously by most security vendors. It is time for a broad, integrated, and automated cybersecurity architecture that consolidates technologies, provides holistic visibility and control via integration, and utilizes automation to respond to threats.

Ask questions and stand a chance to win shopping e-voucher!

11:50

Ransomware: Staying Ahead of the Intensifying Global Threat

Ransomware is a pervasive threat to your business continuity and the attack is a classic ticking-clock scenario. It has already struck companies of all sizes across industries and around the world. A complete ransomware strategy includes both reducing the risk of a successful attack and lessening the impact of an attack that does succeed. This session will explore all the latest developments around ransomware attacks, from threats to trends to readiness assessments.

Ask questions and stand a chance to win shopping e-voucher!

12:05

Proactive Security and Self-Healing Solutions: Enabling the Best Possible User Experiences for the Future of Work

The dramatic acceleration of digitalization has challenged organizations to adapt to new ways of maintaining and increasing end-user productivity. Securing endpoints has become a priority as the workforce becomes increasingly dispersed, with employees working in a hybrid mode from both the office and their homes. What challenges have been brought about by the dramatic shift to enabling a mobile and productive workforce, and what best-practice strategies can be delayed to address any potential threats head on.

Ask questions and stand a chance to win shopping e-voucher!

12:20

Implementing Resilient Endpoint Security

Over the past two years, IT departments, corporate management, and end users have endured numerous challenges, with the overnight switch to hybrid working practices being a prime example. This significant shift in workstyle moved the attack vector outside of the office, exposing end users to new vulnerabilities. Around the world, threat actors are continuously developing new attack strategies, exploiting every vector possible and testing zero trust strategies to their limits. Understanding how current events and the multiple entry points utilized by threat actors impact an organization's attack surface can make the difference between a data breach and a successful cyber defense. 

Ask questions and stand a chance to win shopping e-voucher!

12:35

The Role of AI in Achieving Sustainable Cyber-Resilience Through XDR

Predictive artificial intelligence (AI) prevents the execution of previously unknown, known, and custom malware and payloads, signature free. Only advanced machine learning providing native artificial intelligence can ensure a prevent-first approach against zero-day cyberthreats with the required speed and agility to secure effective end-to-end defense within an extended organization. As such, organizations are increasingly looking to improve visibility across all sources of data by using new frameworks such as XDR to stay ahead of the multiple threat vectors being employed.  

Ask questions and stand a chance to win shopping e-voucher!

12:50

Modern Practices in Intelligence Services

Threat intelligence services are an essential part of the cybersecurity ecosystem. Organizations are struggling to build intelligence capabilities and structure public and private data in a way that is relevant to them, their industry, and their regional circumstances. This session will explore how organizations can efficiently acquire threat intelligence from the right sources with the right methods, while also explaining how threat intelligence can be acted on correctly to hunt for threats and indicators inside your own premises.

Ask questions and stand a chance to win shopping e-voucher!

13:05

Incorporating Emerging Technologies into Identity and Access Management

As today's technology environment grows more and more complex, and security threats continue to reach new heights, a strong username and password are no longer enough. How are identity management systems increasingly incorporating elements of biometrics, artificial intelligence, machine learning, and risk-based authentication to address this critical challenge?

Ask questions and stand a chance to win shopping e-voucher!

13:20

Streamlining People, Processes, and Technology in the SOC

Great technology is meaningless if professionals have trouble using the tools. Security operations centers are still process driven. Vendors would be wise to have integration modules to interconnect with other industry-leading software platforms. Anything that reduces work in the SOC – from better contextual awareness provided in software analytics to better dashboards and case management tools to more automated processes within platforms – will be viewed positively by businesses requiring cybersecurity products and services.

Ask questions and stand a chance to win shopping e-voucher!

13:45

Parallel Track Sessions (Parallel Sessions)

Track A

13:45 - 14:00
13:59 - 14:00

Ask questions and stand a chance to win shopping e-voucher!

14:00 - 14:15
14:14 - 14:15

Ask questions and stand a chance to win shopping e-voucher!

14:15 - 14:30

Presentation 3

14:29 - 14:30

Ask questions and stand a chance to win shopping e-voucher!

Track B

13:45 - 14:00

Presentation 1

13:59 - 14:00

Ask questions and stand a chance to win shopping e-voucher!

14:00 - 14:15

Presentation 2

14:14 - 14:15

Ask questions and stand a chance to win shopping e-voucher!

14:15 - 14:30

Presentation 3

14:29 - 14:30

Ask questions and stand a chance to win shopping e-voucher!

Track A
13:45 - 14:00
13:59 - 14:00

Ask questions and stand a chance to win shopping e-voucher!

14:00 - 14:15
14:14 - 14:15

Ask questions and stand a chance to win shopping e-voucher!

14:15 - 14:30

Presentation 3

14:29 - 14:30

Ask questions and stand a chance to win shopping e-voucher!

Track B
13:45 - 14:00

Presentation 1

13:59 - 14:00

Ask questions and stand a chance to win shopping e-voucher!

14:00 - 14:15

Presentation 2

14:14 - 14:15

Ask questions and stand a chance to win shopping e-voucher!

14:15 - 14:30

Presentation 3

14:29 - 14:30

Ask questions and stand a chance to win shopping e-voucher!

Summary and Close

Partners

Gold Partner

Become a Partner

General Information

In-Person Event

 29th November 2022

08:30 am 

 

Language
English

Contact
For more information, please contact: Jely Gonzales,  Mobile: +971 50 1298973, Email: jgonzales@idc.com

Contact Us

Shabana Mahadiwala

AVP Conferences

+971 56 414 5986

Taher Hamdan

Senior Sales Manager, Conferences, IDC Middle East, Turkey & Africa

+971506591320

About IDC

58 Years | 1200 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,200 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.