IDC Security Summit 360 Degree Security for Strong Security Posture

In-Person Event | Four Seasons Bosphorus, Istanbul | September 22, 2022

Overview

 

 

There are three main themes that businesses are looking at with care and attention: Trust, Security and Data sovereignty.

  • Trust has become a key aspect for businesses to measure and part of this involved security and privacy. The role of the CISO has evolved into becoming the Guardian of a Company's Trust metric.
  • Resiliency is a vital component for being able to withstand disruption, which comes from all directions (pandemic, supply shortage, inflation, extreme weather, massive scale cyber attacks).
  • Data sovereignty is important especially with local and global regulations and there is an evolving discussion around digital sovereignty.

These three themes impact vendor security portfolio and approaches having a material impact on the commercial and structural evolution of platforms, products, and services - with for example Security-as-a-Service.

360-degree security has become a necessity with multi-layered approached offering the best protection. In terms of specific aeras, IDC identifies Identity, Managed Security Services, OT/IT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy.

There is also growing attention to measuring and reducing risk and creating trustworthiness measurements for supply chains partners and third parties.

 

Key Topics

  • The Evolving Destructive Capabilities of Ransomware
  • An OT Invasion from IT Space
  • Major Damage from Supply Chain Attacks
  • The Zero Trust Approach
  • Cloud Security
  • Secure Enterprise
  • The Rise of Trust and Security Services
  • Increasing Insider Threats with Remote Working

Advisory Board

* The list is in surname alphabetical order.

Oğuz Akay

Information Security Manager, BMC Otomotiv

Onur Akkepenek

IT Security Manager, Migros

Erdem Aksoy

Head of IT, Mersin International Port

Ali Kutluhan Aktaş

Information Security Director, Kredi Kayıt Bürosu

Feridun Aktaş

EVP, Corporate Security, Garanti BBVA Teknoloji

Okan Aktaş

Security Solutions and Governance Manager, THY Teknoloji

Hüseyin Alkan

IT Manager, Eureko Sigorta

Serhat Alkan

VP, Information Security, Türkiye Kalkınma ve Yatırım Bankası

Kayıhan Altınöz

Deputy General Manager, Republic of Turkey Ministry of Interior

Evren Arslan

IT Manager, İş Yatırım Menkul Değerler

Agenda

Time Event & Speakers
8:00

Registration & Networking

8:45

Opening Act

8:50

IDC Keynote: 360 Degree Security for Strong Security Posture

Yeşim Öztürk

Research Manager, Türkiye, IDC
9:00

The Beginning Transformation of Cyber Security and The Future that Awaits Us

Selahattin Ahmet Tok

Cyber Security Group Manager, KoçSistem
9:15

Platform Approach: Security and Safety in the Cy-Phy World

Melih Kırkgöz

Regional Technology Director, Middle East & Turkey, Fortinet

Bora Köse

Business Development Manager, Operational Technology, Fortinet

We are heading towards a new era (like to call Cy-Phy) where cyber space will be converging with a plethora of devices and data in our physical spaces.

Cars will self-drive, surgeons will be robots, our health will be remotely monitored through sensors, factories will make their own decisions and many other things that current trends cannot predict.

Integrating network and physical sensors will enable security systems to monitoring behaviors over time.

When coupled with behavioral analytics, security systems can better detect anomalies, detect security weaknesses, and even predict security issues that might otherwise fall through the cracks. This sort of integrated system will also enhance a security system’s ability to respond to threats at speed and scale without human intervention.

Organizations need to start preparing for Cy-Phy Era today by developing security strategies designed around the principles of speed, integration, zero trust, adaptability, and automation.

Cybersecurity will not be only enabling digital transformation and paving the path towards this new world - but also will be the enabler of "safety" as well.

We invite you to join us for a brief discussion around proactive security strategies for becoming "Cyber-Resilient and Safe" in this new world ahead.

 

9:30

Do More With Less – Simplify & Reduce Threats & Improve

İrem Bilgin Ak

Security GTM Manager, MEA, Microsoft
Organizations are under pressure from an evolving global economy to contain costs while providing increased protection from cyberthreats and complying with a myriad of security and privacy regulations, requiring organizations to optimize operations as they continue to shift to a world of hybrid work. With the right & powerful tools and an effective planning process, the challenge can become an opportunity.
9:45

How To Train Your Cyber Defenders

Halil Öztürkci

Chief Strategy Officer, ADEO

Kent Wilson

VP of Sales Engineering, SimSpace
10:00

New Trend in Cyber Security: Identity Security

Bülent Konuk

Country Manager, SentinelOne
10:15

Coffee Break & Networking

10:39

Raffle

10:40

IACS / OT – Blue Team and Red Team Advanced Solutions for Critical Infrastructures and Manufacturing Facilities

Eray Atlas

CTO, OTD Bilişim
10:55

Avoid the Breach, Save the Weekend

Arda Ertuğ

Cyber Defence Center Manager, hepsiburada.com

Ümit Nadim

Senior Manager, Regional Sales META, CrowdStrike
11:10

5 Cyber-Sabotage Attacks in 2021 and What to Learn from Them

Dr. Jesus Molina

Industrial Security Director, Waterfall Security
11:25

Shift the Future of Cyber Security

Gökhan Hasköylü

Regional SE Manager, Türkiye & GCC, Check Point

Fatih Ergül

Security Engineering Team Leader, Check Point

Multi-vector Gen V cyber-attacks combined with digital transformation, cloud transition and the shift to remote work have made the work of security teams more challenging than ever. Teams are required to implement hybrid-cloud models, users expect to connect from anywhere, more devices are on your network, and threats are evolving in sophistication. Managing security today can be challenging, across our networks, data centers, and multi-cloud environments that are all connected we have more devices, more applications and more threats that leave our organizations vulnerable. The key to reducing the complexity of managing all these moving pieces is security consolidation. Join the session to see how we continue the innovation and take security management to new heights for every business with centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.

11:40

Empower Digital Transformation with AI-Powered DNS Layer Protection

Hakan Uzun

CEO, DNSSense & Roksit

We know that network is the core infrastructure of the digital transformation. We also know that DNS is the core element of the corporate networks. Today, in every area of the digital World, DNS is key protocal to run your business such as order entry, e mail communication, IoT, OT communication and etc.
DNS layer security as a first layer needs to be core part of the security investments plans of the organizations in order to increase their security posture.
Roksit, with its next generation & innovative solutions help organizations to fill the security gaps and complement their security investments.

11:55

CISO Panel: Using New Technologies for Security & Corporate Trust

Gülden Yüncüoğlu

CISO, TEB

Feridun Aktaş

EVP, Corporate Security, Garanti BBVA Teknoloji

Mahmut Küçük

Cyber Security Director, Türk Telekom

Emin İslam Tatlı

Cyber Security Director, Turkcell

Gökhan Yalçın

EVP, Yapı Kredi Teknoloji & CISO Yapı Kredi

Murat Zaralı

Information Security Director, Yıldız Holding
12:35

Lunch

13:45

IT Focused Regulations

Ömer Lütfü Karagöz

Network, System & Security Infrastructure Director, Migros

Av. Doç.Dr. Hasan Sinar

Department of Criminal Law and Criminal Procedure Law, Altinbas University
14:00

Optimising a Threat Protection Platform to Protect People & Defend Data

Sebahat Doğu

Senior Manager, Turkey, Proofpoint
The Threat Landscape has shifted fundamentally as Attackers are focusing more on targeting your People, and not your infrastructure anymore.
Learn why stopping these modern threats requires a holistic, people-centric approach and how Proofpoint can help. No matter where you are in your cybersecurity journey, we can help elevate your security strategies to protect email, cloud apps and more.

Join us to:

  • Reveal who in your organisation is being targeted and how
  • Learn how to combats attacks before they reach your users
  • Protect your people from business email compromise (BEC) and other impostor email attacks
  • Mitigate damage from the attacks that inevitably will reach your people.

 

14:15

State of Emergency: Understanding the “Crime” in Cybercrime to Counter the Ransomware Scourge

Charl van der Walt

Head of Security Research, Orange Cyberdefense

“It's a wicked world, and when a clever man turns his brain to crime it is the worst of all.”
― Arthur Conan Doyle, The Adventures of Sherlock Holmes
This is a story about a crime run amok. In 2019, a ransomware group known as the ‘Maze team’ started the trend of publicly naming and shaming ransomware victims. The success of this extortion technique was recognized by other groups and has since been widely adopted. Today we are facing the State of Emergency. Literally.
There is a commonly held misperception that cyber technology is the dominant factor in cybercrime. It’s not. Crime is the dominant factor in cybercrime. Ransomware is fundamentally a crime, so it stands to reason that any efforts to counter it should be routed in a theoretical understanding of crime. And to understand ransomware as a crime it is useful to leverage the insights offered to us through the well-established discipline of criminology. This offers a perspective on the problem not often considered by security practitioners.
In this presentation we describe the crime of ransomware, examine its impact on global business, then use the theory of crime to examine a range of possible responses to the problem. Expect real-life case studies, insightful data visualization, solid academic theories, and creative practical guidance.

14:30

Cyber Resiliency with Enterprise Forensics

Bora İncir

Sales Director, Turkey, Redington

Ahmet Öztoprak

Sales Manager, Binalyze

Emir Erdoğan

Cyber Defence Center Manager, THY
14:45

Coffee Break & Networking

15:05

Silver Partners Sessions (Parallel Sessions)

Session 1: An OT Invasion form IT Space

15:04 - 15:05

Raffle

15:05 - 15:20

Security in critical infrastructures: ISKI Success Story

Ezgi Ceylan

Sales Director, Barikat

Tayfun İşbilen

CIO, İSKİ
15:20 - 15:35

Protect Your Customers from Fraud and Abuse with Web Apps and APIs Security

Göktuğ Demir

Cloud Partner Engineer, Google Cloud

Alper Balta

Cloud Sales Manager, Kartaca
15:35 - 15:50

Behind the Cyber Intelligence

Fırat Arıkan

Country Manager, Mandiant
15:50 - 16:05

The Evolution of Software Supply Chain Attacks

Konstantinos Kiourtsis

Partner Sales Engineer, Sonatype
16:05 - 16:20

Do you Want to Cooperate with your Users for Mail Security?

Ali Korkmaz

Senior Presales, Keepnet LABS
16:20 - 16:35

Paramount Importance of Digital Risk Protection Services in Extended Detection & Response

Mehmet Caner Köroğlu

CEO, Brandefense
16:35 - 17:15

Panel Discussion: Cyber Resilience for Critical Infrastructure

Özer Gülce

Head of Information Security Management, Alternatif Bank

Ayça Yıldırım

CISO, Aksigorta

Nihan Namoğlu

CISO, AgeSA Emeklilik ve Hayat

Mehmet Karadeniz

Network & Cyber Security Manager, CK Enerji

Cem Dursun

Cyber Security Group Manager, Enerjisa

Nurdoğan Aydoğdu

Information Security Manager, Fenerbahçe SK

Onur Ünver

Information Security Manager, Türkiye Sigorta ve Türkiye Hayat Emeklilik

Session 2: The Zero Trust Approach

15:04 - 15:05

Raffle

15:05 - 15:20

Reducing Risk through Continuous Security Automation on Zero Trust Journey

M. Alper Koç

Regional Technical Manager, SEE & Turkey, Qualys
15:20 - 15:35

How to Achieve and Maintain Zero Trust

Emrah Soylu

Solution and Business Development Manager, Invento
15:35 - 15:50

Establishing Trust at all Points of Access

Hayati Cemil Acaralioğlu

Technical Manager, Soitron Siber Güvenlik Servisleri
15:50 - 16:05

Zero Trust: Military Grade Security in Corporate World

Burak Çifter

CEO, DataFlowX
16:05 - 16:20

Disrupt Attack Paths and Start your Zero Trust Journey

Ali Okan Yüksel

Security Engineer, Tenable
16:20 - 16:35

Secure Mailbox is not a Dream Anymore! Convert your Users into Security Agents

Ata İğdebeli

Sales Team Leader, Secure Future
16:35 - 17:15

Panel Discussion: Zero-Trust Architectures: Guaranteeing Efficient Security in the New Reality

Hakan Türköner

Information Security & Governance Director, Boyner

Tarık Aker

Network & Cyber Security Manager, Asaş Alüminyum

Can Ozan Cem

IT Security Manager, Eureko Sigorta

Rıfat Deregözü

Head of Information Security, Governance and Compliance, Fibabanka

Gürkan Çalık

IT Infastrucutre Manager, Konveyor A.Ş.

Session 3: Securing the Identity of your Workforce, Today and Tomorrow

15:04 - 15:05

Raffle

15:05 - 15:20

Holistic Cyber Security Services

Aydın Küçükkarakaş

VP of Cyber Security Strategies, Cyberwise
15:20 - 15:35

How to Protect Your Critical Assets with Secure Edge Network?

Serkan Canbaz

Solutions Engineer, Cloudflare
15:35 - 15:50

360-Degree Security for Database Systems: Discover - Monitor - Protect

Veysel Gündoğdu

CTO, Exclusive Networks
15:50 - 16:05

How to Plan Privileged Access Management Strategy: Tips and Real Cases

Burak Ozan Yiğin

Network Security Team Leader, vMind
16:05 - 16:20

New Era of E-ID Verification

Yasin Kahramaner

General Manager, ArkSigner
16:20 - 16:35

"Cyber Detection" Requires Knowledge

Furkan Batman

Cyber Security Consultancy Manager, Natica
16:35 - 17:15

Panel Discussion: How to Standardize Identity Security: From On-Prem to Multi-Cloud

Dr. Mert Özarar

Cyber Security Director, Havelsan

Muhammet Halil Muti

Application Security Manager, Hepsiburada

Hasan Öner

Global IT Infrastructure Services Manager, Pulcra Chemicals Group

Alper Eryılmaz

Identity Access Management Manager, Turkcell

İlker Çağrı Güven

Head of IT Security, Sodexo

Afşar Karcıoğlu

Network & Security Systems Manager, Tav Technologies
Session 1: An OT Invasion form IT Space
15:04 - 15:05

Raffle

15:05 - 15:20

Security in critical infrastructures: ISKI Success Story

15:20 - 15:35

Protect Your Customers from Fraud and Abuse with Web Apps and APIs Security

15:35 - 15:50

Behind the Cyber Intelligence

15:50 - 16:05

The Evolution of Software Supply Chain Attacks

16:05 - 16:20

Do you Want to Cooperate with your Users for Mail Security?

16:20 - 16:35

Paramount Importance of Digital Risk Protection Services in Extended Detection & Response

16:35 - 17:15

Panel Discussion: Cyber Resilience for Critical Infrastructure

Session 2: The Zero Trust Approach
15:04 - 15:05

Raffle

15:05 - 15:20

Reducing Risk through Continuous Security Automation on Zero Trust Journey

15:20 - 15:35

How to Achieve and Maintain Zero Trust

15:35 - 15:50

Establishing Trust at all Points of Access

15:50 - 16:05

Zero Trust: Military Grade Security in Corporate World

16:05 - 16:20

Disrupt Attack Paths and Start your Zero Trust Journey

16:20 - 16:35

Secure Mailbox is not a Dream Anymore! Convert your Users into Security Agents

16:35 - 17:15

Panel Discussion: Zero-Trust Architectures: Guaranteeing Efficient Security in the New Reality

Session 3: Securing the Identity of your Workforce, Today and Tomorrow
15:04 - 15:05

Raffle

15:05 - 15:20

Holistic Cyber Security Services

15:20 - 15:35

How to Protect Your Critical Assets with Secure Edge Network?

15:35 - 15:50

360-Degree Security for Database Systems: Discover - Monitor - Protect

15:50 - 16:05

How to Plan Privileged Access Management Strategy: Tips and Real Cases

16:05 - 16:20

New Era of E-ID Verification

16:20 - 16:35

"Cyber Detection" Requires Knowledge

16:35 - 17:15

Panel Discussion: How to Standardize Identity Security: From On-Prem to Multi-Cloud

Speakers

Yeşim Öztürk

Research Manager, Türkiye, IDC

Selahattin Ahmet Tok

Cyber Security Group Manager, KoçSistem

Melih Kırkgöz

Regional Technology Director, Middle East & Turkey, Fortinet

Bora Köse

Business Development Manager, Operational Technology, Fortinet

İrem Bilgin Ak

Security GTM Manager, MEA, Microsoft

Halil Öztürkci

Chief Strategy Officer, ADEO

Kent Wilson

VP of Sales Engineering, SimSpace

Bülent Konuk

Country Manager, SentinelOne

Eray Atlas

CTO, OTD Bilişim

Arda Ertuğ

Cyber Defence Center Manager, hepsiburada.com

Location

Four Seasons Bosphorus

Atik Paşa Ballroom

Partners

Strategic Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Platinum Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Silver Partner
Bronze Partner
Bronze Partner
Bronze Partner
Media Partner
Media Partner
Media Partner

Proceedings

To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Esen Akinci via email, at eakinci@idc.com.

Knowledge Hub

Contact Us

Esen Akinci

Conference Manager

+90533 519 6979

Ceren Tugcu

Sales Manager

+90 533 599 5205

About IDC

58 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.