Explore other IDC events

IDC CISO Roundtable 2024

Evolving Threats, Advanced Defenses: Cybersecurity in the Next Era

Jumeirah Mina A’Salam, Dubai, United Arab Emirates

Overview

Today’s organizations face challenges from multiple directions, including threats to the business from state-sponsored cyberattacks, geopolitical turmoil, inflation, and a shortage of security skills. For CISOs to succeed in this unprecedented security landscape, they must balance these threats with new approaches by performing continuous risk assessments, protecting digital assets, and managing the rapid pace of innovation in security technologies.


Whether it is the massive shift to cloud, the increasing automation of IT processes, or the flexibilization of the way employees work, CISOs are faced with more complex networks and an expanded attack surface, making their jobs even more difficult. However, new technology capabilities powered by AI/ML-enabled automation and better orchestration tools provide options to shore up resilience in the face of disruption. Put to their optimal use, they can protect critical business assets from breaches and attacks from cybercriminals, creating trust and ensuring compliance with new digital sovereignty rules.

The 2024 edition of the IDC Security Roadshow will explore the region's security landscape, showcase the latest in security innovation, and bring together some of the world’s foremost cybersecurity experts. Join us as we discuss a myriad of topics, trends, and issues at the forefront the CISO agenda and share essential guidance on how to keep up with — and stay ahead of — the rapid pace of change and digital acceleration.


‘IDC

Delegate Journey

Don't miss out on an extraordinary and unparallel experience at the IDC UAE CISO Roundtable 2024.

Agenda

Filter Topics

Wednesday May 15, 2024
8:30

Registration & Networking

9:30

Welcome Address

9:35

Opening Address

9:45

IDC Keynote: Cybersecurity 2024: A Visionary Fusion with GenAI for Tomorrow's Defense

10:00

Cybersecurity as the Basis for Agile and Resilient Digital Business

10:10

Q&A (Ask Questions & Stand a Chance to Win a Raffle)

10:15

Ransomware Prevention: When Real-Time Detection Meets Real-Time Protection

10:25

Q&A (Ask Questions & Stand a Chance to Win a Raffle)

10:30

The Role of Cloud Security in the Edge Ecosystem

10:40

Q&A (Ask Questions & Stand a Chance to Win a Raffle)

10:45

Implementing Effective Application Security Strategies

10:55

Q&A (Ask Questions & Stand a Chance to Win a Raffle)

11:00

Tea/ Coffee & Networking Break

11:25

Panel Discussion: Navigating the Cyber Frontier: Security Leaders Discuss Current Security Trends

11:55

Panel Discussion: The Key Components of a Robust Cyber-Risk Program

12:40

Panel Discussion: Building a Safe and Agile Digital Business

13:25

Panel Discussion: Security Leaders on Anticipating and Adapting to New Risks

13:55

CSO30 Awards (UAE) by Foundry

14:15

Lunch & Networking

15:00

End of Conference

CSO30 Awards

CSO30 Awards by Foundry (an IDG, Inc. Company) is a global awards recognition platform across the US, Europe, ASEAN, APAC, India since 2017, and this year it’s being launched in the Middle East. The awards program had successful editions of CSO100, CSO50, or CSO30 across the regions. This year, CSO30 Awards 2024 will establish itself as a recognized platform for excellence in cybersecurity in the Middle East.

Speakers

Want to become a speaker?

Partners

Want to become a partner?

Supported by
Gold Partner
Gold Partner
Gold Partner
Associate Partner

Venue

Jumeirah Mina A’Salam

Ballroom: Majlis Al Mina

Knowledge Hub

Analyst Spotlight
Generative AI and the Unseen Frontiers of Cyber Warfare

Shilpi Handa,
Associate Research Director (META), IDC

In today's age of rapid technological advancement, the emergence of generative AI (GenAI) has sparked both awe and concern. While this innovative technology holds immense promise for revolutionizing various industries, it also presents a new frontier in the realm of cyber warfare. GenAI, capable of autonomously creating highly realistic content such as images, videos, and text, has the potential to redefine cyberattacks in unprecedented ways.

Analyst Spotlight
Generative AI and the Unseen Frontiers of Cyber Warfare

Shilpi Handa,
Associate Research Director (META), IDC


In today's age of rapid technological advancement, the emergence of generative AI (GenAI) has sparked both awe and concern. While this innovative technology holds immense promise for revolutionizing various industries, it also presents a new frontier in the realm of cyber warfare. GenAI, capable of autonomously creating highly realistic content such as images, videos, and text, has the potential to redefine cyberattacks in unprecedented ways.

Imagine a scenario where malicious actors leverage GenAI to produce convincing phishing emails, fabricated news articles, or even deepfake videos of prominent figures issuing false statements. The implications of such manipulative content are profound, posing significant threats to individuals, organizations, and society at large. With the ability to deceive even the most vigilant users, GenAI-powered cyberattacks could sow chaos, spread disinformation, and undermine trust in institutions.

Moreover, the inherent adaptability and scalability of GenAI algorithms make them formidable adversaries in cyberspace. These systems can rapidly evolve to evade traditional detection methods, constantly morphing and refining their tactics to bypass security measures. As a result, defending against GenAI-related cyberthreats requires a paradigm shift in cybersecurity strategies, encompassing proactive threat intelligence, advanced anomaly detection, and robust authentication mechanisms. By fostering interdisciplinary dialogue and sharing best practices, we can collectively address the complex challenges posed by GenAI in cyberspace. Moreover, promoting digital literacy and critical thinking skills among the populace is essential to mitigate the impact of misinformation and disinformation campaigns orchestrated using AI-generated content.

By harnessing the power of AI for good while remaining vigilant against its misuse, we can strive to build a safer and more resilient digital ecosystem for generations to come — leveraging this as an opportunity to shape the future of cybersecurity and safeguard the integrity of our digital world.

Analyst Spotlight
Digitally Sovereign Clouds: The Right to Govern Your Digital Assets Without External Interference

Shahin Hashim,
Associate Research Director (META), IDC

In a world of growing uncertainty, digital sovereignty has become a paramount concern. Nations are asserting their rights to govern their digital assets as data emerges as a vital currency. With vast amounts of information generated every second, the question of ownership and control takes center stage. The concept of digital sovereignty offers a powerful response, empowering nations, organizations, and individuals to shape the destiny of their digital footprints.

Analyst Spotlight
Digitally Sovereign Clouds: The Right to Govern Your Digital Assets Without External Interference

Shahin Hashim,
Associate Research Director (META), IDC


In a world of growing uncertainty, digital sovereignty has become a paramount concern. Nations are asserting their rights to govern their digital assets as data emerges as a vital currency. With vast amounts of information generated every second, the question of ownership and control takes center stage. The concept of digital sovereignty offers a powerful response, empowering nations, organizations, and individuals to shape the destiny of their digital footprints.

Digitally sovereign clouds embody this principle of control over digital assets. They are cloud computing environments designed to ensure that data, software, processes, and the people managing them reside within specific jurisdictions and adhere to defined regulations. This allows organizations to safeguard sensitive information, maintain compliance with local laws, and reduce susceptibility to external interference or data seizures. A crucial aspect that needs reemphasizing is that true digital sovereignty extends beyond data residency — we must demand cloud service providers whose key services and control points also reside within the jurisdiction to prevent potential compromises. Indeed, 68% of the respondents to IDC’s Cloud Survey 2024 said that national/regional legislation is driving them to use digitally sovereign clouds.

The key attributes of a digitally sovereign cloud include:

• Data sovereignty: This should include solutions that provide a holistic view of how data is collected, classified, processed, and stored to ensure that specific local data legislation and rules are being met. This requires the constant monitoring of how digital regulations and laws continue to evolve. Data sovereignty is considered as a subset of digital sovereignty.

• Technical sovereignty: This refers to digital infrastructure located in a sovereign environment. This includes the datacenters plus all the servers, IT hardware, software, and everything as a service (XaaS) used for cloud-based data and workloads. All this infrastructure should be shielded from non-sovereign digital infrastructure, as well as protected from all extra-territorial interference and scrutiny.

• Operational sovereignty: This includes solutions that offer cloud capabilities that enable transparency in controlling operations, from provisioning and performance management to the monitoring of physical and digital access to the infrastructure.

As digital sovereignty becomes paramount, identifying and using “true” sovereign cloud solutions is essential. These solutions offer control over your digital assets, ensure compliance with regulations, and provide the freedom to operate confidently in a dynamic digital world.

Contact Us

Shabana Mahadiwala

AVP Conferences

+971 56 414 5986

Taher Hamdan

Senior Sales Manager, Conferences, IDC Middle East, Turkey & Africa

+971506591320

IDC, Foundry

IT executives rely on IDC and Foundry events for discovering new ideas, trends, and solutions that drive their technology strategies. Leveraging IDC’s deep market intelligence and advisory expertise, and Foundry’s rich media brands (CIO, Computerworld, InfoWorld) and relationships, IDC and Foundry produce powerful learning and networking experiences for IT decision makers around the world.