IDC Security Forum Jak zdobyć cyfrowe zaufanie?

Digital Event | April 27, 2021

Overview

This new decade has already provided many lessons. One is that the mantra “never let a good crisis go to waste” could have been written for the cybercriminal fraternity. Another is that the concept of digital trust is rapidly becoming a business imperative in the digital era. At the heart of this all, as always, is security: the critical barrier between data integrity and compromise; and a fundamental building block for digital trust. But trust encompasses so much more. From privacy and compliance to sustainability; from ecommerce to trusted ecosystems; and from ethics and transparency to brand reputation and loyalty. Engendering digital trust is a business imperative, but it requires leadership and governance from board level to ensure that it becomes part of the very fabric of the business.​


Event Highlights


We would like to thank all the delegates and the partners who participated at this event.

A selected group of IT and business leaders came together to network and learn from IDCs analysts, inspiring speakers and dedicated advisory board members, who were at the forefront of the lively and interactive discussion.

If you missed the event or if you would like more information on any of the topics we discussed, click the button below to watch a recording or access the post-event content.


Watch Video

Audience

Designed as an information-sharing forum and networking platform for select groups of senior security decision makers from the most prominent enterprises in Poland.

CISOs, CSOs, Directors of Enterprise Security, CIOs, CTOs, Privacy Officers, Risk Managers, Auditors from organizations maintaining critical infrastructure & large data processing centers.


Agenda

Time Event & Speakers
9:30

Event opening

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Digital Trust

9:35

From security to trust

Joel Stradling

Research Director, European Security, IDC

The past year has been characterized by dramatic transformation and a shift of engagement models from physical to digital. Relationships in the digital sphere need to be underpinned by trust – which can take a long time to accrue yet be easily lost. What drives trust between an organization and its employees, its partners, and its customers? Security is a core pillar, aligned with risk. Privacy and compliance are also of paramount importance. But ethics and sustainability or corporate social responsibility are also on the radar. To become a trusted digital business requires focus on multiple disciplines; however, without trust those fundamental business relationships will not thrive.

9:45

Digital Trust is a long term project – Estonian perspective

Kaimar Karu

Były Minister Handlu Zagranicznego i Technologii Informacyjnych, Republika Estonii

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Estonia puts into practice the words of the Dalai Lama XIV that "a harmonious society can only be born out of human trust, freedom from fear, freedom of expression, the rule of law, justice and equality" - in 1996, Estonia began the Tiger Leap project of extensive computerization: of schools, administration and support for entrepreneurship. Successive Estonian governments came to believe that this was the way to build prosperity and security without industry, a strong military, or natural resources.

9:55

Trust in crisis, or crisis of trust?

Krzysztof Komorowski

Ekspert ds. Nowych technologii i E-government, Instytut Sobieskiego

Poland ranks 23rd out of 28 EU countries in terms of the level of digitization of the economy and society. Despite huge expenditures on informatization, Poland is not using its potential. This means that the problem is not money. The problem is trust. What should be done not to remain at the tail end of Europe for decades to come? Does a decrease in trust in state institutions translate into a decrease in trust in digitization?

10:05

Trust no one, verify everywhere. Authentication and access management in the age of pandemics and digital transformation

Jarosław Ulczok

Pre-Sales Consultant, CEE, Cloud Protection & Licensing, THALES

Pandemic and digital transformation are the phenomena that are currently strongly shaping change in our IT departments. Remote working, access management and authentication systems have undergone particular dynamics of change. We will present how a modern IAM system can help in this (r)evolution and how it changes itself in the process.

10:15

Trust = competitive advantage. CISO's impact on business

Robert Kanigowski

Head of Information Security & Business Continuity, Provident Polska SA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Digital trust is different for every business and its use as a competitive differentiator will also be different. Organizations that ignore digital trust and digital identity risk becoming digital dinosaurs, while those that use it as part of the customer experience will thrive. How can digital trust help you stand out from the competition?

10:25

Top 5 privacy priorities in the world

Dorota Valli

Privacy Consultant, CIPP/E, OneTrust

Global privacy regulations and priorities continue to evolve - from Schrems II, CPRA to LGPD. One thing that remains constant is the importance of data protection and the role of the Data Protection Officer.

Join us for a session where we will discuss the top 5 global privacy priorities, including providing information on announced new legislation, trends among privacy professionals, changing consumer behavior, and touch on the growing importance of trust in organizations.

10:35

Debate: How can trust be restored?

Ewa Zborowska

Senior Research Manager, IDC Poland

Ireneusz Piecuch

Senior Partner and co-founder of DGTK Kibil Piecuch i Wspólnicy

Robert Kanigowski

Head of Information Security & Business Continuity, Provident Polska SA

Paweł Marczewski

Ekspert Fundacji im. Stefana Batorego

Heavy reliance on digital technology and systems we do not fully understand has undermined our trust in digital technologies. We are concerned and confused by issues of data privacy, fake news, automated decision-making and artificial intelligence. How did we get here and how can we rebuild trust?

11:00

Coffee break

11:03

Session Opening

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Digital Resilience

11:05

What doesn't kill you makes you stronger? True, as long as you know how to pick yourself up

Dominik Rozdziałowski

Naczelnik Wydziału do Walki z Cyberprzestępczością KWP w Kielcach

Despite the widely available email protection solutions on the market, phishing or ransomware attacks have never been as effective as they are today. The biggest threat to public institutions and enterprises is ransomware attacks. Unfortunately, more and more ransomware gangs are tightening cooperation among themselves and seem to function like a professional company. Such actions make ransomware campaigns more dangerous and frighteningly effective, and make it all the more difficult for law enforcement to track down the cybercriminals.

11:17

Cyber security and the remote working model

Piotr Woleń

Architekt usług CEE, HP Inc. Polska

The shift to remote working comes with rapidly increasing levels of cyber threats

11:25

Social networking threats you had no idea about

Robert Grabowski

Head of CERT, Orange Polska

Social media sites like Facebook, Twitter, OLX and many other popular online hubs connect us together in the digital society. While there are many benefits to sharing and communicating through social media, it poses some risks. Cybercriminals are taking advantage of the carefree way people use social media platforms. 

11:35

Graboid and other worms, or what threats may hide in modern applications

Ewa Śniechowska

Technical Sales Manager, Prisma Cloud, Palo Alto Networks

Recently, we have seen many changes related to new software delivery requirements, which also has a direct impact on IT architecture issues. Digital transformation, public cloud adoption and increasing share of containers in the architecture brings a number of security challenges. On the example of the latest attacks related to modern applications, we will analyze what risks customers have to face recently.

11:43

What has the drama of the hospital on the periphery taught us?

Damian Wróblewski

Director's Cyber Security Officer in MSWiA Hospital in Warsaw

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Being resilient also means learning from the experiences of others. Hospital ransomware attack. Computers in the hospital stop working. This causes ambulances to become paralyzed. A hacking attack disrupts a laboratory where tests for a new coronavirus are conducted. Staff have been banned from turning on malware-infected devices. And it happened at a hospital in the Czech Republic. Has the drama of the Czech hospital taught us anything?

11:53

Protecting the Hybrid Working With Secure Access to Apps and Data

Jakub Leszewski

Lead Networking Sales Engineer, Citrix Polska

Remote work has only accelerated trends we've seen before. More and more applications are migrating to the cloud, users are increasingly mobile, and threats are changing faster and faster. Yet network architectures and the way secure our data are still designed in a model that directs traffic to the corporate network. This creates significant challenges in terms of service availability, productivity and above all security.

During the presentation, we will explain how these challenges are solved using the SASE approach, and how Citrix solutions fit into this model, thus making it possible to ensure a consistent level of security and high comfort of work for all users, regardless of where they work and on what device.

 

12:01

The Art of War, or how to effectively build Cyber ​​Resilience

Adam Wygodny

Cybersecurity Governance Expert

War is not about expecting the enemy not to show up, but about greeting him properly. Nor is war about expecting the enemy not to attack, but about preventing him from doing so. War is not about giving up after the first line of resistance is broken. Cyber resilience should be a priority for every business. "The Art of War" by Sun Tzu was one of the first studies of warfare strategy. "The Art of War" provides a recipe for victory, including in the theater of warfare in the digital age.

12:11

Coffee break

12:14

Session Opening

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Digital Business

12:16

Time to Market: Security in pursuit of business. From monolith to microservices

Aleksander P. Czarnowski

Chief Executive Officer, DefenseLayers

Embracing "security by design," i.e., considering security requirements from the concept stage, can also help create safer products. But it stifles innovation and speed. How to find a compromise between "security first" and business needs. Are microservices and containerization reconciling fire and water? Microservices promises a model that brings more trust to business environments and is currently one of the most discussed trends. Companies like Amazon, Netflix, Spotify and Uber have made the transition. Did they have a problem with it? What can we learn from the pioneers.

12:26

Successful Identity Management means No Unauthorized Access and Operational Efficiency

Tomasz Mielnicki

Presales Manager CEE, Quest / One Identity

“New Normal” drives change in how we think about identifying users and securing systems. In this world, identity is a new perimeter for securing digital assets and Zero Trust is a key concept of today’s strategy in organisations. The demands of a friction-free digital experience can certainly make this task more challenging, but there are ways to achieve the security goals and high operational efficiency.

12:36

Human or centralization is the weakest link in security?

Michał Pierzgalski

Ekspert, Obszar Rozwoju Systemów i Sektor Publiczny, KIR

Dozens of our accounts spread across the web and protected only by often weak passwords include bank accounts, health records, birthdays, social security numbers and passport information. The explosion of online data in the information age has brought with it gaps in security, So finding a reliable cyber security solution is more important than ever.

It is commonly believed that humans are the weakest link in security. Blockchain, however, shows that human error can be forgiven if data is stored in a decentralized model.

 

12:46

Free your Privilege Account Users from passwords while providing your organization with even higher IT security

Anna Jacobi-Konik

International Sales Manager, ISCG

Tomasz Wandel

Territory Manager CEE, Russia & CIS, Thycotic

Security breaches have been on a rapid rise especially due to an unforeseen need to switch all businesses around the world to remote work in 2020. Not all companies unfortunately had a chance to do this properly. This resulted in massive losses of data and concrete financial consequences. Majority of the security breaches were a result of poor privilege account security. Join our session to find out why and how you can secure your most valuable organizational data.

12:56

Quantum technologies, and cybersecurity

Tomasz Widomski

Member of Supervisory Board, ELPROMA

One of the most important pillars of cybersecurity is cryptography. From the point of view of an individual, among others, it is thanks to cryptography that it is possible to use e-banking systems, make purchases online, maintain privacy in Internet communication, or ensure the confidentiality of our medical records in medical ICT systems. quantum technologies provide completely new cryptographic solutions that can allow to achieve a level of security in the exchange and storage of information, unavailable using classical cryptography.

13:16

Closing speeche

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Speakers

Ewa Lis-Jezak

Regional Director, & MD - Poland & The Baltic States, IDC CEMA

Wiktor Markiewicz

Senior Research Analyst, Poland and Baltics, IDC Poland

Joel Stradling

Research Director, European Security, IDC

Kaimar Karu

Były Minister Handlu Zagranicznego i Technologii Informacyjnych, Republika Estonii

Krzysztof Komorowski

Ekspert ds. Nowych technologii i E-government, Instytut Sobieskiego

Jarosław Ulczok

Pre-Sales Consultant, CEE, Cloud Protection & Licensing, THALES

Robert Kanigowski

Head of Information Security & Business Continuity, Provident Polska SA

Dorota Valli

Privacy Consultant, CIPP/E, OneTrust

Ewa Zborowska

Senior Research Manager, IDC Poland

Ireneusz Piecuch

Senior Partner and co-founder of DGTK Kibil Piecuch i Wspólnicy

Partners

Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner
Gold Partner

General Information

 

Technology Users - free of charge

Technology Providers - PLN 450

 

April 27, 2021

 

9:30 am -12:30 pm

Contact Us

Natalia Toporkiewicz

Conference Project Manager

+48602694897

Katarzyna Wodzinowska

Associate Sales Director, CEE Sales, IDC Poland

+48601 606 962

About IDC

57 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.