Time Event & Speakers

Registration & Networking


Welcome Address

Nagia El-Emary
Country Manager, Egypt, IDC

Security Strategies in the Era of Widespread Innovation

Nagia El-Emary
Country Manager, Egypt, IDC

Organizations in the Middle East, Turkey, and Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation.


Identify and Respond to Threats with Speed and Confidence

Ashraf Abdelazim
MEA Region Leader, IBM MENA

Apply automated intelligence to detect, connect, prioritize and investigate threats, see everything, utilize automated intelligence for getting right insights and becoming proactive.


Understanding Security Challenges in the OT Environment

Tamer Aboualy
MEA Security Partner & Lead and Global OT Security Consulting Lead, IBM Security

The world’s most critical sectors rely on Operational Technology (OT) to purify the water we drink, provide electricity to our homes, heat/cool buildings, manufacture the products we use, and much more. Many counties around the world have categorized relating important entities as critical national infrastructure (CNI). Yet the nature of OT environments has made them a target of hackers and foreign governments. For example, we have seen Shamoon 1-3, Hydro ransomware, and other malware or targeted attacks seriously impact various industrial sectors. In some cases, completely shutting down operations. This presentation briefly provides an overview of OT security, real-life example vulnerabilities, and mitigation strategies. Additionally, it will examine the typical findings of OT Security assessments.



Panel Discussion: Best Practices Around OT Security

Wessam Maher
Chief Technology Officer Chief Information Security and Risk Officer, American University Cairo
Dareen Shaheen
Head of Information Security, Alex Bank (Bank of Alexandria)
Tamer Aboualy
MEA Security Partner & Lead and Global OT Security Consulting Lead, IBM Security


Tea/Coffee & Networking Break


End User Presentation: Digital Transformation & Its Effects on Business Security

Mohamed Abdel Halim
Chief Information Security Officer, Ministry of Electricity and Renewable Energy

As organizations introduce innovative technologies into their ecosystems, they are simultaneously creating new types of risks and vulnerabilities. This presentation will provide an end-user perspective on the steps organizations can take to ensure business security as they engage in digital transformation.


Connected Security

Ashraf Salem
System Engineer, Juniper Networks

As organizations continue to evolve beyond single-premises IT deployments and embracing multicloud to transform IT. As this transformation takes place, it increases the need for fast and elastic protection from advanced threats. Organizations need automated, repeatable security on a portfolio that connects the entire network. Juniper Connected Security gives organizations the ability to safeguard users, applications and infrastructure by extending security to all points of connection across the network.


Securing the modern hybrid infrastructure

Hadi Jaafarawi
Managing Director – Qualys Middle East

As Enterprises step into their digital transformation journey, they are exploring and adopting new technologies and concepts like containers, DevOps, Mobility, IoT, OT and Cloud while still maintaining their traditional data centers. Thus, we see the rise of the modern hybrid infrastructure which forces Enterprises to re-think their IT infrastructure, applications and security. This presentation provides an insight on the challenges of securing a modern hybrid infrastructure and provides an insight on the future of security.


Panel Discussion: Building an Effective Security Strategy.

Wessam Maher
Chief Technology Officer Chief Information Security and Risk Officer, American University Cairo
Tarek El-Sherif
Head of Information Security, Leading Bank in Egypt
Ayman Zaki
CISO, I Score The Egyptian Credit Bureau

This discussion will provide guidance on building effective security strategies that can adapt to rising threat complexities. It will also offer advice on managing security and building effective response plans.


Summary & Close


Final Raffle Draw


Lunch & Networking


Ronita Bhattacharjee

Vice President - Conferences, IDC Middle East, Africa, & Turkey

+971 4 391 2747

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit