It is insufficient to talk only about IT security. Technology is just one component of how we secure our organizations. Processes are important too, as are architecture, people, policies, and governance. At the heart of what organizations need to protect are data and information, the digital assets that confer value on digital businesses. Which means IT security is now about nothing less than Business Security. It’s time for everyone to recognize that the two are inseparable.
With an agenda designed to match the expectations of senior IT and security leaders, the IDC Security Roadshow will address all the biggest issues through a combination of keynote speeches, panel debates, and peer-to-peer networking. By attending our events, you will be able to:
Interact face to face with local and global IDC analysts
Gain a clearer understanding of current security challenges
Meet with industry peers and share common experiences
Learn about proven best practices through real-life case studies
Explore the key trends shaping security decisions across the region
Engage in interactive debates with respected thought leaders
The IDC Security Roadshow 2019 has been designed as an information-sharing forum and networking platform for select groups of 70–150 senior security decision makers from the most prominent enterprises in each country.
Every year, we conduct surveys and collect feedback from our audiences. As such, the agenda is guaranteed to reflect the most pressing global security challenges, while also addressing the current needs of the local market and providing ample scope for in-depth discussions and engaging conversations.
Program Manager — IDC Saudi Arabia
Technical Leader - Cisco Talos Intelligence Group
Senior System Engineer, Attivo Networks
CTO & Security Strategist, Symantec
Senior Consulting Sales Engineer, Crowdstrike
Cyber Security consultant - Qatar, Fortinet
Murat Hüseyin Candan
General Manager, Barikat
Regional Sales Director – Skybox Security
Manager, Technical Systems Engineers – Emerging Markets, Panduit Europe Ltd.
Technical Leader, Trend Micro
Cisco (NASDAQ: CSCO) is the worldwide technology leader that has been making the Internet work since 1984. Our people, products, and partners help society securely connect and seize tomorrow's digital opportunity today. Discover more at newsroom.cisco.com and follow us on Twitter at @Cisco.
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks.
Fortinet protects the most valuable assets of some of the largest enterprise, service provider and government organizations across the globe. The company's fast, secure and global cyber security solutions provide broad, high-performance protection against dynamic security threats while simplifying the IT infrastructure. They are strengthened by the industry's highest level of threat research, intelligence and analytics. Unlike pure-play network security providers, Fortinet can solve organizations' most important security challenges, whether in networked, application or mobile environments - be it virtualized/cloud or physical. More than 210,000 customers worldwide, including some of the largest and most complex organizations, trust Fortinet to protect their brands.
Barikat has been established in 2008 and only deals with cyber security. Our main goal is to increase level of our customers cyber security maturity. Our technical staff provides many services and consultancies needed to create a solid security posture for any modern organization. Barikat holds NATO grade security clearance for premises and National Defense Ministry level for whole staff. Organizations require a wide range of trainings to create and enhance their cyber security workforce. Our R&D department researches technologies and methodologies needed to increase cyber security level and develops products, services and methodologies needed in a modern organization to increase it as well.
Panduit is a world-class developer and provider of leading-edge solutions that help customers optimize their physical infrastructure through simplification, agility, and operational efficiency. Its Unified Physical Infrastructure-based solutions provide the capabilities to connect, manage, and automate communications, computing, power, control, and security systems for a smarter, unified business foundation.
Skybox provides the industry’s broadest cybersecurity management platform to address security challenges within large, complex networks. By integrating with 120 networking and security technologies, the Skybox® Security Suite gives comprehensive attack surface visibility and the context needed for informed action. Our analytics, automation and intelligence improve the efficiency and performance of security operations in vulnerability and threat management and firewall and security policy management for the world’s largest organizations.
Trend Micro is a multinational cybersecurity and defense company globally headquartered in Tokyo, Japan. With more than 500,000 customers around the world (including 45 of top 50 global corporations), Trend Micro's experience remains unmatched by any other firm. From the endpoint to the network and the cloud, Trend Micro covers customers with a connected threat defense that is recognized by analysts, customers, and industry gurus of all kinds.
Infoblox delivers actionable network intelligence to enterprise, government, and service provider customers around the world. Infoblox is the industry leader in DNS, DHCP, and IP address management, the category known as DDI. Infoblox empowers thousands of organizations to control and secure their networks from the core — enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
Learn more at https://www.tripwire.com/, get security news, trends and insights at www.tripwire.com/blog, or connect with us on LinkedIn, Twitter and Facebook.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Every day, Juniper Networks is helping our customers build the best networks on the planet. Every innovation we envision, every technology we create is informed by our desire to help solve our customers’ toughest challenges so they can compete and thrive today and into the future.
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure. www.mimecast.com
OISSG is a pure-play security services consulting firm based in Doha, Qatar. OISSG exists to enable organizations have a resilient security posture across all pillars of business. An end-to-end provider of security services solutions, we support digital transformation in an ever-evolving technology environment. Our experts give you the advantage of having an extended security services team on the ground, working with leading-edge technology and contemporary security frameworks to enable digital, and knowledge transformation. With more than 80 clients across government, ministries and semi-government, we work across Qatar and help organizations build their security posture.
Forcepoint is transforming cybersecurity by focusing on what matters most: understanding people’s intent as they interact with critical data and intellectual property wherever it resides. Our uncompromising systems enable companies to empower employees with unobstructed access to confidential data while protecting intellectual property and simplifying compliance. Based in Austin, Texas, Forcepoint supports more than 20,000 organizations worldwide.
Sheraton Grand Doha Resort & Convention Hotel
Wednesday, 20th March 2019
Free of Charge : For End Users (not IT +consultant companies)
For More Information, contact: Rama Bhardi - +91 99300 70107 / firstname.lastname@example.org
Sheraton Grand Doha Resort & Convention Hotel
56 Years | 1100 Analysts | 110 Countries
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.
This is an invitation-only event. Only selected IT executives can participate in this event. If you are a C-Level executive or IT decision maker and wish to attend this event, kindly fill out the form below and an event representative will contact you with more information.