Time Event & Speakers

Registration & Networking


Welcome Address


Security Strategies in an Era of Multiplied Innovation

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Organizations in the Middle East, Turkey, and Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation


Using Intelligence to Build a Resilient Organization

Vanja Svajcer
Technical Leader - Cisco Talos Intelligence Group


Threat Intelligence is one of the key disciplines organizations should adopt in order to be able to successfully detect threats in their environments. Threat intelligence allows organizations to improve contextual information about threats and to map attack actors based on the techniques, tactics and processes (TTPs) used in attacks. This presentation shows how a large threat intelligence organization such as Cisco Talos can daily handle billions of alerts and what information about threats we extract. We will also discuss various classes of actors organizations are likely to encounter when responding to incidents affecting their own networks and conclude with an outlook into future of threats


Adaptive Cyber Deception for Early & Accurate Threat Detection & Response

Ahmed Ehlayel
Senior System Engineer, Attivo Networks


Given that even the best security systems cannot prevent all attacks, today's organizations require actionable, substantiated alerts to detect, isolate, and defend against cyberattacks. Prevention systems are no longer enough; there is a need for organizations to leverage high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. This session will explore the use of comprehensive deception platforms that detect – in real-time – inside-the-network intrusions in networks, public and private data centers, and specialized environments such as industrial control system SCADA, Internet of Things, and point-of-sale environments.


Tea/Coffee Break


Raffle Draw (Google Home)


Enterprise Digital Security Transformation

Sunil Varkey
CTO & Security Strategist, Symantec


With the adoption of social, mobile, AI and Cloud, enterprise business models, architecture and threat landscape are continuously changing. Trust in the digital environment and regulations are mandating new approach in securing enterprises. Symantec’s Integrated Cyber Defense platform with termination points focus and zero trust approach is leading the security industry.


CrowdStrike Presentation

Roland Daccache
Senior Consulting Sales Engineer, Crowdstrike

Raffle Draw


Tea/Coffee Break


Gold Track (Parallel Sessions)

Gold Partner Session A: Convergence of OT & IT Security

12:10 - 12:15

Raffle Draw

12:15 - 12:35

Addressing the Security of Critical Systems

Majid Wani
Cyber Security consultant - Qatar, Fortinet
12:35 - 12:55

The Visible Attack Surface – What it is and Why it Matters

Ziad Sawtari
Regional Sales Director – Skybox Security
12:55 - 13:15

The Art of Cybersecurity

Bilal Issa
Technical Leader, Trend Micro
13:15 - 13:20

Raffle Draw

Gold Partner Session B: Making Cloud Security a Reality

12:10 - 12:15

Raffle Draw

12:15 - 12:35

Enhanced Cyber Security

Murat Hüseyin Candan
General Manager, Barikat
12:35 - 12:55

Datacenter architecture design security considerations

Ayman Aboslema
Manager, Technical Systems Engineers – Emerging Markets, Panduit Europe Ltd.
12:55 - 13:15

Panel Discussion: Effective Security Strategies for the Cloud

Abdulla Ahmad Al-Ali
IT Director, Ministry of Commerce and Industry
Nasser Alawad
Executive Director of Infrastructure and Operations, Sidra Medicine
Hamad Rashid Suwaid
IT Manager - Qatar Gas Transport Company (NAKILAT)
13:15 - 13:20

Raffle Draw


Lunch Break


Sliver Track (Parallel Sessions)

Silver Partner Session A: New-Age Security Dimensions

14:15 - 14:40

Panel Discussion: Best Practices Around OT Security

Uzair Mujtaba
Program Manager — IDC Saudi Arabia
Asad Ali Zaidi
CIO, Standard Charter Bank
Alexandra Tarazi
Executive Director of Health Information Systems , Public Health Care Corporation
14:40 - 14:45

Raffle Draw

14:45 - 15:00

Leverage Existing Infrastructure for Scalable Data Protection

Peter Goodwin
Director Service Providers, Infoblox EMEA
15:00 - 15:15

Juniper Connected Security

Mohamad Makhzoum
Cyber Security Specialist - Juniper Networks
15:15 - 15:20

Summary & Close

15:20 - 15:25

Final Raffle Draw

Silver Partner Session B: Dealing with Modern Risks

14:15 - 14:20

Raffle Draw

14:20 - 14:35

Enhance Your Foundational Controls with the MITRE ATTACK Framework

Shalik Aboo
Technical Manager MEA, Tripwire
14:35 - 14:50

Humans Are Your Weakest Link - Protecting Against Social Engineering

Saad Nizam
Security Consultant, Checkpoint
14:50 - 15:05

Securing Multiple Clouds Within Your Organization

Werno Gevers
Enterprise Manager, Mimecast
15:05 - 15:10

Summary & Close

15:10 - 15:15

Final Raffle


Ronita Bhattacharjee

Vice President - Conferences, IDC Middle East, Africa, & Turkey

+971 4 391 2747

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit