Time Event & Speakers

Registration & Networking


First 50 Early Bird Gifts


Welcome Address

Megha Kumar
Research Director, Software (META), IDC

Security Strategies in the Era of Widespread Innovation

Megha Kumar
Research Director, Software (META), IDC

Organizations in the Middle East are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations to innovate and experiment with new types of technologies. This drive requires a change to IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation progress, organizations will need to build business-level strategies for security. This presentation will cover the current state of the security landscape and examine how risk, trust, and consent need to be built into security strategies as we enter era of multiplied innovation.



Defending Against Today’s Critical Threats

Ayed AL Qartah
Consulting Systems Engineer, Security Cisco - Global Security Sales Organization (GSSO)

The people responsible for defending networks realize that the security threat landscape is constantly in flux as attackers routinely develop their skills and techniques. This session will examine some of the most significant recent threats today such as ransomware applications, phishing scams, account takeovers, and data breaches. The session will also reveal how capabilities like security analytics, threat intelligence, threat detection, and technology integration can be leveraged throughout the entire network.


Enterprise Digital Security Transformation

Sunil Varkey
CTO & Security Strategist, Symantec

With the adoption of social, mobile, AI and Cloud, enterprise business models, architecture and threat landscape are continuously changing. Trust in the digital environment and regulations are mandating new approach in securing enterprises. Symantec’s Integrated Cyber Defense platform with termination points focus and zero trust approach is leading the security industry.


Digital Security program hierarchy flow

Amadou Ndiaye
Senior Director, Corporate Security - Ooredoo

In today’s world, protecting company data and the systems that collect, process, transmit, store and maintain this information is of critical importance. Consequently, the security of systems must include controls and safeguards to offset possible threats, as well as controls to ensure accountability, availability, integrity, and confidentiality of the data. To achieve this challenging objective, companies should first and foremost create a sound digital security program that will cover the end-to-end cycle.


Tea/Coffee & Networking Break


Securing ICS/SCADA with Next-Generation Protection

Osama Abduo
Principal Systems Engineer,Fortinet Middle East

Operational Technology (OT) systems are crucial to supporting critical infrastructures that we rely on day in and day out. A variety of industries from manufacturing to emergency services require secure OT systems that provide visibility, control, and context. Understand the importance of securing your critical infrastructures with an integrated, automated approach.


The Visible Attack Surface – What it is and Why it Matters

Siddharth Agarwal
Solutions Engineer, Skybox

Impacts on the security landscape create new challenges for enterprises to manage as their attack surface increases and new vulnerabilities continuously emerge. Attendees to the workshop will learn how a model of the attack surface can be used to:

• How to deal with the specific security issues and vulnerabilities around cloud, IoT and operational technology (OT) as part of their digital transformation strategy

• How visibility and analytics can be used to provide mature security process orchestration

• How to obtain and use visibility of the infrastructure to proactively maintain resilience of the infrastructure



Human-Centric Security for the Era of Digital Transformation

Mohamed El Shenawy
Sales Engineering Manager, Middle East - Forcepoint

Security complexity continues to be a concern for organizations, especially as new threats require new types of strategies. This presentation will provide guidance on security management and highlight how a platform-based approach is critical for addressing security.


Tea/Coffee Break


Panel Discussion: Building an Effective Security Strategy

Megha Kumar
Research Director, Software (META), IDC
Ayman Taher
Senior Information Security Officer, Warba Bank
Syed Abdul Samad
Sr. Manager - Group Information Security Management, Kuwait Finance House
Sulaiman Mahmoud
CIO & Quality Manager, Al-Babtain Group of Companies
Mohammad Altura
Chief - Information Technology Sector Communication and Information Technology Regulatory Authority (CITRA)

This discussion will provide guidance on building effective security strategies that can adapt to rising threat complexities. It will also offer advice on managing security and building effective response plans.


Raffle Draw


Securing the modern hybrid infrastructure

Hadi Jaafarawi
Managing Director – Qualys Middle East

As Enterprises step into their digital transformation journey, they are exploring and adopting new technologies and concepts like containers, DevOps, Mobility, IoT, OT and Cloud while still maintaining their traditional data centers. Thus, we see the rise of the modern hybrid infrastructure which forces Enterprises to re-think their IT infrastructure, applications and security. This presentation provides an insight on the challenges of securing a modern hybrid infrastructure and provides an insight on the future of security.


Winners & Losers of the 2018 Cyberthreat Rollercoaster

Christopher Green
Regional Director Middle East, Africa and Turkey, Malwarebytes

In 2018, it seemed like a new breach or cyberattack was around every corner. But specifically, businesses have been more heavily targeted this last year than any before`. Attend this session to hear about the breaches and malware that have been hitting the headlines including 2019 predictions and learn what you can do about breached systems and adversaries dwelling on your network endpoint


Summary & Close


Final Raffle Draw


Lunch & Networking


Shabana Mahadiwala

Conference Director

+971 56 414 5986

Ronita Bhattacharjee

Vice President - Conferences, IDC Middle East, Africa, & Turkey

+971 4 391 2747

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit