Time Event & Speakers

Registration & Networking


Welcome Address

Uzair Mujtaba
Program Manager — IDC Saudi Arabia


Security Strategies in the Era of Widespread Innovation

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Organizations in the Middle East, Turkey, and Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation


Dynamic Deception for Proactive Cyber Defense

Bahi Hour
SE Director, META, Attivo Networks



The Visible Attack Surface – What it is and Why it Matters

Siddharth Agarwal
Solutions Engineer, Skybox

Impacts on the security landscape create new challenges for enterprises to manage as their attack surface increases and new vulnerabilities continuously emerge. Attendees to the workshop will learn how a model of the attack surface can be used to:

• How to deal with the specific security issues and vulnerabilities around cloud, IoT and operational technology (OT) as part of their digital transformation strategy

• How visibility and analytics can be used to provide mature security process orchestration

• How to obtain and use visibility of the infrastructure to proactively maintain resilience of the infrastructure



Tea/Coffee Break & Networking


Raffle Draw


Preparing Cyber-Resilience Defense Strategy to stay one step ahead

Salah Al-Wadi
Division Manager, IS Security, MIS

• Steps to achieve cyber resilience

• Plan and prepare for an incident

• Know your information crown jewels

• Educate your employees

• Stay updated

• The Five pillars of Information Security: (Prepare/Identity, Protect, Detect, Respond, Recover)

• Achieving Cyber Resilience



Combatting Today’s Advanced Attacker: Key Trends, Predictions and the Need for Speed

Roland Daccache
Senior Consulting Sales Engineer, Crowdstrike

Nation state and e-crime attackers are getting much faster in breaking out inside the most protected environments and living “off-the-land” with malware-free attacks.

Learn how you can leverage CrowdStrike state-of-the-art technology, world-class threat intelligence, and extensive human expertise, in combatting the planet’s most advanced attackers.


HEAR ABOUT real-world examples of how cybercriminals combine advanced, targeted attack techniques with ransomware to cause massive financial loss

- GAIN INSIGHT into global ‘breakout time’ metrics and achieving the “1-10’60” rule to defeat the adversary and prevent a mega breach

- PREPARE FOR THE NOW - Hear about the most favoured TTPs observed over the last 12 months to predict what you should expect to see in 2019



A look at some security (cyber and physical) best practices used by all G7 governments and the world’s top 10 banks.

Geoffrey Brooks
Senior Channel Account Manager, Middle East – BlackBerry

Prayer Break


Gold Track Session (Parallel Sessions)

Gold Track Session A: Convergence of OT & IT Security
Chaired by Uzair Mujtaba, Program Manager, IDC

12:05 - 12:10

Raffle Draw

12:10 - 12:30

Endpoints – The first line of Defense

Nikolaos Samiotis
Security Business Developement Manager EMEA, HP Inc
12:30 - 12:50

Addressing the Security of Critical Systems

Dan Gadd
Senior Regional Sales Engineer, Carbon Black
12:50 - 13:10

Enhance Your Foundational Controls with the MITRE ATTACK Framework

Ehab Nour
System Engineer, Middle East, Tripwire
13:10 - 13:30

Raffle Draw

Gold Partner Session B: Making Cloud Security a Reality
Chaired by Jawad Khalil, Program Manager, IDC

12:05 - 12:10

Raffle Draw

12:10 - 12:30

Data Security

Fakhreddine Mourabiti
Information Risk and Protection Technical leader, IBM Middle East
12:30 - 12:50

Identify and Respond to Cyber Threats with Speed and Confidence

Ashraf Abdelazim
Manager, MEA Threat Management Portfolio, IBM Middle East
12:50 - 13:10

Of Intelligent automation and next-generation defenses

Dr. Abdulaziz Al-Besher
Dean, College of Computing and Informatics, Saudi Electronic University
13:10 - 13:15

Raffle Draw


Lunch & Networking Break


Sliver Track Session (Parallel Sessions)

New-Age Security Dimensions
Chaired by Jawad Khalil, Program Manager, IDC

14:30 - 14:35

Raffle Draw

14:35 - 14:50

Securing the Modern Hybrid Infrastructure

Faeq Abu-Khair
Director of Post-Sales, Qualys
14:50 - 15:05

Winners & Losers of the 2018 Cyberthreat Rollercoaster

Christopher Green
Regional Director Middle East, Africa and Turkey, Malwarebytes
15:05 - 15:20

The convergence between SOAR and SIEM in response to Cyber Threats

Antonio Piazza
Regional Sales Manager MEA, SG Box
15:20 - 15:25

Mega Raffle Draw

Dealing with Modern Risks
Chaired by Mufasir Yousuf, Senior Research Analyst, IDC

14:30 - 14:35

Raffle Draw

14:35 - 14:50

Deception Security: Modern Maturity for Automated Detection and Response

Christian Hewitt
SE Engineer, Fidelis Cybersecurity
14:50 - 15:05

Data Protection - A Holistic Approach

Feras Alazwari
VP Security Business Unit, AEC
15:05 - 15:20

How to Make Your Software Security Program Successful

Ajay Bongirwar
Region Head, India & Middle East, Checkmarx
15:20 - 15:25

Mega Raffle Draw


Ronita Bhattacharjee

Vice President - Conferences, IDC Middle East, Africa, & Turkey

+971 4 391 2747

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit