This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.



Time Event & Speakers

Registration & Networking


Early Bird Raffle - (Google Home)


Welcome Address

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Security Metrics for the Digital Era

Uzair Mujtaba
Program Manager — IDC Saudi Arabia

Organizations in the Middle East, Turkey, and Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation.


Enterprise Digital Security Transformation

Sunil Varkey
CTO & Security Strategist, Symantec

With the adoption of social, mobile, AI and Cloud, enterprise business models, architecture and threat landscape are continuously changing. Trust in the digital environment and regulations are mandating new approach in securing enterprises. Symantec’s Integrated Cyber Defense platform with termination points focus and zero trust approach is leading the security industry.


Driving Security via Platforms

Most large organizations have to manage 50+ security products and 20+ providers. Security platforms and security ecosystems offer comprehensive, integrated solutions from a single vendor, or integrated solutions via an app marketplace. This presentation will evaluate whether this is the way to solve the scale and complexity challenge.


End User Presentation: Digital Transformation & Its Effects on Business Security

As organizations introduce innovative technologies into their ecosystems, they are simultaneously creating new types of risks and vulnerabilities. This presentation will provide an end-user perspective on the steps organizations can take to ensure business security as they engage in digital transformation.


Tea/Coffee & Networking Break


Securing ICS/SCADA with Next-Generation Protection

Osama Abduo
Principal Systems Engineer,Fortinet Middle East
Operational Technology (OT) systems are crucial to supporting critical infrastructures that we rely on day in and day out. A variety of industries from manufacturing to emergency services require secure OT systems that provide visibility, control, and context. Understand the importance of securing your critical infrastructures with an integrated, automated approach.


Security & the Extended OT Environment

Many OT environments are getting connected to IT networks as well as the wider Internet of Things (IoT) ecosystem. This rise in Industrial IoT further requires organizations to address new types of security threats and implement new governance processes. This session will provide guidance on how to address security within the extended OT ecosystem.


Panel Discussion: Best Practices Around OT Security

In this session our panelists will discuss best practices for introducing and improving OT security within organizations. In particular, they will focus on the strategies that organizations should adopt given the rising prevalence of industrial IoT solutions.


Lunch & Networking


Raffle Draw


Securing the modern hybrid infrastructure

Hadi Jaafarawi
Managing Director – Qualys Middle East

As Enterprises step into their digital transformation journey, they are exploring and adopting new technologies and concepts like containers, DevOps, Mobility, IoT, OT and Cloud while still maintaining their traditional data centers. Thus, we see the rise of the modern hybrid infrastructure which forces Enterprises to re-think their IT infrastructure, applications and security. This presentation provides an insight on the challenges of securing a modern hybrid infrastructure and provides an insight on the future of security.


Cyber security threats to Business Digital Transformation


Panel Discussion: Ensuring Effective Data Security & Insider Risk Management

This panel will look at strategies for effectively addressing data security in line with growing compliance requirements. Given that insider risk is a major concern when it comes to securing data, the panel will also provide guidance on how to implement effective strategies for managing insider risk strategies.


Final Raffle Draw


Summary & Close


Ronita Bhattacharjee

Vice President, Conferences

+971 4 391 2747

About IDC

55 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit