This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.



Time Event & Speakers

Registration, Welcome coffee, Partner's Exhibition


Welcome Note, Opening of The Conference

Alina Georgescu
Regional Director, IDC SEE

Business Security: Risk & Resilience

József Bakk
Country Manager, IDC Hungary

PSD2 and Its Cybersecurity Challenges

György Pávlicz
Business Information Security Officer, K& H Bank

Addressing the Cyber Threats on the Horizon by adapting a Simple, Open and Integrated Threat Defense Architecture

Nikos Mourtzinos
Regional Sales Manager for Cisco Cyber Security Sales for Eastern Europe

Organizations face multi-vector, multi-stage threats and IT Leaders are not confident in their ability to prevent the next big breach.
They try to solve the problem by adding more security tools into the mix that do not integrate, but this just adds more complexity.
There’s also a lack of talent in information security. In fact, security might be the only field where there is negative unemployment.
So IT Leaders have limited budgets, staff and time and they can’t keep up with the constant attacks and threat alerts.
Organizations should adapt an integrated security architecture that is simple, open, automated, effective that would enable them to detect, investigate, and remediate threats much faster and easier – a necessity in today’s cyber landscape and the only way to be protected 24/7.


From Cloudy to Clear Skies: Multi-cloud Security Clarified

Aviram Zrahia
Cyber Security Evangelist, Juniper Networks

Cloud technologies are one of the fastest growing segments of IT as organizations strive to improve their competitive positioning and take advantage of efficiencies and scalability the cloud provides. This digital transformation trend presents new risks and forces security leaders to reconsider data and system protection as they move to a multi-cloud reality which spans across private and public environments. Prevention, detection, and response in the multi-cloud era are particularly challenging due to the dynamic nature of infrastructure, workflows, and data locations. The session will describe the main security challenges across the key domains of data and application, and discuss infrastructure related technologies such as micro-segmentation and workflow visibility.


One-to-One Meetings, Coffee break


Business Security: security function as business enabler?

Dr. Erik Vaskeba
Business Security Officer, Telenor Hungary

Privileged Access Management for the Real World

Balázs Scheidler
PAM and Log Management Technology Strategist at One Identity

Az IT biztonsági menedzserek számára a kiemelt jogosultságok menedzsmentje több okból is kihívást jelentő feladat. A privilegizált hozzáférés- kezelő (Privileged Access Management - PAM) megoldások általában komplexek, hosszadalmas a telepítésük, és az üzemeltetésük is nehézkes. Az előadás azokat a legjobb gyakorlatokat és realisztikus megközelítéseket mutatja be, amelyek elősegítik a biztonságos, átlátható és kontrollálható hozzáférés kezelési eljárásokat, és kielégítik napjaink felhasználói igényeit.


Agile Harmonisation of IT, Security and Compliance in Digital Transformation Journeys

Marco Rottigni
Chief Technical Security Officer EMEA, Qualys
Organisations undertaking digital transformation journeys are often facing challenges in structuring the processes efficiently to cope with dissolving barriers, ever changing IT landscape and a security posture that requires augmented capabilities. We'll analyse in theory and practice how to evolve a traditional waterfall approach towards an agile one, to empower orchestration and communication among silos to achieve a single source of truth.

In the cloud, an exposure is only a single API misconfiguration away….

Zsolt Vilhelm
Security Engineer, Check Point Software Technologies Ltd.

As more and more workloads move to the cloud, it is getting increasingly complex to protect these workloads. The top three security challenges companies usually face with is visibility into cloud infrastructure security, compliance, and setting consistent security policies across cloud and on-premises environments. During the presentation we will discuss the challenges and introduce the possibilities with Check Point CloudGuard Dome9.


Maybe it’s Better to Never Make Predictions, Especially About the Future

Zsolt Rakoncza
Regional Manager, Fortinet

For the past several months social media and the Internet in general has been overloaded with all sorts of dire predictions about the future of the threat landscape. However, if all of these were taken at face value then organizations might as well either close up shop or go back to print advertising and taking orders by paper purchase orders.

While these predictions can give us an insight of what “could” happen in the future they shouldn’t be allowed to become distractions from the tasks at hand - ensuring that 1) cyber security best practices are being put into practice and being followed throughout the organization 2) the right technology is deployed where needed throughout the network and 3) preventive and predictive technologies are deployed in equal measure.

This session will look back on some of 2018’s threat landscape predictions and how close (or far) from the mark they landed. Some of the predictions for 2019 will also be examined to see if any trends have developed year-on-year. Any predictions made during the session will follow the Winston Churchill rule: "I always avoid prophesying beforehand because it is much better to prophesy after the event has already taken place. "


Interactive Panel Discussion


One-to-One Meetings, Buffet Lunch


Afternoon Key-note Presentation

Dr. Lajos Muha
Professor, CISO, Magyar Államkincstár

Being Risk Averse In A Digitally Transforming Enterprise. Fiction or Reality?

Árpád Tóth
Territory Major Account Manager, Hungary & Adriatics, Kaspersky Lab

Have you struggled to articulate the Return on Investment ( ROI) and measure your performance ( KPIs) in Cyber security? If so, you are not alone! To justify the investment in security , you must assess and prioritise your organisation’s risks. Risks can not be completely eliminated , only mitigated. Security professionals will need to determine the risks adequately addressed by current controls, the remaining security gaps, whether risks are sufficiently prioritised and the level of remaining exposure. Risk assessment and mitigation process requires great deal of intelligence based on global , actionable , timely data! Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs. You can leverage this intelligence in your organization today.


Achieving Continuous Compliance and Fast Remediation

Avi Corfas
Regional Director CEE, Skybox Security

IT teams receive tons of change requests daily, compliance requests are getting more and more challenging and the number of IT security incidents is constantly increasing. Meanwhile companies are facing lack of resources and an even higher lack of visibility over their entire network. But how do you protect something you don´t even know? Learn how Skybox can provide you automation and visibility but saving you valuable resources at the same time by focusing on the most important vulnerabilities in your network.


Scaling Up Endpoint Prevention, Detection and Response: A Success Story At A Large Telco

Josu Franco
Strategy & Technology Advisor, Panda Security

The cybersecurity landscape today presents a sharp contrast between the myriad providers and offerings to address an increasingly complex environment, and the chronic shortage of professionals able to handle them. To face both the security complexities and the skills shortage, Panda Security proposes the Adaptive Defense approach, integrating products, technologies and services, ensuring maximum protection and visibility, together with transparency and simplicity for the customer. A dramatic reduction in the number of infections, and a growing list of major wins are proving the success of the approach.


One-to-One Meetings, Coffee break


IDC Connect Sessions: moderated workshops in small groups

Péter Jakab
Head of Banking Security Department, Raiffeisen Bank
Gábor L. Varjas
Group Chief Information Security Officer, MOL Group
Dr. Boldizsár Bencsáth
Assistant Professor, Laboratory of Cryptography and System Security
István Hagen
CISO, Bonafarm Zrt.
László Ványa
Business Development Manager, Flowmon Networks
Dr. Lajos Muha
Professor, CISO, Magyar Államkincstár
Tibor Földi
Head of IT Security, CIG Pannónia Életbiztosító Nyrt.

Connect Discussion 1 | How is digital transformation altering business and security?

Moderator: Péter Jakab, Head of Banking Security Department, Raiffeisen Bank

Connect Discussion 2 | How to harness AI, automation, and orchestration?

Moderator: Gábor Varjas, Group Chief Information Security Officer, MOL Group

Connect Discussion 3 | What cyberthreats are on the rise?

Moderator: Boldizsár Bencsáth , Assistant Professor, Laboratory of Cryptography and System Security

Connect Discussion 4 | What is the impact of expanded technology reach?

Moderator: István Hagen, CISO, Bonafarm Group

Connect Discussion 5 | Platform disruption — security innovation at scale

Moderator: Dr. Lajos Muha, Professor, CISO, Hungarian State Treasury

Connect Discussion 6 | Risk – from insider threat to the NIS Directive

Moderátor: Tibor Földi, Head of IT Security, CIG Pannónia Életbiztosító Nyrt.



Connect Session's Summary by Moderators


Closing Remarks


Szabolcs Uveges

Senior Conference Manager

+36 209 674 428

Miklos Anosi

Account Manager

+36 1 473 2370

About IDC

55 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit