READ MORE COOKIE SETTINGS
|Time||Event & Speakers|
Registration, Welcome coffee, Partner's Exhibition
Welcome Note, Opening of The Conference
Regional Director, IDC SEE
Business Security: Risk & Resilience
Country Manager, IDC Hungary
PSD2 and Its Cybersecurity Challenges
Business Information Security Officer, K& H Bank
Addressing the Cyber Threats on the Horizon by adapting a Simple, Open and Integrated Threat Defense Architecture
Regional Sales Manager for Cisco Cyber Security Sales for Eastern Europe
Organizations face multi-vector, multi-stage threats and IT Leaders are not confident in their ability to prevent the next big breach.
From Cloudy to Clear Skies: Multi-cloud Security Clarified
Cyber Security Evangelist, Juniper Networks
Cloud technologies are one of the fastest growing segments of IT as organizations strive to improve their competitive positioning and take advantage of efficiencies and scalability the cloud provides. This digital transformation trend presents new risks and forces security leaders to reconsider data and system protection as they move to a multi-cloud reality which spans across private and public environments. Prevention, detection, and response in the multi-cloud era are particularly challenging due to the dynamic nature of infrastructure, workflows, and data locations. The session will describe the main security challenges across the key domains of data and application, and discuss infrastructure related technologies such as micro-segmentation and workflow visibility.
One-to-One Meetings, Coffee break
Business Security: security function as business enabler?
Dr. Erik Vaskeba
Business Security Officer, Telenor Hungary
Privileged Access Management for the Real World
PAM and Log Management Technology Strategist at One Identity
Az IT biztonsági menedzserek számára a kiemelt jogosultságok menedzsmentje több okból is kihívást jelentő feladat. A privilegizált hozzáférés- kezelő (Privileged Access Management - PAM) megoldások általában komplexek, hosszadalmas a telepítésük, és az üzemeltetésük is nehézkes. Az előadás azokat a legjobb gyakorlatokat és realisztikus megközelítéseket mutatja be, amelyek elősegítik a biztonságos, átlátható és kontrollálható hozzáférés kezelési eljárásokat, és kielégítik napjaink felhasználói igényeit.
Agile Harmonisation of IT, Security and Compliance in Digital Transformation Journeys
Chief Technical Security Officer EMEA, Qualys
Organisations undertaking digital transformation journeys are often facing challenges in structuring the processes efficiently to cope with dissolving barriers, ever changing IT landscape and a security posture that requires augmented capabilities. We'll analyse in theory and practice how to evolve a traditional waterfall approach towards an agile one, to empower orchestration and communication among silos to achieve a single source of truth.
In the cloud, an exposure is only a single API misconfiguration away….
Security Engineer, Check Point Software Technologies Ltd.
As more and more workloads move to the cloud, it is getting increasingly complex to protect these workloads. The top three security challenges companies usually face with is visibility into cloud infrastructure security, compliance, and setting consistent security policies across cloud and on-premises environments. During the presentation we will discuss the challenges and introduce the possibilities with Check Point CloudGuard Dome9.
Maybe it’s Better to Never Make Predictions, Especially About the Future
Regional Manager, Fortinet
For the past several months social media and the Internet in general has been overloaded with all sorts of dire predictions about the future of the threat landscape. However, if all of these were taken at face value then organizations might as well either close up shop or go back to print advertising and taking orders by paper purchase orders.
Interactive Panel Discussion
One-to-One Meetings, Buffet Lunch
Afternoon Key-note Presentation
Dr. Lajos Muha
Professor, CISO, Magyar Államkincstár
Being Risk Averse In A Digitally Transforming Enterprise. Fiction or Reality?
Territory Major Account Manager, Hungary & Adriatics, Kaspersky Lab
Have you struggled to articulate the Return on Investment ( ROI) and measure your performance ( KPIs) in Cyber security? If so, you are not alone! To justify the investment in security , you must assess and prioritise your organisation’s risks. Risks can not be completely eliminated , only mitigated. Security professionals will need to determine the risks adequately addressed by current controls, the remaining security gaps, whether risks are sufficiently prioritised and the level of remaining exposure. Risk assessment and mitigation process requires great deal of intelligence based on global , actionable , timely data! Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking. Enterprises across all sectors are facing a shortage of the up-to-the-minute, relevant data they need to help them manage the risks associated with IT security threats. Kaspersky Lab’s knowledge, experience and deep intelligence on every aspect of cybersecurity has made it the trusted partner of the world’s premier law enforcement and government agencies, including INTERPOL and leading CERTs. You can leverage this intelligence in your organization today.
Achieving Continuous Compliance and Fast Remediation
Regional Director CEE, Skybox Security
IT teams receive tons of change requests daily, compliance requests are getting more and more challenging and the number of IT security incidents is constantly increasing. Meanwhile companies are facing lack of resources and an even higher lack of visibility over their entire network. But how do you protect something you don´t even know? Learn how Skybox can provide you automation and visibility but saving you valuable resources at the same time by focusing on the most important vulnerabilities in your network.
Scaling Up Endpoint Prevention, Detection and Response: A Success Story At A Large Telco
Strategy & Technology Advisor, Panda Security
The cybersecurity landscape today presents a sharp contrast between the myriad providers and offerings to address an increasingly complex environment, and the chronic shortage of professionals able to handle them. To face both the security complexities and the skills shortage, Panda Security proposes the Adaptive Defense approach, integrating products, technologies and services, ensuring maximum protection and visibility, together with transparency and simplicity for the customer. A dramatic reduction in the number of infections, and a growing list of major wins are proving the success of the approach.
One-to-One Meetings, Coffee break
IDC Connect Sessions: moderated workshops in small groups
Head of Banking Security Department, Raiffeisen Bank
Gábor L. Varjas
Group Chief Information Security Officer, MOL Group
Dr. Boldizsár Bencsáth
Assistant Professor, Laboratory of Cryptography and System Security
CISO, Bonafarm Zrt.
Business Development Manager, Flowmon Networks
Dr. Lajos Muha
Professor, CISO, Magyar Államkincstár
Head of IT Security, CIG Pannónia Életbiztosító Nyrt.
Connect Discussion 1 | How is digital transformation altering business and security?
Moderator: Péter Jakab, Head of Banking Security Department, Raiffeisen Bank
Connect Discussion 2 | How to harness AI, automation, and orchestration?
Moderator: Gábor Varjas, Group Chief Information Security Officer, MOL Group
Connect Discussion 3 | What cyberthreats are on the rise?
Moderator: Boldizsár Bencsáth , Assistant Professor, Laboratory of Cryptography and System Security
Connect Discussion 4 | What is the impact of expanded technology reach?
Moderator: István Hagen, CISO, Bonafarm Group
Connect Discussion 5 | Platform disruption — security innovation at scale
Moderator: Dr. Lajos Muha, Professor, CISO, Hungarian State Treasury
Connect Discussion 6 | Risk – from insider threat to the NIS Directive
Moderátor: Tibor Földi, Head of IT Security, CIG Pannónia Életbiztosító Nyrt.
Connect Session's Summary by Moderators
55 Years | 1100 Analysts | 110 Countries
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.