This site uses cookie including third parties cookies which helps us provide and improve our services.
Over the past 20 years, security has grown into a topic that is now analyzed, rehashed, discussed, and examined from every angle. Every stakeholder group — be it security executives, hands-on experts, software and service providers, and so on — has a value proposition that it vehemently advocates.
IDC provides a unique independent platform to discuss with experts, exchange ideas, engage in workshops, and say what’s on your mind. Everyone is invited to share and participate — giving you the opportunity to gain valuable insights!
Prof. Dr. Zoltán Rajnai
University Professor, Cybersecurity Coordinator of Hungary
Rudolf Zénó Kirch
IT Security Manager, Waberer’s International Plc.
Dr. Imre Dósa
Data Protection Officer, Legal Advisor, Budapest Bank
Head of Department, The Central Bank of Hungary
Dr. Zoltán Kovávcs
Director, Electronis Information Security Directorate, NISZ National Infocommunications Service Company Limited
Make It All Add Up: Secure Applications, Cloud & Security, Incident Response
Digital business moves fast. But agile development and rapid application rollout must be balanced with the need for secure apps. How to drive DX without the digital danger.
Whose responsibility starts and ends where? What should be in an SLA? What is shadow IT and why should we care?
Security incidents begin even before links are clicked. How to raise security awareness: security training and best practices for employees. Breach reporting to authorities and in the media.
Secure apps and agile development. Should every agile cycle end with deployment? Automating code review and integrating security into development without putting the brakes on business.
Whose responsibility starts and ends where? What should be in an SLA? How to get a grip on shadow IT? Does CASB + segmentation = job done? XaaS Security
Security incidents begin even before links are clicked. Developing cyber resilience; improving detection and remediation capabilities. Orchestrating, automating, and accelerating response.
Country Manager, CEE Regional Account Manager
Krisztián Gergely Horváth
Head of Informtion Security Department, MKB Bank
Research Analyst, Software, Central & Eastern Europe, IDC Hungary
IBM Security Technical Team Leader, IBM CEE
Regional Manager, Fortinet
Dr. Csaba Krasznay
Security Engineer, Check Point Software Technologies Ltd.
IT Security Consultant, Cisco Systems Magyarország Kft.
CISM, CRISC, Managing Director for Central Eastern Europe, Qualys
Regional Account Manager, Trend Micro
Magyarországon az IBM 1936 óta van jelen megszakítás nélkül, jelenleg közel száz üzleti partnerrel dolgozik együtt. A rendszerváltás óta a cég teljes portfólióját jelentô összes eszköz és szolgáltatás elérhetô Magyarországon is. Az IBM Magyarország a piacon egyedülálló módon kínál teljes körű üzleti és informatikai szolgáltatásokat és tanácsadást. Hagyományos portóliója keretében egyaránt forgalmaz kisebb és nagyobb teljesítményű szervereket és szoftvereket.www.ibm.com/hu
Fortinet (NASDAQ: FTNT) helps protect networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable businesses and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content. Learn more at www.fortinet.com.
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100.
Qualys helps organizations streamline their security and compliance solutions and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings.
The Qualys Cloud Platform and its integrated Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications across on-premises, endpoints and elastic clouds.
1999, Qualys has established strategic partnerships with leading managed
service providers and consulting organizations including Accenture, BT,
Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP
Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon
and Wipro. The company is also a founding member of the Cloud Security
For more information, please visit www.qualys.com
Cisco is the leading company in network services. It is changing the way people connect with each other, communicate, and collaborate. Cisco puts its customers first. Cisco seeks out long-term partnerships, finds solutions for their needs, and achieves shared success. Solutions and technologies from Cisco can be found all over the world, along its borders, and in orbit too. It includes classic networking products such as routers, switches, and servers, through which flows more than 90% of global internet traffic. It offers a range of unique devices and „smart“ systems that help to ensure security, facilitate communication between people and organizations, and build the Internet of Everything. Thanks to Cisco technology, the future begins today.
Check Point Software Technologies Ltd. (www.checkpoint.com). is the worldwide leader in securing the Internet. It is the market leader in the worldwide enterprise firewall, personal firewall and VPN markets. Through its NGX platform, the company delivers a unified security architecture for a broad range of perimeter, internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's ZoneAlarm product line is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,200 Check Point partners in 88 countries and its customers include 100% of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.
BalaBit IT Security is a developer of special network security solutions satisfying the highest standards. As the only firewall manufacturer in Central Europe, BalaBit has a leading role in the Hungarian market. The company has customers in North America, Australia, and in several European countries. BalaBit IT Security is committed to open standards and is an active member of the open source community. www.balabit.hu
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 27 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by more than 1,200 threat experts around the globe. For more information, visit TrendMicro.com.
Juniper Networks simplifies the complexities of networking with products, solutions and services in the cloud era to transform the way we connect, work and live. Through engineering and innovation, we remove the traditional constraints of networking to enable our customers and partners to deliver automated, scalable and secure networks that connect the world.
IT departments everywhere find themselves squeezed between implementing major IT initiatives and driving true bottom-line results. At Extreme, we believe your corporate network is the key to meeting both demands. We help organizations large and small leverage their networks to build stronger connections with their customers, partners, and employees… connections that result in the ultimate business outcomes: higher sales, lower operating costs, and increased share of both mind and wallet.
ISACA got its start in 1967, when a small group of individuals with similar jobs—auditing controls in the computer systems that were becoming increasingly critical to the operations of their organizations—sat down to discuss the need for a centralized source of information and guidance in the field. In 1969, the group formalized, incorporating as the EDP Auditors Association. In 1976 the association formed an education foundation to undertake large-scale research efforts to expand the knowledge and value of the IT governance and control field.
The 45 years old Computerworld is the B2B unit of the Project/029, the exclusive IDG license partner in Hungary. The Computerworld magazine, together with the www.computerworld.hu online portal and the conference unit provides deep-analysis for supporting decision making, helping the Hungarian companies to develop a competitive edge.
IT-BUSINESS is a B2B weekly magazine that provides IT and telecommunication decision makers with useful ICT background information. A free daily electronic newsletter is also related to the magazin: IT-BUSINESS TODAY contains the most important national and international ICT news of the past 24 hours.
Hotel Novotel Centrum
Visit venue website
54 Years | 1100 Analysts | 110 Countries
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.