This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.

READ MORE COOKIE SETTINGS

Agenda

Time Event & Speakers
08:30

Registration & Networking

09:00

Welcome Address

09:10

Security Metrics for the Digital Era

Megha Kumar
Research Director, Software, Middle East & Africa

Organizations in the Middle East, Turkey, and Africa are increasingly trying to find a balance between keeping the lights on and improving business agility. National-level strategies and shifting industry dynamics are driving organizations in the region to innovate and experiment with new types of technologies, and thereby change IT and business-wide processes. IT security is no longer limited to protecting technology assets; today, security also aims to ensure business resiliency. As digital transformation initiatives progress, organizations will need to build business-level strategies for security. This presentation will examine the current state of the security landscape and explain how risk, trust, and consent must be built into security strategies as we enter an era of multiplied innovation.

09:40

Using Intelligence to Build a Resilient Organization

Effective cyberdefense requires a holistic security approach incorporating broad process and technology strategies. To be fully prepared and decrease the probability of targeted attacks, future potential threats need to be considered as well. This session will look at how threat intelligence can help organizations identify ongoing security threats and take precautions against future dangers

10:05

Driving Security via Platforms

Most large organizations have to manage 50+ security products and 20+ providers. Security platforms and security ecosystems offer comprehensive, integrated solutions from a single vendor, or integrated solutions via an app marketplace. This presentation will evaluate whether this is the way to solve the scale and complexity challenge.

10:30

End User Presentation: Digital Transformation & Its Effects on Business Security

As organizations introduce innovative technologies into their ecosystems, they are simultaneously creating new types of risks and vulnerabilities. This presentation will provide an end-user perspective on the steps organizations can take to ensure business security as they engage in digital transformation.

11:00

Tea/Coffee & Networking Break

11:25

Addressing the Security of Critical Systems

Industrial control systems (or OT systems) are increasingly susceptible to a vast range of digital threats. However, the approaches to managing the security and risks of OT systems are different from regular systems. This presentation will examine the commonalities between OT and IT systems and highlight how to bridge the existing differences

11:40

Security & the Extended OT Environment

Many OT environments are getting connected to IT networks as well as the wider Internet of Things (IoT) ecosystem. This rise in Industrial IoT further requires organizations to address new types of security threats and implement new governance processes. This session will provide guidance on how to address security within the extended OT ecosystem.

12:05

Panel Discussion: Best Practices Around OT Security

In this session our panelists will discuss best practices for introducing and improving OT security within organizations. In particular, they will focus on the strategies that organizations should adopt given the rising prevalence of industrial IoT solutions.

12:50

Lunch & Networking

13:35

New-Age Cyberthreats

This presentation will examine the expanding threat landscape and provide an in-depth look at the new types of threats set to plague organizations in the region. It will also show how IT security decision makers can protect themselves against these threats and build proper remediation plans.

13:50

Addressing Security Complexity in the Digital Era

Security complexity continues to be a concern for organizations, especially as new threats require new types of strategies. This presentation will provide guidance on security management and highlight how a platform-based approach is critical for addressing security.

14:05

Panel Discussion: Building an Effective Security Strategy.

This discussion will provide guidance on building effective security strategies that can adapt to rising threat complexities. It will also offer advice on managing security and building effective response plans.

14:45

Modern Data Security Strategies

Hadi Jaafarawi
Managing Director – Qualys Middle East

Risk comes in multiple forms: operational, strategic, reputational, and regulatory. This presentation will examine how to assess these forms and take a structured, risk-based approach to cybersecurity.

15:00

The Rise of Insider Risk

Risk comes in multiple forms: operational, strategic, reputational, and regulatory. This presentation will examine how to assess these forms and take a structured, risk-based approach to cybersecurity.

15:15

Panel Discussion: Ensuring Effective Data Security & Insider Risk Management

This panel will look at strategies for effectively addressing data security in line with growing compliance requirements. Given that insider risk is a major concern when it comes to securing data, the panel will also provide guidance on how to implement effective strategies for managing insider risk strategies.

15:55

Summary & Close

16:00

Final Raffle Draw

Contacts

Ronita Bhattacharjee

Vice President, Conferences

+971 50 7872436

About IDC

55 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.