www.idc.com
Open in
urlscan Pro
34.234.26.208
Public Scan
Submitted URL: https://www.idc.com/event/ITSecGCC
Effective URL: https://www.idc.com/mea/events/69004-idc-it-security-roadshow-gcc
Submission: On October 14 via manual — Scanned from DE
Effective URL: https://www.idc.com/mea/events/69004-idc-it-security-roadshow-gcc
Submission: On October 14 via manual — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* MEA * Events * Upcoming Close event detail * Overview * Agenda * Speakers * Partners * General Information * CIO Masterclass * More... * Register Now MENU * Overview * Agenda * Speakers * Partners * General Information * CIO Masterclass IDC GCC SECURITY ROADSHOW REIMAGINING SECURITY AND DIGITAL TRUST FOR THE 'DIGITAL-FIRST' ORGANIZATION HYBRID Event | November 4, 2021 Register Now OVERVIEW Organizations across the region are increasingly embracing a “digital-first” approach and accelerating their digital initiatives as they bid to remain resilient and navigate the uncertainties of the pandemic-induced crisis. Increasing demand from customers for digital and contactless services — as well as the rapid shift to cloud-based environments, the proliferation of remote and distributed work models, and the acceleration of digital innovation supported by emerging technologies and app development — have together caused a huge expansion of the attack surface, with perimeters becoming more fluid and dynamic than ever before. At the same time, the threat landscape has increased in sophistication, bringing new and unprecedented threats to the fore. According to IDC, overall annual cybersecurity spending in the Middle East, Turkey, and Africa will top $4 billion by 2023 as it increases at a CAGR of 7.2% over the 2020-25 period. Today, digital trust — which incorporates not only cybersecurity but also privacy, risk, and ethics — is emerging as a key priority for digital-first organizations and consumers, business leaders, and technology suppliers, who must expand their understanding of trust and its importance if they are to success in the new digital economy. The GCC edition of the IDC Security Roadshow 2021 will explore the latest developments in the region's security market, take an in-depth look at some of today’s hottest security-related topics, address the challenges organizations are facing in a rapidly changing threat landscape, and provide expert strategic guidance for the security professionals in attendance. AGENDA Download Complete Agenda Time Event & Speakers 11:00 11:05 WELCOME ADDRESS 11:05 11:15 THE FUTURE OF ZERO TRUST IS DIGITAL INTEGRITY Pete Lindstrom Vice President, Security Strategies, IDC Cybersecurity has changed significantly over the past year as organizations have been driven to assess and update their IT environments. Increasing cloud architectures with remote access for many have driven Cyber strategists everywhere to finally move from a defense-in-depth perimeter model to one that employs Zero Trust. But strategies in security are easy – what we really need is a plan. This session will provide key insights into the ways to translate strategy into architectural reality and the important steps needed to develop a robust zero trust architecture. Along the way, we will describe ways to enhance and develop that zero trust strategy into an even more robust environment that incorporates the concepts of digital integrity. 11:15 11:30 SECURING THE FUTURE OF WORK WITH CYBER AI ASK QUESTIONS IN THE Q&A TAB AND STAND A CHANCE TO WIN RAFFLE VOUCHERS 11:30 11:45 SUPPLY CHAIN SECURITY ASK QUESTIONS IN THE Q&A TAB AND STAND A CHANCE TO WIN RAFFLE VOUCHERS 11:45 12:00 SECURING THE JOURNEY TO DIGITAL TRANSFORMATION Last year forced more & more companies to change the way they operate and run their businesses. Technology and Security teams have had to rapidly shift their focus to align with the business, in order to secure it & “keep the lights on”. Join this session to get insights into what are the key enablers for such companies to successfully transition into this New World. Empowering them to keep up with Technological, Digital & Cultural Transformation which is disrupting the world. ASK QUESTIONS IN THE Q&A TAB AND STAND A CHANCE TO WIN RAFFLE VOUCHERS 12:00 12:15 CYBER DATA DEFENSE STRATEGIES & RECOVERY (CRS) ASK QUESTIONS IN THE Q&A TAB AND STAND A CHANCE TO WIN RAFFLE VOUCHERS 12:15 12:30 WHY XDR IS A MUST? The session will discuss what is XDR? And why is it a cornerstone of Information Security environment with different maturity levels? ASK QUESTIONS IN THE Q&A TAB AND STAND A CHANCE TO WIN RAFFLE VOUCHERS 12:40 14:30 TRACK SESSIONS (PARALLEL SESSIONS) Track A: Security: Risk, Resilience, and Governance Ranjit Rajan, VP & Head of Research, IDC META 12:40 - 12:55 The Untold Truth About the Threat Landscape and What You Can Do About It Milad Aslaner Senior Director, Cyber Defense Strategy, SentinelOne 12:54 - 12:55 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 12:55 - 13:10 Cyber Security Threats Ameet Naik CyberSecurity Expert, Cloudflare 13:09 - 13:10 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 13:10 - 13:25 The Perils of an EDR-first Strategy: Why Prevention Is Always Better Than Cure Baldeep Dogra Director, Solutions Marketing, BlackBerry 13:24 - 13:25 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 13:25 - 13:40 Ransomware as APT 13:39 - 13:40 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers Track B: Defense in Depth: The Future of Trust Uzair Mujtaba, Program Manager (Saudi Arabia), IDC 12:40 - 12:55 Secure SD-WAN Use Cases and Innovations 12:54 - 12:55 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 12:55 - 13:10 Evidence-based Foundation For Your Modern Security Stack 13:09 - 13:10 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 13:10 - 13:25 Modern Practices in Intelligence Services Emad Haffar Director, Security Consultant Team, META, Kaspersky 13:24 - 13:25 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 13:25 - 13:40 Silver Linings: Immune System Technology for Cloud & SaaS Mariana Pereira Director of Email Security Products, Darktrace 13:39 - 13:40 Ask Questions in the Q&A Tab and Stand a Chance to win Raffle Vouchers 13:40 14:30 MEET THE PARTNERS, NETWORK AND INCREASE YOUR SCORES 14:30 14:35 CLOSE OF EVENT SPEAKERS Pete Lindstrom Vice President, Security Strategies, IDC Milad Aslaner Senior Director, Cyber Defense Strategy, SentinelOne Ameet Naik CyberSecurity Expert, Cloudflare Baldeep Dogra Director, Solutions Marketing, BlackBerry Emad Haffar Director, Security Consultant Team, META, Kaspersky Mariana Pereira Director of Email Security Products, Darktrace Become a Speaker PARTNERS Gold Partner Gold Partner Gold Partner Gold Partner Gold Partner Become a Partner GENERAL INFORMATION Digital Event Thursday, November 4 11:00AM (Gulf Standard Time) Language English Registration Fee Free of Charge: For End Users (not IT + Consultant companies) Contact For More Information, contact: Ramaa Bhardi - Conference Manager, META Events Mobile: +971 564424618 | Email: rbhardi@idc.com CIO MASTERCLASS Tim Youngblood Former CISO, McDonald's (USA) Rasha M. Abu AlSaud Executive Vice President, Chief Information Security Officer, Leading Bank in Saudi Arabia Saqib Chaudhry Head of Digital Innovation and Development, Cleveland Clinic Abu Dhabi Aytekin Güzeliş Group Manager, Security Governance, Allianz Turkey Samresh Ramjith Deputy CISO, ABSA Group (South Africa) Yahyah Pandor CIO, Fine Hygienic Holding Eng. Ashish Khanna Information Security Officer, UAE Health Regulator Anoop Kumar Information Security Manager, Gulf News Taimur Ijlal Head of Cloud Security & DevSecOps, Network International L.L.C. CONTACT US Shabana Mahadiwala AVP Conferences +971 56 414 5986 Email ABOUT IDC 57 Years | 1100 Analysts | 110 Countries International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com. Copyright 2021 IDC. All rights reserved. Darktrace Darktrace is a leading autonomous cybersecurity AI company and the creator of autonomous response technology. Its self-learning AI is modeled on the human immune system and used by over 4,700 organizations to protect against threats to the cloud, email, SaaS, traditional networks, IoT devices, endpoints, and industrial systems. Headquartered in Cambridge, UK, the company has more than 1,500 employees. Every second, Darktrace AI fights back against a cyberthreat before it can cause damage. Kaspersky Kaspersky is a global cybersecurity company founded in 1997. Kaspersky’s deep threat intelligence and security expertise is constantly creating innovative security solutions and services that guard businesses, critical infrastructure, governments, and consumers from sophisticated and evolving digital threats. The company’s comprehensive endpoint protection and specialized security solutions protect over 400 million users and 270,000 corporate clients across the world. BlackBerry BlackBerry (NYSE: BB; TSX: BB) provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including 150M cars on the road today. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security management, encryption, and embedded systems. BlackBerry’s vision is clear - to secure a connected future you can trust. BlackBerry. Intelligent Security. Everywhere. For more information, visit BlackBerry.com and follow @BlackBerry Cloudflare Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Cloudflare’s platform protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine’s Top Company Cultures 2018 list and ranked among the World’s Most Innovative Companies by Fast Company in 2019. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, Seattle, WA, New York, NY, San Jose, CA, Washington, D.C., Lisbon, London, Munich, Beijing, Singapore, Sydney, and Tokyo. To learn more, visit www.cloudflare.com SentinelOne SentinelOne is the only cybersecurity solution encompassing AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. To learn more visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook. Silver Linings: Immune System Technology for Cloud & SaaS Cloud and SaaS platforms have created digital environments where businesses can innovate, collaborate, and share more than ever before. However, this is often at the cost of visibility and control. This session will explore the challenges of securing cloud and SaaS applications and explain why self-learning AI is best-in-class when it comes to protecting organizations' dynamic workforces and constantly-changing digital infrastructure. Join us to discover how self-learning AI thwarted developer misuse of AWS cloud infrastructure, attempted infiltration via an Office 365 account, and threat actors targeting a vulnerability with Shodan. Secure SD-WAN Use Cases and Innovations The Digital Transformation had led businesses to transform their WAN edge to improve network performance and application experience. Secure SD-WAN continues to immerge as the technology of choice to enable this transformation by aligning the edge architecture to address the new and challenging business requirements. This session showcases some of the use cases, innovations, and differentiators offered by the secure SD-WAN solutions. The Perils of an EDR-first Strategy: Why Prevention Is Always Better Than Cure The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run, and outsmart most security systems. To combat these and other threats, enterprises are increasingly turning to endpoint detection and response (EDR) solutions that provide advanced endpoint protection. To be sure your endpoints aren’t the weak link against cyber threats, it’s time to embrace the new approach to EDR, with a prevent-first approach built on a strong artificial intelligence (AI) foundation for threat prevention. Cyber Security Threats Cyber security threats are on the rise and with digitalization of every aspect of business, IT administrators have to sweat it out to keep the attacks and hackers at bay. A round-the-clock monitoring of IT and Business security is necessitated to provide a safe and secure environment for both internal and external users. Take a look at the top 10 cyber security threats in 2021 and how to mitigate them. The Untold Truth About the Threat Landscape and What You Can Do About It Every day we hear that the threat landscape has evolved and that organizations need to make changes to their security solutions. But what has really evolved? And what changes do we actually require? This presentation will dissect what is happening in real life and explain which changes are critical versus those that are simply nice to have.