Agenda

IT Security Summit & Awards Qatar

Agenda

IT Security Summit & Awards Qatar

One day event

8:00 am

Registration & Networking

9:00 am

IDC Welcome Address

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:05 am

Redesigning Security: Sovereignty, AI, and Resilience in Focus

Qatar’s security strategy centers on sovereign cloud adoption, regulatory alignment, and AI-driven resilience. National frameworks and cloud-first policies ensure data residency and privacy, supporting secure digital transformation in government, BFSI, healthcare, and energy. Organizations are investing in automation, threat intelligence, and compliance, with a strong emphasis on local infrastructure and talent to build robust, sector-specific security postures.

9:20 am

Sovereign Security: Localizing Talent, Data, and Infrastructure

Middle East organizations are embedding digital sovereignty into their transformation strategies by localizing talent, infrastructure, and AI systems. Sovereign security platforms ensure sensitive data is stored and governed within national borders, reducing exposure to foreign jurisdiction and geopolitical risks. This approach is central to national security, public sector modernization, and technological independence.

9:40 am

AI-Powered Threat Detection and Response

Security service providers in the Middle East are integrating large language models and behavioral analytics to deliver real-time, AI-powered threat detection and response. These systems accelerate threat hunting, automate incident classification, and enable proactive defense against advanced cyber threats, transforming SOC operations and improving regulatory compliance.

9:55 am

Zero Trust Security Models for Government and BFSI

Zero trust security is gaining traction in government and BFSI sectors, driven by regulatory mandates and the need for robust data protection. Middle East governments are updating privacy laws and deploying zero trust frameworks to ensure continuous verification, minimize attack surfaces, and comply with evolving regulations.

10:10 am

Cloud Security: Compliance, Visibility, and Resilience

Cloud security strategies in the region focus on regulatory compliance, data sovereignty, and operational resilience. Organizations are prioritizing local cloud regions, hybrid architectures, and sovereign controls to meet data residency requirements, reduce latency, and ensure visibility across distributed environments.

10:25 am

Identity and Access Management (IAM): The Only Perimeter

With identity attacks on the rise, IAM is now the primary security perimeter. Organizations are shifting to platform-based IAM solutions, integrating advanced authentication, access controls, and behavioral analytics to defend against credential theft and insider threats.

10:35 am

Operational Technology (OT) Security for Critical Infrastructure

Energy, utilities, and manufacturing sectors are strengthening OT security to counter sophisticated cyber threats. The focus is on segmenting networks, deploying real-time monitoring, and integrating AI-driven analytics to protect critical infrastructure and ensure regulatory compliance.

10:45 am

Tea/Coffee & Networking Break

11:15 am

Platinum Tracks (Parallel Sessions)

11: 15 AM- Session Overview

Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16

Platinum Track A

11:20 am – 11:35 am

Data Privacy and Protection: Navigating New Regulations

11:35 am – 11:50 am

Managed Detection and Response (MDR): The Digital Control Plane

11:50 am – 12:05 pm

AI-Driven Security Automation and Orchestration

Platinum Track B

11:20 am – 11:35 am

Cybersecurity Talent Development and Certification

11:35 am – 11:50 am

Supply Chain Security: Mitigating Third-Party Risks

11:50 am – 12:05 pm

Incident Response and Digital Forensics

Platinum Track C

11:20 am – 11:35 am

Security Analytics and Threat Intelligence Platforms

11:35 am – 11:50 am

Regulatory Compliance: Governance and Beyond

11:50 am – 12:05 pm

Healthcare Cybersecurity: Protecting Patient Data and Services

12:05 pm

Gold Tracks (Parallel Session)

12: 05 PM- Session Overview

Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16

Gold Track A

12:05 pm – 12:20 pm

Banking Sector Resilience: API Security and Open Banking

12:20 pm – 12:35 pm

GenAI Risks and Opportunities in Cybersecurity

12:35 pm – 12:50 pm

Security Awareness and Culture Building

12:50 pm – 1:20 pm

End User Panel Discussion: Secure AI in Action: Lessons from CISOs

Gold Track B

12:05 pm – 12:20 pm

Cloud-Native Security Architectures

12:20 pm – 12:35 pm

Quantum Readiness: Preparing for the Next Encryption Frontier

12:35 pm – 12:50 pm

Sovereign Security: Localizing Talent, Data, and Infrastructure

12:50 pm – 1:20 pm

End User Panel Discussion: Cloud Security: Balancing Innovation and Compliance

Gold Track C

12:05 pm – 12:20 pm

AI-Powered Threat Detection and Response

12:20 pm – 12:35 pm

Zero Trust Security Models for Government and BFSI

12:35 pm – 12:50 pm

Cloud Security: Compliance, Visibility, and Resilience

12:50 pm – 1:20 pm

End User Panel Discussion: AI and Automation: Transforming Security Operations

Gold Track D

12:05 pm – 12:20 pm

Identity and Access Management (IAM): The Only Perimeter

12:20 pm – 12:35 pm

Operational Technology (OT) Security for Critical Infrastructure

12:35 pm – 12:50 pm

Data Privacy and Protection: Navigating New Regulations

12:50 pm – 1:20 pm

End User Panel Discussion: Identity Security: The New Battleground

1:20 pm

IDC CISO Excellence Awards Ceremony

2:20 pm

Mega Raffle Announcement

2:25 pm

Lunch & Close of Summit

Be Part of it!

REGISTER NOW