IT Security Summit & Awards Qatar
Agenda
IT Security Summit & Awards Qatar
One day event
Registration & Networking
IDC Welcome Address
Shilpi Handa
Associate Research Director (META), IDC
Redesigning Security: Sovereignty, AI, and Resilience in Focus
Qatar’s security strategy centers on sovereign cloud adoption, regulatory alignment, and AI-driven resilience. National frameworks and cloud-first policies ensure data residency and privacy, supporting secure digital transformation in government, BFSI, healthcare, and energy. Organizations are investing in automation, threat intelligence, and compliance, with a strong emphasis on local infrastructure and talent to build robust, sector-specific security postures.
Sovereign Security: Localizing Talent, Data, and Infrastructure
Middle East organizations are embedding digital sovereignty into their transformation strategies by localizing talent, infrastructure, and AI systems. Sovereign security platforms ensure sensitive data is stored and governed within national borders, reducing exposure to foreign jurisdiction and geopolitical risks. This approach is central to national security, public sector modernization, and technological independence.
AI-Powered Threat Detection and Response
Security service providers in the Middle East are integrating large language models and behavioral analytics to deliver real-time, AI-powered threat detection and response. These systems accelerate threat hunting, automate incident classification, and enable proactive defense against advanced cyber threats, transforming SOC operations and improving regulatory compliance.
Zero Trust Security Models for Government and BFSI
Zero trust security is gaining traction in government and BFSI sectors, driven by regulatory mandates and the need for robust data protection. Middle East governments are updating privacy laws and deploying zero trust frameworks to ensure continuous verification, minimize attack surfaces, and comply with evolving regulations.
Cloud Security: Compliance, Visibility, and Resilience
Cloud security strategies in the region focus on regulatory compliance, data sovereignty, and operational resilience. Organizations are prioritizing local cloud regions, hybrid architectures, and sovereign controls to meet data residency requirements, reduce latency, and ensure visibility across distributed environments.
Identity and Access Management (IAM): The Only Perimeter
With identity attacks on the rise, IAM is now the primary security perimeter. Organizations are shifting to platform-based IAM solutions, integrating advanced authentication, access controls, and behavioral analytics to defend against credential theft and insider threats.
Operational Technology (OT) Security for Critical Infrastructure
Energy, utilities, and manufacturing sectors are strengthening OT security to counter sophisticated cyber threats. The focus is on segmenting networks, deploying real-time monitoring, and integrating AI-driven analytics to protect critical infrastructure and ensure regulatory compliance.
Tea/Coffee & Networking Break
Platinum Tracks (Parallel Sessions)
11: 15 AM- Session Overview
Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16
Platinum Track A
Data Privacy and Protection: Navigating New Regulations
Managed Detection and Response (MDR): The Digital Control Plane
AI-Driven Security Automation and Orchestration
Platinum Track B
Cybersecurity Talent Development and Certification
Supply Chain Security: Mitigating Third-Party Risks
Incident Response and Digital Forensics
Platinum Track C
Security Analytics and Threat Intelligence Platforms
Regulatory Compliance: Governance and Beyond
Healthcare Cybersecurity: Protecting Patient Data and Services
Gold Tracks (Parallel Session)
12: 05 PM- Session Overview
Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win iPhone 16