IT Security Summit
Agenda
IT Security Summit
One Day Event
Registration & Networking
IDC Welcome Address
Shilpi Handa
Associate Research Director (META), IDC
IDC Keynote: Orchestrating Resilience Amid Transformation, Regulation, and Emerging Threats
META’s cybersecurity agenda is shaped by unprecedented digital acceleration, regulatory dynamism, and the proliferation of advanced threats across IT, OT, and cloud. As organizations embrace AI, platform-centric architectures, and hybrid environments, the attack surface expands and adversaries become more sophisticated—leveraging GenAI, identity compromise, and cyber-physical exploits. At the same time, regulatory mandates around data sovereignty and trust are intensifying. CISOs are challenged to orchestrate holistic defense strategies that unify technology, process, and people: integrating real-time detection, adaptive controls, and continuous compliance, while investing in workforce upskilling and AI augmentation. Achieving resilience in this environment demands a proactive, inclusive approach—balancing innovation, operational continuity, and regulatory alignment across the region’s diverse digital landscape.
Shilpi Handa
Associate Research Director (META), IDC
Sovereign Security: Localizing Talent, Data, and Infrastructure
Middle East organizations are embedding digital sovereignty into their transformation strategies by localizing talent, infrastructure, and AI systems. Sovereign security platforms ensure sensitive data is stored and governed within national borders, reducing exposure to foreign jurisdiction and geopolitical risks. This approach is central to national security, public sector modernization, and technological independence.
AI-Powered Threat Detection and Response
Security service providers in the Middle East are integrating large language models and behavioral analytics to deliver real-time, AI-powered threat detection and response. These systems accelerate threat hunting, automate incident classification, and enable proactive defense against advanced cyber threats, transforming SOC operations and improving regulatory compliance.
Zero Trust Security Models for Government and BFSI
Zero trust security is gaining traction in government and BFSI sectors, driven by regulatory mandates and the need for robust data protection. Middle East governments are updating privacy laws and deploying zero trust frameworks to ensure continuous verification, minimize attack surfaces, and comply with evolving regulations.
Cloud Security: Compliance, Visibility, and Resilience
Cloud security strategies in the region focus on regulatory compliance, data sovereignty, and operational resilience. Organizations are prioritizing local cloud regions, hybrid architectures, and sovereign controls to meet data residency requirements, reduce latency, and ensure visibility across distributed environments.
DFIR in the Age of AI Acceleration
Discuss the evolution of how attackers always adapt to security controls and how AI is now accelerating these attacks. AI doesn’t introduce “new” attacks but lowers the entry barrier for attacks by making it faster, realistic, and variable. Whereas, defenders can also use AI to accelerate parts of investigation, but this shift changes how DFIR operates, requiring more context driven analysis rather than relying purely on patterns.
Notis Iliopoulos
EVP of MRC, Obrela
Unlocking Your Unfair Advantage Against AI Adversaries
Attackers use AI to strike in minutes. To adapt, we must shift our perspective from manual reaction to automated mobilization. This session demonstrates how to utilize a ‘virtual crew’ of AI agents to ingest intelligence, build attack playbooks, simulate threats to find gaps, and mobilize fixes.
Tarek Kuzbari
Vice President EMEA, Picus Security
Tea/ Coffee & Networking Break
Platinum Tracks (Parallel Sessions)
11:15 AM Start of Session Raffle
Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win Raffle prizes.
Platinum Track A
11:20 am – 11:35 am
Data Privacy and Protection: Navigating New Regulations
11:35 am – 11:50 am
Managed Detection and Response (MDR): The Digital Control Plane
11:50 am – 12:05 pm
AI-Driven Security Automation and Orchestration
Platinum Track B
11:20 am – 11:35 am
Cybersecurity Talent Development and Certification
11:35 am – 11:50 am
Supply Chain Security: Mitigating Third-Party Risks
11:50 am – 12:05 pm
Incident Response and Digital Forensics
Platinum Track C
11:20 am – 11:35 am
Security Analytics and Threat Intelligence Platforms
11:35 am – 11:50 am
Regulatory Compliance: Governance and Beyond
11:50 am – 12:05 pm
Healthcare Cybersecurity: Protecting Patient Data and Services
Gold Tracks (Parallel Sessions)
Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win Raffle prizes.
Gold Track A
12:05 pm – 12:20 pm
Banking Sector Resilience: API Security and Open Banking
12:20 pm – 12:35 pm
GenAI Risks and Opportunities in Cybersecurity
12:35 pm – 12:50 pm
Security Awareness and Culture Building
12:50 pm – 1:20 pm
End User Panel Discussion: Secure AI in Action: Lessons from CISOs
Gold Track B
12:05 pm – 12:20 pm
Cloud-Native Security Architectures
12:20 pm – 12:35 pm
Quantum Readiness: Preparing for the Next Encryption Frontier
12:35 pm – 12:50 pm
Cybersecurity Talent Development and Certification
12:50 pm – 1:20 pm
End User Panel Discussion: Identity Security: The New Battleground
Gold Track C
12:05 pm – 12:20 pm
Supply Chain Security: Mitigating Third-Party Risks
12:20 pm – 12:35 pm
Incident Response and Digital Forensics
12:35 pm – 12:50 pm
Security Analytics and Threat Intelligence Platforms
12:50 pm – 1:20 pm
End User Panel Discussion: AI and Automation: Transforming Security Operations
Gold Track D
12:05 pm – 12:20 pm
Regulatory Compliance: Governance and Beyond
12:20 pm – 12:35 pm
Healthcare Cybersecurity: Protecting Patient Data and Services
12:35 pm – 12:50 pm
Banking Sector Resilience: API Security and Open Banking
12:50 pm – 1:20 pm