Why Attend

Why Attend?

The Security Xchange is more than just a conference. It’s where the region’s technology leaders come together to shape the future of cybersecurity.

Security Operations

Exploring best practices and innovative strategies for managing security operations.

Application and Cloud Security

Focusing on methods and technologies for securing applications and cloud environments.

AI in Cybersecurity

Discussing advancements and applications of artificial intelligence in cybersecurity.

Network Security

Covering the latest trends and technologies in securing networks.

Supply Chain Vulnerabilities

Addressing the identification and mitigation of risks related to third-party vendors and suppliers.

Key Themes

The Security Xchange will spotlight how innovation, intelligence, and resilience are reshaping enterprises through AI, cloud modernization, agentic architectures, and cybersecurity.

Regulation, Resilience and Value Creation

Regulatory compliance is no longer a back-office burden, it’s a strategic enabler. We will explore how organizations can embed regulatory mandates (data privacy, cybersecurity laws, emerging AI/tech rules) into core operations, turning requirements into levers for resilience, stakeholder trust, and business value. Key topics include cyber-by-design, auditability, vendor accountability, and continuity in the face of disruption.

Digital Sovereignty and Trust Architecture

In South Africa’s rapidly expanding digital ecosystem, maintaining control over data, infrastructure, and vendor relationships is fundamental to national priorities. We will explore how organizations can align with sovereignty requirements — including data residency, local hosting, and reduced vendor dependency.

Future-Ready Technology and Modernization

Many enterprises struggle with fragmented IT portfolios, technical debt, and legacy constraints. This theme addresses how to modernize intelligently — consolidating platforms, improving observability, and building future-ready architectures that scale, adapt, and support secure innovation.

AI, Automation and Responsible Innovation

AI and intelligent agents are transforming how security is delivered, but with great power comes risk. We will explore pragmatically deploying AI: governance models, guardrails for misuse, prioritization of high-impact use cases, and aligning AI systems with trust, transparency, and accountability.

Operations, Analytics and Resilience Engineering

Detection, response, and recovery are now continuous cycles rather than discrete events. We’ll delve into advanced analytics, managed detection & response, orchestration, external threat visibility (supply chain, third parties), and resilience metrics to operationalize security effectiveness.

The Human Factor: Leadership and Culture

Technology alone doesn’t guarantee security. Leadership, culture, and skill development must align. We will focus on transforming teams, embedding security ownership across functions, and equipping leaders to speak the language of risk and trust to the board, CEOs, and business lines.

Incident and Trust Recovery

Breaches will happen, but what matters is how an organization responds. We will cover crisis communication, forensic response, regulatory handling, insurance, stakeholder trust restoration, and turning adversity into credibility.

Sector-Focused Security Insights

Different industries and environments in South Africa pose unique security demands. We will focus on securing critical infrastructure (energy, utilities), connected devices and IoT, healthcare, finance, and rapidly evolving environments such as smart cities, industrial systems, and large-scale national development projects.

Enterprise Agentic AI:

Enterprise Agentic AI:

What’s Real, What’s Next, How it Drives Business Value

Proceedings
Enterprise Agentic AI:

Sponsored By

Logo

Overview

Agentic AI is emerging as a defining force in enterprise transformation reshaping how work is orchestrated, how people contribute, and how organizations grow. Yet most enterprises remain early in their AI maturity journey, with only 1% operating as optimized, AI-fueled organizations. As global investment accelerates and agentic systems move toward representing half of all AI spending by 2029, the gap between early adopters and laggards will widen dramatically.

 

In this exclusive CIO roundtable hosted by IDC in partnership with AWS & Sudo, we unpack the realities of adopting agentic AI in the enterprise stack, the cloud innovation strategies required for scale, and the digital transformation decisions that will determine competitiveness in the AI era. With 34% of MEA organizations planning to run AI on cloud within the next year, and cloud now serving as the foundation for modern transformation, the moment to act is now.

Agenda

Enterprise Agentic AI:

One Day Event

6:30 pm

Registration & Networking

7:00 pm

IDC Welcome Address

Melih Murat

Melih Murat

Associate Research Director, IT Services & Software (META), IDC

7:05 pm

Sudo Welcome Address

Hameedullah Khan

Hameedullah Khan

CEO, SUDO Consultants

7:10 pm

From Promise to Impact: Scaling Enterprise AI for Measurable Outcomes

Melih Murat

Melih Murat

Associate Research Director, IT Services & Software (META), IDC

7:30 pm

Building Enterprise-Ready Agentic AI on AWS

Salim Tutuncu

Salim Tutuncu

Sr. Specialist PSA – Data & AI, AWS

7:50 pm

Open Discussion: Bridging the Enterprise Readiness Gap: Preparing Cloud-Driven Organizations for Scaled Agentic AI

As enterprises accelerate digital transformation on the cloud, the shift toward agentic AI demands stronger alignment between data foundations, cloud architectures, and organizational capabilities. IDC predicts that 65% of custom-built agentic AI initiatives will be abandoned by 2028 due to underestimated complexity, highlighting the need for cloud-enabled scalability, operational governance, and the right transformation frameworks. This discussion explores how CIOs can modernize core systems, enhance cloud readiness, and build an AI-driven operating model that supports sustainable, enterprise-wide agentic AI adoption.

Melih Murat

Melih Murat

Associate Research Director, IT Services & Software (META), IDC

Salim Tutuncu

Salim Tutuncu

Sr. Specialist PSA – Data & AI, AWS

Hameedullah Khan

Hameedullah Khan

CEO, SUDO Consultants

8:20 pm

Summary & Close

8:30 pm

Dinner & Networking

Speakers

Melih Murat

Melih Murat

Associate Research Director, IT Services & Software (META)

IDC

Read Bio

Hameedullah Khan

Hameedullah Khan

CEO

SUDO Consultants

Read Bio

Salim Tutuncu

Salim Tutuncu

Sr. Specialist PSA – Data & AI

AWS

Read Bio

Venue

Atlantis, The Palm

Spice Ballroom B

Be Part of it!

Register Now

Agenda

Agenda

IT Security Summit Türkiye

One Day Event

8:00 am

Registration, Breakfast & Networking

9:00 am

IDC Welcome Address

9:05 am

Redefining Security Priorities in the Age of Generative and Agentic Intelligence

Generative and agentic AI are transforming the cybersecurity landscape, challenging traditional approaches to risk management and resilience. As threats evolve and automation becomes central, organizations must rethink priorities to balance innovation, governance, and trust. This keynote explores how AI-driven intelligence will reshape security strategies and what leaders need to do today to prepare for this paradigm shift.

Yeşim Öztürk

Yeşim Öztürk

Senior Research Manager (Türkiye), IDC

9:20 am

CISO Panel Discussion: Secure AI in Action: Lessons from CISOs

End users share real-world experiences implementing secure AI frameworks, focusing on compliance, identity, and network segmentation.

Kayıhan Altınöz

Kayıhan Altınöz

CISO, TAV Airports Holding

Ömer Lütfü Karagöz

Ömer Lütfü Karagöz

Network, System & Security Infrastructure Director, Migros,

Özgür Orhan

Özgür Orhan

CISO, Koç Holding

Ersin Uslu

Ersin Uslu

Senior Information Security & Risk Manager, Eczacıbaşı Holding

Başak Gençer Ünsalver

Başak Gençer Ünsalver

CISO, Vodafone Türkiye

9:50 am

Building Sovereign Security Ecosystems: Collaboration for Compliance

Explores how organizations can effectively navigate local data residency and sovereignty requirements by leveraging collaborative approaches. Experts will discuss strategies for integrating local talent and infrastructure to strengthen security postures, and share insights on partnering with regulators to ensure ongoing compliance. The session will highlight best practices and real-world examples of building robust, sovereign security ecosystems.

10:10 am

When AI Agents Become Admins: Securing Privileged Access in the AI Age

Ayşe Yenel

Ayşe Yenel

Co- CEO, Kron

10:25 am

Breaking the AI-Powered Attack Asymmetry

Emre Çamalan

Emre Çamalan

Security Management Manager, İşNet

10:40 am

Securing an AI-Powered Business: “Enabling AI Innovation Without Losing Data Control”

As organizations rapidly adopt AI technologies, protecting sensitive data becomes more complex than ever. This session explores how businesses can securely enable AI-driven innovation while maintaining visibility and control over critical data. Leveraging DLP and DSPM strategies, attendees will learn practical approaches to managing data risk across hybrid environments, preventing unintended data exposure to AI systems, and establishing a resilient, data-centric security framework. Real-world experiences from multinational deployments demonstrate how organizations can securely transition toward an AI-powered business model.

 

Kemal Artıkarslan

Kemal Artıkarslan

Sales Engineering Lead, Forcepoint

10:55 am

Surviving the Attack: True Cyber Resilience

Yudum Yonak

Yudum Yonak

Senior Sales Leader for Eastern Europe, CIS, and Türkiye, Cohesity

Oytun Okman

Oytun Okman

Senior Systems Engineer, Cohesity

Ünal Altınsaray

Ünal Altınsaray

Technological Infrastructure Manager, Beyçelik Holding

11:10 am

The First Hyperscaler that Invests in Türkiye

Keep your Data in Türkiye borders with Cloudflare’s Data Localisation Suite. Get Cybersecurity and Cloud Services from 9 different Datacenters in Türkiye.

Özben Miçooğulları

Özben Miçooğulları

Senior Manager, Cloudflare Türkiye & Qatar Enterprise Sales

11:45 am

Platinum Partner Sessions

Platinum Track A

11:45 am – 11:55 am

Reducing the Attack Surface: Strengthening Security with Integrated IT Management

11:55 am – 12:05 pm

Building Scalable Serverless Apps: Unlocking the Power of Edge Development Platforms

12:05 pm – 12:15 pm

Cyber Resilience: Sifting From Reactive To Ready

12:15 pm – 12:25 pm

The Secure Networking Journey

12:25 pm – 12:55 pm

Identity Security: The New Battleground

Turgay Çelik
CISO, Hayat Finans
Elif Esin Etik Uslu
Global Technology- IT Security Project Manager, Edenred Türkiye
Erkan Sertoğlu
Information Security Director, sahibinden.com
Deniz Akay Turpçu
Head of Information Security, Fuzul Holding

Platinum Track B

11:45 am – 11:55 am

Fortifying Critical Infrastructure: OT Security in a Hyperconnected World

11:55 am – 12:05 pm

Navigating Global Cyber Regulations: From Established Frameworks to Emerging Standards

12:05 pm – 12:15 pm

AI vs AI: Building Proactive Defenses Against Intelligent Threats

12:15 pm – 12:25 pm

Truth in the Age of AI: Combating Hallucinations and Disinformation

12:25 pm – 12:55 pm

AI and Automation: Transforming Security Operations

Mehmet Karabıyık
CISO, BNP Paribas Cardif
Emre Ay
Global Head of Cyber Security, Beko
Nihan Namoğlu
CISO, AgeSA & MediSA
Nejla Seyhan Susam
Cyber Defense Technologies Manager, Garanti BBVA Teknoloji
12:55 pm

Networking Lunch

2:00 pm

Gold Partner Sessions

Gold Track A

2:00 pm – 2:05 pm

Start of Session Raffle

2:05 pm – 2:15 pm

AI-Powered Threat Detection and Response

2:15 pm – 2:25 pm

Secure Browser + Zero Trust in the Insurance Industry

Cemil Keser
Cyber Security Solutions Manager, Aksigorta
2:25 pm – 2:25 pm

Trust at Machine Scale: Security Lessons from the 11th State of the Software Supply Chain Report

Mitun Zavery
RVP Solutions Engineering, Sonatype

Gold Track B

2:00 pm – 2:05 pm

Start of Session Raffle

2:05 pm – 2:15 pm

Data Security for AI

Hakan Özdamar
Sales Engineer, Forcepoint
2:15 pm – 2:25 pm

From Reactive Cybersecurity to Proactive Cyber Resilience

Cengiz Gürer
Chief Strategy and Business Development Officer, Karmasis
2:25 pm – 2:35 pm

AI-Driven Security Automation and Orchestration

2:35 pm

Silver Partner Sessions

Silver Track A

2:35 pm – 3:05 pm

Silver Partners Panel Discussion

3:05 pm – 3:35 pm

Securing the Cloud-Native Future: Architectures for Resilience and Scale

Silver Track B

2:35 pm – 3:05 pm

Silver Partners Panel Discussion

3:05 pm – 3:35 pm

Outcome-Based Security: Balancing Compliance and Budgets

3:35 pm

Mega Raffle

3:40 pm

Close of Event

Speakers EGP26

Meet Our Speakers

Uncover breakthrough insights from IDC experts and exclusive sessions featuring influential voices transforming technology and leadership today

Nagia El-Emary

Nagia El-Emary

Country Director, Egypt and META Custom Solutions

IDC

Read Bio

Ranjit Rajan

Ranjit Rajan

Vice President, Research (META)

IDC

Read Bio

Shahin Hashim

Shahin Hashim

Associate Research Director (META)

IDC

Read Bio

Jebin George

Jebin George

Senior Research Manager, Software, Cloud, and Industry Transformation (MEA)

IDC

Read Bio

Agenda EGP26

Agenda

Agenda

CIO Summit Egypt

One Day Event

8:30 am

Registration & Networking

9:00 am

IDC Welcome Address

Nagia El-Emary

Nagia El-Emary

Country Director, Egypt and META Custom Solutions, IDC

9:10 am

Opening Address: Government Affiliation

9:25 am

Advisory Council Felicitation

Keynote
One Day Event
9:35 am

IDC Keynote: Building the CIO roadmap for the agentic era

Jyoti Lalchandani | IDC

Head of WW Events & MD – META, Central Asia, India

Read Bio
Jyoti Lalchandani
10:05 am

Driving Business Value from AI Investments

10:25 am

The Evolution of the Intelligent Enterprise – Redefining Business through AI

10:45 am

Intelligent Automation and Productivity: Transforming Business Processes and Workforce Efficiency

11:00 am

Building the Data Foundation for the AI-centered Enterprise

11:15 am

Agentic AI: The Next Frontier in Cybersecurity Challenges

11:30 am

Building a Sustainable Infrastructure Backbone for the GenAI Wave

11:45 am

Tea / Coffee & Networking Break

Engage, Explore, and Network—Where Technology Meets Unforgettable Moments!

12:05 pm

Platinum Tracks (Parallel Sessions)

12:05 pm Session Overview

12:08 pm Start of Session Raffle

Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win

Track A

12:10 pm – 12:25 pm

From Hype to Reality: Delivering Impact with Agentic AI

12:25 pm – 12:40 pm

Agentic AI: Strategic Opportunities and Operational Challenges for CIOs

12:40 pm – 12:55 pm

AI Observability: End-to-End Observability for Generative AI, Agentic, and LLM Workloads

12:55 pm – 1:10 pm

The Shift From CDN to IDN: The Rise of Intelligent Delivery Networks

1:10 pm – 1:10 pm

Announcement of the Raffle Draw Winner

Track B

12:10 pm – 12:25 pm

Compliance Automation & Data Governance for AI Systems

12:25 pm – 12:40 pm

Digital Sovereignty (Navigating Cloud Choices, Data Residency, and Regulatory Requirements)​

12:40 pm –

Modernizing for Autonomy: How Migration and Platforms Enable Agentic AI

12:55 pm – 1:10 pm

The Urgent Risks of Unchecked AI Sprawl

1:10 pm – 1:10 pm

Announcement of the Raffle Draw Winner

Track C

12:10 pm – 12:25 pm

Security for Autonomous Systems

12:25 pm – 12:40 pm

Rethinking Enterprise Defense

12:40 pm – 12:55 pm

Securing Communication for Generative & Agentic AI

12:55 pm – 1:10 pm

From Innovation to Impact: Leveraging AI on Cloud

1:10 pm – 1:10 pm

Announcement of the Raffle Draw Winner

1:10 pm

Lunch & Networking

2:10 pm

Technology Focus Group Tracks – (Parallel Sessions)

2:10 pm Session Overview

2:13 pm Start of Session Raffle

Attend the Track, Ask Questions, Rate Sessions & Stand a Chance to win

Track A

2:15 pm – 2:30 pm

Delivering Transformative Value with AI

2:30 pm – 2:45 pm

Cloud Strategies for the Agentic Enterprise

2:45 pm – 3:00 pm

Edge Intelligence for the Agentic AI Era

3:00 pm – 3:15 pm

Strategic Sourcing and Procurement in the Digital-First Enterprise

3:15 pm – 3:15 pm

Announcement of the Raffle Draw Winner

Track B

2:15 pm – 2:30 pm

Innovation at Scale

2:30 pm – 2:45 pm

The Economics of Intelligence: Rethinking IT Investment in the AI Age

2:45 pm – 3:00 pm

Resilience by Design (Building Adaptable Architectures)

3:00 pm – 3:15 pm

Aligning IT with Business Outcomes

3:15 pm – 3:15 pm

Announcement of the Raffle Draw Winner

Track C

2:15 pm – 2:30 pm

Responsible AI Leadership

2:30 pm – 2:45 pm

Evolving Talent Strategies as AI Enters the Mainstream

2:45 pm – 3:00 pm

Upskilling the Workforce with AI

3:00 pm – 3:15 pm

Priorities for Change and Continuity

3:15 pm – 3:15 pm

Announcement of the Raffle Draw Winner

3:15 pm

For The CIO- By The CIO Tracks

Parallel Tracks

3:15 pm – 3:45 pm

Agentic AI in Action: Industry Use Cases and Early Wins

3:15 pm – 3:45 pm

The CIO Talent Agenda: How CIOs, CHROs, and Business Leaders Are Shaping the Future Workforce

3:45 pm

Mega Raffle Announcement

3:50 pm

IDC CIO Excellence Awards

4:20 pm

Close of Summit

Knowledge Hub / Haitham Elkhatib

Partner Spotlight

Haitham Elkhatib
Co-Founder
UnifyApps

Partner Spotlight

Simplifying Complex Business Workflows the Smart Way

Today’s CIOs face a real challenge. Digital tools are everywhere across the enterprise. They promise speed, efficiency, and better performance. But in practice, many of these tools solve problems in isolation. Over time, this creates fragmented systems that are hard to integrate, govern, and scale.

 

As AI moves from hype to a core business capability, the pressure is rising. CIOs are expected to simplify these environments while still delivering real results. That means rethinking how work flows across systems — not adding yet another tool.

 

From Fragmentation to Flow

AI has enormous potential. But unlocking that potential takes more than deploying models or copilots.

To drive real workflows, AI must understand and connect three things:

 

(a) Structured business data

(b) Unstructured content like documents and emails

(c) Real-time business activity

 

At the same time, it must follow security, compliance, and policy rules automatically — not as an afterthought.

 

This shift is changing the CIO role. CIOs are no longer just responsible for keeping systems running. They are becoming stewards of how intelligence operates across the enterprise. Many organizations are responding by moving away from disconnected tools and toward platforms that sit at the center of operations. These platforms coordinate workflows across departments, enforce governance by design, and reduce manual effort.

 

The payoff is clear: fewer handoffs, stronger controls, and automation that can grow without increasing risk.

 

Workflows That Think

AI only works well when it has the right context.

 

For workflows to truly become intelligent, AI must reason across data, knowledge, and live activity — while staying governed at every step. Without shared context and built-in controls, automation breaks down. It becomes hard to trust, hard to manage, and hard to scale.

 

That’s why many CIOs are stepping back from buying more point solutions. Instead, they are investing in platforms that enable AI-driven execution across the business. This approach reduces repetitive human work, strengthens compliance, and helps organizations move beyond small pilots to systems that deliver lasting value.

 

Real Impact, Simplified

Insurance claims are a good example.

 

Traditionally, claims processing relies on manual reviews, multiple systems, and slow handoffs. An AI-driven workflow changes that. Within an AI-native environment, a digital agent can read forms, apply policy rules, flag suspicious activity, and escalate cases to humans when needed — all with full auditability.

 

The result is a process that is faster, more reliable, and easier to manage. It uses fewer moving parts because intelligence, action, and governance are coordinated in one system.

 

This model isn’t limited to insurance. Companies are applying the same approach to order fulfillment, customer onboarding, customer support, and compliance. By simplifying workflows, they remove delays and create room for improvement across the business.

 

The Simplicity Advantage

True simplification starts with shared information.

 

When data, documents, and activity are connected, organizations can respond to complexity without creating more overhead. Workflows can adapt to real conditions instead of relying on rigid rules and constant supervision.

 

For today’s IT leaders, this means choosing platforms that connect systems and govern workflows as a whole — rather than stacking more disconnected solutions. It also means designing workflows that run on their own, while humans focus on setting direction and handling exceptions.

 

In an AI-native world, simplicity is not just about efficiency. It is a strategic advantage. It determines whether AI stays stuck in experimentation or becomes a reliable engine for enterprise-scale value.

Why Attend

Why Attend?

The Security Xchange is more than just a conference. It’s where the region’s technology leaders come together to shape the future of cybersecurity.

Security Operations

Exploring best practices and innovative strategies for managing security operations.

Application and Cloud Security

Focusing on methods and technologies for securing applications and cloud environments.

AI in Cybersecurity

Discussing advancements and applications of artificial intelligence in cybersecurity.

Network Security

Covering the latest trends and technologies in securing networks.

Supply Chain Vulnerabilities

Addressing the identification and mitigation of risks related to third-party vendors and suppliers.

Key Themes

The Security Xchange will spotlight how innovation, intelligence, and resilience are reshaping enterprises through AI, cloud modernization, agentic architectures, and cybersecurity.

Regulation, Resilience and Value Creation

Regulatory compliance is no longer a back-office burden, it’s a strategic enabler. We will explore how organizations can embed regulatory mandates (data privacy, cybersecurity laws, emerging AI/tech rules) into core operations, turning requirements into levers for resilience, stakeholder trust, and business value. Key topics include cyber-by-design, auditability, vendor accountability, and continuity in the face of disruption.

Digital Sovereignty and Trust Architecture

In UAE’s rapidly expanding digital ecosystem, maintaining control over data, infrastructure, and vendor relationships is fundamental to national priorities. We will explore how organizations can align with sovereignty requirements — including data residency, local hosting, and reduced vendor dependency.

Future-Ready Technology and Modernization

Many enterprises struggle with fragmented IT portfolios, technical debt, and legacy constraints. This theme addresses how to modernize intelligently — consolidating platforms, improving observability, and building future-ready architectures that scale, adapt, and support secure innovation.

AI, Automation and Responsible Innovation

AI and intelligent agents are transforming how security is delivered, but with great power comes risk. We will explore pragmatically deploying AI: governance models, guardrails for misuse, prioritization of high-impact use cases, and aligning AI systems with trust, transparency, and accountability.

Operations, Analytics and Resilience Engineering

Detection, response, and recovery are now continuous cycles rather than discrete events. We’ll delve into advanced analytics, managed detection & response, orchestration, external threat visibility (supply chain, third parties), and resilience metrics to operationalize security effectiveness.

The Human Factor: Leadership and Culture

Technology alone doesn’t guarantee security. Leadership, culture, and skill development must align. We will focus on transforming teams, embedding security ownership across functions, and equipping leaders to speak the language of risk and trust to the board, CEOs, and business lines.

Incident and Trust Recovery

Breaches will happen, but what matters is how an organization responds. We will cover crisis communication, forensic response, regulatory handling, insurance, stakeholder trust restoration, and turning adversity into credibility.

Sector-Focused Security Insights

Different industries and environments in UAE pose unique security demands. We will focus on securing critical infrastructure (energy, utilities), connected devices and IoT, healthcare, finance, and rapidly evolving environments such as smart cities, industrial systems, and large-scale national development projects.

Speakers

Speakers

Ranjit Rajan

Ranjit Rajan

Vice President, Research (META)

IDC

Read Bio

Shilpi Handa

Shilpi Handa

Associate Research Director (META)

IDC

Read Bio

Shahin Hashim

Shahin Hashim

Associate Research Director (META)

IDC

Read Bio

Agenda

Agenda

IT Security Xchange & Awards UAE

One Day Event

8:30 am

Registration & Networking

9:00 am

IDC Welcome Address

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:05 am

IDC Keynote: Orchestrating Resilience Amid Transformation, Regulation, and Emerging Threats

META’s cybersecurity agenda is shaped by unprecedented digital acceleration, regulatory dynamism, and the proliferation of advanced threats across IT, OT, and cloud. As organizations embrace AI, platform-centric architectures, and hybrid environments, the attack surface expands and adversaries become more sophisticated—leveraging GenAI, identity compromise, and cyber-physical exploits. At the same time, regulatory mandates around data sovereignty and trust are intensifying. CISOs are challenged to orchestrate holistic defense strategies that unify technology, process, and people: integrating real-time detection, adaptive controls, and continuous compliance, while investing in workforce upskilling and AI augmentation. Achieving resilience in this environment demands a proactive, inclusive approach—balancing innovation, operational continuity, and regulatory alignment across the region’s diverse digital landscape.

Shilpi Handa

Shilpi Handa

Associate Research Director (META), IDC

9:15 am

Sovereign Security: Localizing Talent, Data, and Infrastructure

Middle East organizations are embedding digital sovereignty into their transformation strategies by localizing talent, infrastructure, and AI systems. Sovereign security platforms ensure sensitive data is stored and governed within national borders, reducing exposure to foreign jurisdiction and geopolitical risks. This approach is central to national security, public sector modernization, and technological independence.

9:30 am

AI-Powered Threat Detection and Response

Security service providers in the Middle East are integrating large language models and behavioral analytics to deliver real-time, AI-powered threat detection and response. These systems accelerate threat hunting, automate incident classification, and enable proactive defense against advanced cyber threats, transforming SOC operations and improving regulatory compliance.

9:45 am

Zero Trust Security Models for Government and BFSI

Zero trust security is gaining traction in government and BFSI sectors, driven by regulatory mandates and the need for robust data protection. Middle East governments are updating privacy laws and deploying zero trust frameworks to ensure continuous verification, minimize attack surfaces, and comply with evolving regulations.

9:55 am

Cloud Security: Compliance, Visibility, and Resilience

Cloud security strategies in the region focus on regulatory compliance, data sovereignty, and operational resilience. Organizations are prioritizing local cloud regions, hybrid architectures, and sovereign controls to meet data residency requirements, reduce latency, and ensure visibility across distributed environments.

10:05 am

Group Innovation Challenge

10:35 am

Tea/ Coffee & Networking Break

11:05 am

Identity and Access Management (IAM): The Only Perimeter

With identity attacks on the rise, IAM is now the primary security perimeter. Organizations are shifting to platform-based IAM solutions, integrating advanced authentication, access controls, and behavioral analytics to defend against credential theft and insider threats.

11:15 am

Operational Technology (OT) Security for Critical Infrastructure

Energy, utilities, and manufacturing sectors are strengthening OT security to counter sophisticated cyber threats. The focus is on segmenting networks, deploying real-time monitoring, and integrating AI-driven analytics to protect critical infrastructure and ensure regulatory compliance.

11:25 am

Data Privacy and Protection: Navigating New Regulations

Middle East is rapidly updating data privacy laws, requiring organizations to adapt governance frameworks and compliance strategies. The emphasis is on data localization, consent management, and continuous monitoring to meet stringent regulatory standards.

11:35 am

Xchange Table- First Cycle

11:55 am

Xchange Table- Second Cycle

12:15 pm

Workshop Roundtable Sessions

Workshop Roundtable

12:15 pm – 1:05 pm

Session 1- Managed Detection and Response (MDR): The Digital Control Plane

12:15 pm – 1:05 pm

Session 2- AI-Driven Security Automation and Orchestration

12:15 pm – 1:05 pm

Session 3- Cybersecurity Talent Development and Certification

12:15 pm – 1:05 pm

Session 4- Supply Chain Security: Mitigating Third-Party Risks

1:05 pm

CISO Excellence Awards Ceremony

1:35 pm

Winner Announcement of Group Innovation Challenge

1:40 pm

Lunch & Networking

Be Part of It!

REGISTER NOW

Jury Members

Jury Members

Ranjit Rajan

Ranjit Rajan

Vice President, Research (META)

IDC

Read Bio

Shilpi Handa

Shilpi Handa

Associate Research Director (META)

IDC

Read Bio

Shahin Hashim

Shahin Hashim

Associate Research Director (META)

IDC

Read Bio

Harish Dunakhe

Harish Dunakhe

Senior Research Director, Software & Cloud (META)

IDC

Read Bio

Melih Murat

Melih Murat

Associate Research Director, IT Services & Software (META)

IDC

Read Bio

Eric Samuel

Eric Samuel

Associate Research Director

IDC

Read Bio

Yeşim Öztürk

Yeşim Öztürk

Senior Research Manager (Türkiye)

IDC

Read Bio