Agenda - IDC IT Security Roadshow 2015 | Rendezvények | IDC Hungary

08:15 – 09:00

Registration and morning coffee

09:00 – 09:05

Welcome Note, Opening of the Conference

Zoltán Komáromi
Senior Research Manager IDC CEE, Country Manager IDC Hungary

09:05 – 09:35

Security Challenges from Managing Mobility to Detecting Vulnerability

Mark Child
Research Manager, Software, CEE Region, IDC CEMA

Download the Presentation

Against a backdrop of ever-more frequent cyberattacks and well-publicised breaches at major organizations worldwide, CE nations are putting in place national cybersecurity initiatives, infrastructure, and legislation. While these establish frameworks and benchmarks to help companies calibrate their security stance, the ultimate responsibility lies with the organization itself to adopt the appropriate security measures and deploy the necessary solutions. IDC will look at some of the major IT security challenges facing our organizations in 2015 and provide insights into some of the steps being taken by our contemporaries to maximize the protection of their IT infrastructure and their data.

09:35 – 10:00

What would you do differently if you knew you were going to be compromised?

Szilárd Csordás
Security Consulting Systems Engineer, Cisco Systems Magyarország Kft.

Download the Presentation

Numbers do not lie. Investigation of multinational companies show evidence of internal compromise. Suspicious traffic is emanating from their network and attempting to connect to questionable sites. 100 percent of companies are calling malicious malware hosts. To effectively protect our network against the targeted and complex attacks we have to understand the criminal mind, motives in the complete attack continuum. Cisco’s security strategy is focusing not just on prevention and detection but we cover the attacks in the during phase and in the after phase as well. Cisco’s Advanced Malware Protection (AMP) solution is a continuous process to detect, track, analyze and remediate the threats on the network and on the endpoints. Retrospection delivers continuous capability which utilize big data analytics for constant file tracking and analysis , alerting on and remediating files initially deemed safe but now known to be malicious.

10:00 – 10:25

eCSI: Next Step of The IT Security Evolution

Balázs Scheidler
Chief Technology Officer, BalaBit IT Security

Download the Presentation

10:25 – 10:50

Mobile, Secure, and Performant Access to Central Company Resources

Joachim Gietl
Head of Sales Department - Central and Eastern Europe, HOB GmbH & Co. KG

Download the Presentation

Mobile workplaces that utilize public networks have become standard in today’s business environments. Modern remote access solutions enable comfortable access to crucial business resources – but they also contain certain risks. This session introduces several options for accessing centrally stored company data in a secure manner. It addresses important topics such as multi-client capability, high availability, and usability in case multiple devices are employed. In addition to that, various scenarios such as access to terminal servers, exchange and file servers are introduced.
10:50 – 11:15

Coffee Break, Partner's Exhibition

11:15 – 11:40

Zero-Day Protection Today and Tomorrow

László Csósza
Security Engineer, Check Point Software Technologies Ltd.

Download the Presentation

The threat landscape is rapidly evolving away from the days of network disruption to a more prevalent and persistent generation of cybercrime, hactivism, cyber espionage, and targeted attacks. Check Point ThreatCloud provides immediate protection against new, unknown, and targeted attacks before they infect the network.This protection eliminates the vulnerability gap that existed between when an infection occurs and the time a new detection signatures becomes available.

11:40 – 12:05

Fighting threats with logs?

Péter Gyenese
Security Channel Leader, CEE, IBM Magyarországi Kft.

Download the Presentation

A lot has happened in 2014 in the area of IT Security. Many people call 2014 as the year of the breaches, so one important question arises - what can we do to protect our critical infrastructure and data? We all know, that there will be no silver bullet to solve the issue, but we can use logs and analytics as an ally to help fight against threats. With the information we can gather from logs, the integrated security solutions of IBM and other companies there is a way to strengthen security posture of our organizations .

12:05 – 12:30

Protection of The Critical Infrastructure on The Field

Gábor Hirsch
Sales Manager, Fortinet

Download the Presentation

View video

Fortinet, as a market leading network security vendor provides end-to-end solutions to the Enterprise, Carrier and Data Center customers. The wide product portfolio covers the SCADA security as well. The presentation is briefly discussing the Fortinet product portfolio, concentrating to the SCADA security and its security management and monitoring tools.
12:30 – 13:00

Panel Discussion with The Participation of The Morning Speakers

András Szabolcs
Board Member, ISACA Budapest Chapter, Moderator of the Panel Discussion

13:00 – 13:55

Buffet Lunch and Networking

IDC IT Security Arenas: parallel sessions in the given topics with two presentations and a round-table discussion

'Human Factors in Information Security Management' Arena

'New Trends and Challenges in IT Security' Arena

'Risk Management, Compliance and IT Policy' Arena

13:55 – 14:20

The Weakest Link

Ákos Solymos
CISM, CRISC, Head of Information Security Department, Security Directorate, Erste Bank

Download the Presentation

In my presentation I will talk about my experience regarding the weakest link of security and I will analyze the relationship between the users, the company culture and information security. I will talk about my experience I gained in the past 7 years with the user access and identity management system and its framework in Erste Bank Hungary.

13:55 – 14:20

Current Challenges of The Vulnerability of Information Systems

Dr. Boldizsár Bencsáth
Assistant Professor, Laboratory of Cryptography and System Security

Download the Presentation

13:55 – 14:20

Business Goals vs. Information Cecurity - Are their directions the same?

Pál Kerékfy
ex CIO at Deloitte CEE, Honorary Member of Hungarian IT Leaders Association

Download the Presentation

Information systems are integral elements of the business, and their safety and security are not only the IT department’s concern. We all know this in principle but how is it in real life? Are security technology and business goals in sync? Do we properly use available technology to its full extent when needed? Can we convince business leaders and users, or can momentary interests override rules and policies? In most cases information security discussions focus on confidentiality. Do we possess the right technology to ensure availability of information, and do we use them consequently? We have to answer these questions!

14:20 – 14:45

How to Update a Human Firewall? – User Security Awareness Requirements at an Insurance Company

Tibor Földi
CISO, CIG Pannónia Életbiztosító Nyrt.

Download the Presentation

The presentation will focus on the answering of the following questions:

  • What IT security regulations rule the operation of an insurance company?
  • What registers are required to document this?
  • What should have special knowledge of the users?
  • 14:20 – 14:45

    What we do not know, we cannot protect - what is the use of network admission control, anyway?

    András Szemmelveisz
    Senior Department Manager, KBC Group Magyarországi fióktelepe

    Download the Presentation

    The unified, secure, and still user-friendly access control should be part of every corporate policy. Implementation requires the cooperation of whole IT operation – but it is worth the effort.
    Future developments are governed by the ability to integrate advanced security solutions with the robust secure access services. These advanced services include Advanced Persistent Threat detection and trajectory, Remote Access (VPN) and enterprise mobility solutions.
    14:20 – 14:45

    Advice to The Leader Who Has Nothing to Gain but Everything to Lose

    Tamás Gaidosch
    Independent IT Risk Management Expert, CISA, CISM, CISSP

    Download the Presentation

    14:45 – 15:15

    Interactive Panel Discussion

    14:45 – 15:15

    Interactive Panel Discussion

    14:45 – 15:15

    Interactive Panel Discussion

    15:15 – 15:20

    Closing Remarks, End of The Conference

    Please note that the topics identified above are representative only. The conference agenda will be kept up to date.