Resilient Security: Evolving Strategies for 2024
In today's rapidly evolving security environment, organizations are surrounded by various challenges, including state-sponsored cyberattacks, geopolitical instability, inflation, and cybersecurity talent gaps. To successfully navigate these turbulent waters, Chief Information Security Officers (CISOs) must adopt a dynamic approach, continuously assess risks, protect digital assets, and adapt to rapid advances in security technologies. The transition to cloud computing, increased IT process automation, and increased flexibility in workforce operations have complicated the cybersecurity landscape, expanded the attack surface, and made the task of network defense more difficult. Despite these challenges, the emergence of AI/ML-powered automation and advanced orchestration tools offer new ways to strengthen corporate resilience against disruptions. When used effectively, these technologies can strengthen defenses against cybercriminal activities, solidifying trust and adapting to emerging digital sovereignty regulations. In this complex scenario, CISOs must not only deal with immediate threats but also strategically use innovative technologies to enhance their organization's cyber resilience.
8:00 |
Registration, Tea/Coffee & Networking |
9:00 |
Opening Act |
|
|
9:05 |
Welcome Address |
Nevin Çizmecioğulları Country Director & AVP, Türkiye, IDC
|
|
9:10 |
IDC Keynote: Cybersecurity 2024: A Visionary Fusion with GenAI for Tomorrow's Defense |
Yeşim Öztürk Senior Research Manager (Türkiye), IDC
|
|
9:25 |
CISO Panel Discussion: Winning Over the Financial Gatekeeper: Strategies for Engaging with Your CFO |
This discussion will highlight how CISOs can effectively communicate the importance of cybersecurity investments to CFOs, aligning security initiatives with financial planning and business strategy. Key topics will include building a business case for cybersecurity, demonstrating ROI, and navigating budget negotiations to secure the necessary funding for security programs.
|
|
10:00 |
Adapting to the Digital Era: Navigating the Security Transformation Imperative |
|
|
10:15 |
Cyber Defense: From Vulnerability Management to Incident Response |
|
|
10:30 |
Powering Digital Business through Cloud Security and Workstyle Evolution: A Real-World Guide |
|
|
10:45 |
Adapting Managed Security for Evolving Cyber Threats: Navigating the Challenges of Generative AI |
11:00 |
Tea/Coffee Break & Networking |
11:20 12:50 |
Platinum Partners Sessions (Parallel Sessions) |
Platinum Track A
9:00 - 10:00
11:20 - 11:30
Generative AI Risk and Opportunity: Navigating the Landscape for CISOs
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:35 - 11:45
Zero Trust Triumph: Strategies for CISOs to Overcome Objections
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:50 - 12:00
Securing Business Continuity: Mitigating Third-Party Risks
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:05 - 12:15
Maintaining Security Governance Amidst the SaaS Explosion: Prevention Strategies
12:15 - 12:20
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:20 - 12:50
Immediate Defense: Addressing the Current Security Crisis
Platinum Track B
11:20 - 11:30
Maximizing Returns: Unlocking the True Value of Cybersecurity Investments
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:35 - 11:45
Fortifying Defenses: How Organizations Can Shield Against Escalating Cybercrime?
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:50 - 12:00
Immediate Actions for Time-Sensitive Security Threats: Identifying 'Now' Measures
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:05 - 12:15
Up-to-Date Cyber Threat Landscape: Transforming Employees into a Defensive Barrier
12:15 - 12:20
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:20 - 12:50
Insights from the Frontline: Threat Evolution and Organizational Response Strategies
Platinum Track C
11:20 - 11:30
Chronicles of the Cyber Realm: Forensics in the Age of Complex Cybercrimes
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:35 - 11:45
Data Sanctuaries: Advanced Strategies in Protecting Critical Information
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:50 - 12:00
Application Armoury: Shielding Applications in a Hostile Cyberspace
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:05 - 12:15
In the Trenches: Real-World Tactics for Cybersecurity Operations
12:15 - 12:20
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:20 - 12:50
Building the Safe and Agile Digital Business
|
|
12:55 |
Networking Lunch |
14:00 14:50 |
OT Security Partners Session (Parallel Sessions) |
OT Security Partners Session
14:00 - 14:10
Next-Gen Operational Technology Security: Trends and Challenges Ahead
14:10 - 14:20
Elevating OT Security: The Impact of Technological Innovation and Advancement
14:20 - 14:30
Operational Threat Landscape: A Deep Dive into OT System Vulnerabilities
14:30 - 14:40
The Forefront of OT Cybersecurity: Exploring AI-Enabled Solutions and Innovations
14:40 - 14:50
Uniting IT and OT: Strategies for Integrated and Robust Security Defense
|
|
14:40 |
Tea/Coffee Break & Networking |
15:00 16:00 |
Gold Partners Sessions (Parallel Sessions) |
Gold Partners Sessions
15:00 - 15:15
Data Security in the Era of Cloud & Mobility
In the age of cloud computing and mobility, data security has become a critical concern for organizations worldwide. This session will explore the challenges and solutions associated with protecting data in a landscape where traditional boundaries are blurred, and the data is more dynamic and distributed than ever. We'll discuss the evolution of data security strategies, the impact of cloud and mobile technologies on data protection, and practical approaches to securing sensitive information in this new era.
15:15 - 15:25
Key Security Risks in Generative AI Adoption and Their Mitigation Strategies
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:30 - 15:40
Protecting Your APIs: Strategies to Prevent Exploits and Abuse
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:45 - 15:55
Building a Fortified Foundation: The Pillars of Robust Application Security
15:55 - 16:00
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
Gold Partners Sessions
15:00 - 15:15
Cultivating Talent For The Future: Nurturing Skills And Expertise
Developing Skills and Expertise" focuses on the imperative of cultivating a robust cybersecurity workforce to navigate the evolving threats in the digital age. This discussion will address the need for continuous skill enhancement and knowledge acquisition in cybersecurity, emphasizing the creation of a resilient, innovative, and proactive security culture. We will examine strategies for developing critical cybersecurity skills, fostering a mindset of constant vigilance, and preparing for emerging security challenges.
15:15 - 15:25
Strategies for Identity Hygiene and Security Posture Management
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:30 - 15:40
Mastering Privileged Access Management: Keys to Success
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:45 - 15:55
Securing Digital Identities: Best Practices in Identity Management
15:55 - 16:00
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
Gold Partners Sessions
15:00 - 15:15
The Bastion Blueprint: Designing Robust Security for Modern Infrastructures
This panel will address the critical task of designing robust security for modern digital infrastructures in the face of evolving cyber threats. We will explore advanced security technologies and best practices in architecture design, focusing on the integration of AI and machine learning to enhance security protocols. The discussion aims to provide actionable insights for building resilient and adaptable security systems for cloud environments, IoT devices, and diverse IT ecosystems.
15:15 - 15:25
The Art of Cyber Guardianship: Mastering Network Security
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:30 - 15:40
Fortifying the Foundations: Masterclass in Infrastructure Security
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:45 - 15:55
Guardians of the Grid: Securing Infrastructure in a Connected World
15:55 - 16:00
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
|
|
16:00 17:10 |
Siver Partners Sessions (Parallel Sessions) |
Siver Partners Sessions
16:00 - 16:40
Real-world Incident Response Case Studies World
16:40 - 17:10
Panel Discussion: Trendsetters or Trend Followers: CISOs Tackling Emerging Security Trends
This panel will explore whether CISOs are setting the pace in the cybersecurity landscape or if they are adapting to trends set by others. Discussions will delve into how CISOs can identify and leverage emerging security trends to strengthen their organization’s defense mechanisms, the challenges of staying ahead in a rapidly changing environment, and the impact of innovation versus tradition in cybersecurity strategy. Siver Partners Sessions
16:00 - 16:40
Zero-Trust Security Architecture and Cyber Recovery Solution
16:40 - 17:10
Panel Discussion: Future-Proofing Security: CISOs on Anticipating and Adapting to New Risks
This panel will discuss strategies for identifying potential future threats and adapting security measures accordingly. It will cover the importance of innovation, agility, and proactive planning in creating resilient cybersecurity frameworks that can withstand evolving threats. The session aims to provide insights into how CISOs can stay one step ahead in the rapidly changing security landscape. Siver Partners Sessions
15:15 - 15:25
16:00 - 16:40
Boosting Cyber Resilience Through Strategic Threat Modeling
16:40 - 17:10
Panel Discussion: The Evolving Threat Landscape: CISOs on Staying One Step Ahead
This panel will examine the strategies and insights from Chief Information Security Officers (CISOs) on staying one step ahead in the ever-evolving world of cybersecurity. We'll explore the methods CISOs use to foresee and prepare for future cyber threats, the integration of innovative technologies into their security frameworks, and the importance of fostering a proactive security culture within their organizations. The discussion will focus on the dynamic balance between rapid technological advancements and the constant emergence of new security threats, highlighting the CISOs' role in navigating this challenging landscape. |
|
17:10 |
Close of Event & Continued Networking |
Want to become a speaker?
Nevin Çizmecioğulları
Country Director & AVP, Türkiye, IDC
Yeşim Öztürk
Senior Research Manager (Türkiye), IDC
Want to become a partner?
Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world. https://www.trendmicro.com.tr/
Privacy Policy: https://www.trendmicro.com/en_us/about/trust-center/privacy/notice.html
Türk Telekom
Aktek Bilişim
Regardless of sector and with its strong and experienced workforce, Aktek has been providing its services for more than 16 years to help companies place ahead of the competition and maintain their successes. Aktek also have proved these achievements by being listed in more than one category in the "Bilişim 500" list in 2023; It has been certified among the top 10 IT companies in Turkey in the fields of IT Consultancy, Hosting and Cyber Security Service.
Privacy Policy: https://www.aktekbilisim.com/bilgi-guvenligi-politikasi/
IT executives rely on IDC and Foundry events for discovering new ideas, trends, and solutions that drive their technology strategies. Leveraging IDC’s deep market intelligence and advisory expertise, and Foundry’s rich media brands (CIO, Computerworld, InfoWorld) and relationships, IDC and Foundry produce powerful learning and networking experiences for IT decision makers around the world.