9:00
|
Check-in & Networking
|
9:40
|
Welcome IDC Security & Cloud
|
|
Gabriel Coimbra
Group Vice President and Country Manager, IDC
|
9:45
|
Keynote Speaker Presentation A Better Way
|
|
In this talk we take a look at why security is struggling to keep up with the growing number of threats and vulnerabilities, and explore approaches that don’t just better reduce risk but also contribute to the business.
Greg Van Der Gaast
Named one of the '5 World's Most Infamous Hackers', World Leading Security, Cyber & Information Expert who formerly worked for the U.S. Government
|
10:05
|
HPE Presentation The Next Era of Secure Connectivity
|
|
Jaye Tillson
Field CTO, HPE
|
10:20
|
RedShift MC Use Case from Reactive to Proactive with Threat Intelligence
|
|
O uso de Intelligence de forma proativa na identificação e mitigação de ameaças com apresentação de casos reais. Como podemos ser mais rápidos na identificação de potenciais incidentes e evitar perdas.
Luís Valente
Cybersecurity Risk Management, Sonae
|
10:35
|
Ping Identity & Deloitte How to Use Fraud Protection to Strike A Balance Between Security and User Experience?
|
|
As more business moves online, the risk of online fraud and associated losses continues to grow. Sophisticated, motivated fraudsters are constantly developing creative new ways to attack online businesses, and fraud teams are in a perpetual arms race against these savvy criminals. Businesses are expected to spend $63.5B on fraud detection and prevention solutions by 2023 - how is that money most effectively used, and how are leaders in this space architecting their counter-fraud strategies?
Gonçalo Capelo Martins
Associate Partner, Cyber Risk at Deloitte Portugal
|
10:50
|
Networking Break and Meetings
|
11:20
|
Welcome
|
11:25
|
IDC The Resilient Enterprise: Securing Cloud, Data, and AI
|
|
Building resilience requires robust security strategies to safeguard cloud infrastructures, protect sensitive data, and secure AI systems. This session will explore evolving threats and security approaches to ensuring the confidentiality, integrity, and availability of critical assets across the cloud, data, and AI environments. And what trends are competing for time and budget are emerging, and how should the modern CISO prioritise?
Ralf Helkenberg
Research Manager, European Privacy & Data Security, IDC
|
11:40
|
Netskope SASE and Zero Trust in an AI Era
|
|
Paulo Vieira
Country Manager – Portugal, Netskope
|
11:52
|
Partner Presentation
|
11:52
|
ManageEngine Simplifying the adoption of a cybersecurity strategy based on Zero Trust
|
|
With the rise of mobility, cloud adoption, remote work, bring-your-own-device (BYOD) policies, and more sophisticated cyberattacks, the traditional security model is no longer sufficient to protect the organization from potential fraud or information theft. That is why it is necessary to include new technologies such as Thread Intelligence and the use of AI and ML to reinforce the business cybersecurity strategy and confront cyber threats.
Andrés Mendoza
Technical Director Southern Europe & LATAM, ManageEngine
|
12:07
|
NOS Gestão de Riscos de Terceiros: A sua importância, estratégias e Boas Práticas
|
|
Esta sessão abordará como as ciberameaças provenientes de fornecedores e outros parceiros podem comprometer a cibersegurança e compliance das organizações. Serão discutidas estratégias e boas práticas para a gestão de riscos de terceiros, com vista a uma maior resiliência operacional digital.
Rui Custódio
Head of B2B Services Business Unit, NOS
|
12:22
|
Powered by CyberSafe Digital Leader Panel:
Elevating Security Operations with SOAR and MDR Services
|
|
Nesta sessão debateremos como as novas tendências na área de Security Operations ajudam a ultrapassar as limitações atuais da maior parte das organizações. Por um lado, assistimos a uma mudança crescente em que Centros de Operações de Segurança (SOC) tipicamente baseados em ferramentas de SIEM estão a adotar um modelo SOAR-centric, no qual a automação assume um papel essencial. Por outro lado, diversas organizações olham para os serviços MDR (Managed Detection and Response) como uma forma de aumentar a capacidade de deteção e resposta, ultrapassando a limitação tradicional dos SOCs focados apenas na deteção. Estas são estratégias inovadoras para a mitigação dos desafios da cibersegurança, como por exemplo a escassez de competências especializadas, a urgência de respostas rápidas a incidentes ou a dificuldade em identificar ameaças num volume imenso de dados.
Bruno Horta Soares
Executive Senior Advisor, IDC
Paulo Martins
CEO Euronext technologies PT & Group CISO na Euronext
Davide Silva
Cybersecurity Operations Services Manager da CyberSafe
Hugo Bastos
Diretor IT e Responsável Segurança da Informação APDL
Tiago Morais
IT Manager, ULSM
|
13:02
|
Lunch & Networking Lunch
|
13:10
|
Executive Lunch IDC & Microsoft Transforming Security Operations: The Power of GenAI and Modern SecOps
|
|
O Executive Lunch da IDC & Microsoft oferece uma oportunidade exclusiva para explorar o impacto transformador da Inteligência Artificial Generativa (GenAI) nas operações de segurança. Junte-se aos especialistas da IDC e da Microsoft e conheça os principais insights sobre as tendências emergentes em GenAI na cibersegurança e a visão da Microsoft para SecOps. Descubra como estas tecnologias estão a redefinir a proteção de dados, a otimização de custos e a aceleração da resposta a ameaças, preparando as organizações para os desafios da era digital.
Bruno Horta Soares
Executive Senior Advisor, IDC
Miguel Oliveira
Solution Area Specialist, Security, Compliance & Identity, Microsoft
|
13:10
|
Executive Lunch IDC & Ping Identity & Deloitte From Authentication to Trust: Strengthening Customer Security with CIAM
|
|
Join Ping Identity, Deloitte and IDC for an interactive executive lunch on Customer Identity and Access Management (CIAM) taking place on October 30 at Pestana Douro Riverside Hotel An organization's user experience serves as a window through which customers form their first impressions of its capabilities and trustworthiness. Today customers expect seamless, personalized, and secure interactions at every stage of their journey with an organization's application or digital service. The complexities of digital interactions and the rise in identity threats, have compelled CIAM to evolve beyond basic authentication. Modern CIAM solutions must now provide a seamless, secure, and privacy-focused experience while simultaneously safeguarding against a constantly evolving threat environment. Come together with security peers and industry experts at this executive lunch event to explore, learn, and exchange insights on the use cases, benefits and best practices of adopting a modern customer identity and access management approach. During the three-course meal, you will: • Gain insights from industry experts on the latest trends, advancements and solutions shaping customer identity security • Learn key use cases and considerations in embarking on a CIAM journey • Gain practical strategies for implementing a successful CIAM architecture • Engage in a collaborative exchange of insights and experiences with both peers and experts to address challenges encountered, share best practices and lessons learned, and the benefits gained.
Ralf Helkenberg
Research Manager, European Privacy & Data Security, IDC
Federico Carbone
Regional Solution Architect, Ping Identity
|
14:30
|
Welcome & Giveaway iPad Apple iPad 10.2'
|
14:35
|
IDC Building a Generative AI Fraud Strategy: A Playbook for Outsmarting Digital Deception
|
|
This session will dive into the evolving world of Generative AI and its impact on fraud, offering a practical strategy to help organizations counter these emerging threats. As AI enables bad actors to produce highly convincing fraudulent content, the need for a robust defense has never been more critical. We'll explore how Generative AI is being used to create fake videos, images, and audio that can spread false information or impersonate real individuals, making traditional detection methods ineffective. This fraud targets a broad audience, from individuals to organizations across various sectors. Attendees will learn essential steps to train staff, recognize red flags, and strengthen their defenses against AI-driven fraud.
Nesta sessão, vamos explorar o impacto da IA Generativa no mundo fraude e partilhar abordagens práticas para o desenvolvimento de estratégias que ajudem as organizações a enfrentar estas novas ameaças. À medida que a IA permite que os criminosos criem conteúdos fraudulentos altamente convincentes, a necessidade de uma defesa robusta nunca foi tão importante. Iremos analisar como a IA Generativa está a ser usada para criar vídeos, imagens e áudios falsos, que podem espalhar desinformação ou mesmo imitar pessoas reais, tornando ineficazes os métodos tradicionais de deteção. Este tipo de fraude atinge uma vasta audiência, desde indivíduos a organizações em vários setores. Os participantes aprenderão os passos essenciais para treinar equipas, reconhecer sinais de alerta e reforçar as suas defesas contra fraudes baseadas em IA.
Bruno Horta Soares
Executive Senior Advisor, IDC
|
14:50
|
Fortinet Protecting Multi-Cloud Environments with Fortinet
|
|
Paulo Pinto
Business Development Manager, Fortinet
|
15:05
|
HP HP Endpoint Security
|
|
A HP protege de forma única a sua organização e os seus equipamentos contra ciberataques, independentemente de onde, quando e como trabalha.
Nelson Guerra
HP Cybersecurity Champion
|
15:20
|
Entretenimento Magic Show com Mário Daniel
|
|
Mário Daniel
Magic Standup
|
16:05
|
Encerramento
|
|
Gabriel Coimbra
Group Vice President and Country Manager, IDC
|