8:00
|
Registration, Tea/Coffee & Networking
|
9:00
|
Opening Act
|
|
|
9:05
|
Welcome Address
|
|
Nevin Çizmecioğulları
Country Director & AVP, Türkiye, IDC
|
9:10
|
IDC Keynote: Cybersecurity 2024: A Visionary Fusion with GenAI for Tomorrow's Defense
|
|
Yeşim Öztürk
Senior Research Manager (Türkiye), IDC
|
9:25
|
CISO Panel Discussion: Winning Over the Financial Gatekeeper: Strategies for Engaging with Your CFO
|
|
This discussion will highlight how CISOs can effectively communicate the importance of cybersecurity investments to CFOs, aligning security initiatives with financial planning and business strategy. Key topics will include building a business case for cybersecurity, demonstrating ROI, and navigating budget negotiations to secure the necessary funding for security programs.
|
10:00
|
Adapting to the Digital Era: Navigating the Security Transformation Imperative
|
|
|
10:15
|
Cyber Defense: From Vulnerability Management to Incident Response
|
|
|
10:30
|
Powering Digital Business through Cloud Security and Workstyle Evolution: A Real-World Guide
|
|
|
10:45
|
Adapting Managed Security for Evolving Cyber Threats: Navigating the Challenges of Generative AI
|
11:00
|
Tea/Coffee Break & Networking
|
11:20
12:50
|
Platinum Partners Sessions (Parallel Sessions)
|
|
11:20 - 11:30
Generative AI Risk and Opportunity: Navigating the Landscape for CISOs
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:35 - 11:45
Zero Trust Triumph: Strategies for CISOs to Overcome Objections
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:50 - 12:00
Securing Business Continuity: Mitigating Third-Party Risks
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:05 - 12:15
Maintaining Security Governance Amidst the SaaS Explosion: Prevention Strategies
12:15 - 12:20
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:20 - 12:50
Immediate Defense: Addressing the Current Security Crisis
11:20 - 11:30
Maximizing Returns: Unlocking the True Value of Cybersecurity Investments
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:35 - 11:45
Fortifying Defenses: How Organizations Can Shield Against Escalating Cybercrime?
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:50 - 12:00
Immediate Actions for Time-Sensitive Security Threats: Identifying 'Now' Measures
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:05 - 12:15
Up-to-Date Cyber Threat Landscape: Transforming Employees into a Defensive Barrier
12:15 - 12:20
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:20 - 12:50
Insights from the Frontline: Threat Evolution and Organizational Response Strategies
11:20 - 11:30
Chronicles of the Cyber Realm: Forensics in the Age of Complex Cybercrimes
11:30 - 11:35
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:35 - 11:45
Data Sanctuaries: Advanced Strategies in Protecting Critical Information
11:45 - 11:50
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
11:50 - 12:00
Application Armoury: Shielding Applications in a Hostile Cyberspace
12:00 - 12:05
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:05 - 12:15
In the Trenches: Real-World Tactics for Cybersecurity Operations
12:15 - 12:20
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
12:20 - 12:50
Building the Safe and Agile Digital Business
|
12:55
|
Networking Lunch
|
14:00
14:50
|
OT Security Partners Session (Parallel Sessions)
|
|
OT Security Partners Session
14:00 - 14:10
Next-Gen Operational Technology Security: Trends and Challenges Ahead
14:10 - 14:20
Elevating OT Security: The Impact of Technological Innovation and Advancement
14:20 - 14:30
Operational Threat Landscape: A Deep Dive into OT System Vulnerabilities
14:30 - 14:40
The Forefront of OT Cybersecurity: Exploring AI-Enabled Solutions and Innovations
14:40 - 14:50
Uniting IT and OT: Strategies for Integrated and Robust Security Defense
|
14:40
|
Tea/Coffee Break & Networking
|
15:00
16:00
|
Gold Partners Sessions (Parallel Sessions)
|
|
15:00 - 15:15
Data Security in the Era of Cloud & Mobility
In the age of cloud computing and mobility, data security has become a critical concern for organizations worldwide. This session will explore the challenges and solutions associated with protecting data in a landscape where traditional boundaries are blurred, and the data is more dynamic and distributed than ever. We'll discuss the evolution of data security strategies, the impact of cloud and mobile technologies on data protection, and practical approaches to securing sensitive information in this new era.
15:15 - 15:25
Key Security Risks in Generative AI Adoption and Their Mitigation Strategies
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:30 - 15:40
Protecting Your APIs: Strategies to Prevent Exploits and Abuse
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:45 - 15:55
Building a Fortified Foundation: The Pillars of Robust Application Security
15:55 - 16:00
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:00 - 15:15
Cultivating Talent For The Future: Nurturing Skills And Expertise
Developing Skills and Expertise" focuses on the imperative of cultivating a robust cybersecurity workforce to navigate the evolving threats in the digital age. This discussion will address the need for continuous skill enhancement and knowledge acquisition in cybersecurity, emphasizing the creation of a resilient, innovative, and proactive security culture. We will examine strategies for developing critical cybersecurity skills, fostering a mindset of constant vigilance, and preparing for emerging security challenges.
15:15 - 15:25
Strategies for Identity Hygiene and Security Posture Management
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:30 - 15:40
Mastering Privileged Access Management: Keys to Success
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:45 - 15:55
Securing Digital Identities: Best Practices in Identity Management
15:55 - 16:00
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:00 - 15:15
The Bastion Blueprint: Designing Robust Security for Modern Infrastructures
This panel will address the critical task of designing robust security for modern digital infrastructures in the face of evolving cyber threats. We will explore advanced security technologies and best practices in architecture design, focusing on the integration of AI and machine learning to enhance security protocols. The discussion aims to provide actionable insights for building resilient and adaptable security systems for cloud environments, IoT devices, and diverse IT ecosystems.
15:15 - 15:25
The Art of Cyber Guardianship: Mastering Network Security
15:25 - 15:30
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:30 - 15:40
Fortifying the Foundations: Masterclass in Infrastructure Security
15:40 - 15:45
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
15:45 - 15:55
Guardians of the Grid: Securing Infrastructure in a Connected World
15:55 - 16:00
Q&A (Ask Questions & Stand a Chance to Win an Exciting Gift)
|
16:00
17:10
|
Siver Partners Sessions (Parallel Sessions)
|
|
16:00 - 16:40
Real-world Incident Response Case Studies World
16:40 - 17:10
Panel Discussion: Trendsetters or Trend Followers: CISOs Tackling Emerging Security Trends
This panel will explore whether CISOs are setting the pace in the cybersecurity landscape or if they are adapting to trends set by others. Discussions will delve into how CISOs can identify and leverage emerging security trends to strengthen their organization’s defense mechanisms, the challenges of staying ahead in a rapidly changing environment, and the impact of innovation versus tradition in cybersecurity strategy.
16:00 - 16:40
Zero-Trust Security Architecture and Cyber Recovery Solution
16:40 - 17:10
Panel Discussion: Future-Proofing Security: CISOs on Anticipating and Adapting to New Risks
This panel will discuss strategies for identifying potential future threats and adapting security measures accordingly. It will cover the importance of innovation, agility, and proactive planning in creating resilient cybersecurity frameworks that can withstand evolving threats. The session aims to provide insights into how CISOs can stay one step ahead in the rapidly changing security landscape.
16:00 - 16:40
Boosting Cyber Resilience Through Strategic Threat Modeling
16:40 - 17:10
Panel Discussion: The Evolving Threat Landscape: CISOs on Staying One Step Ahead
This panel will examine the strategies and insights from Chief Information Security Officers (CISOs) on staying one step ahead in the ever-evolving world of cybersecurity. We'll explore the methods CISOs use to foresee and prepare for future cyber threats, the integration of innovative technologies into their security frameworks, and the importance of fostering a proactive security culture within their organizations. The discussion will focus on the dynamic balance between rapid technological advancements and the constant emergence of new security threats, highlighting the CISOs' role in navigating this challenging landscape.
|
17:10
|
Close of Event & Continued Networking
|