Registration and Welcome Coffee


Welcome Remarks from IDC

Vladimir Pozdnyakov,
Country Manager, Ukraine, Belarus, Moldova, Caucasus, Ukraine

IDC Keynote: Digital Transformation as a way to survive

Vladimir Pozdnyakov,
Country Manager, Ukraine, Belarus, Moldova, Caucasus, Ukraine

Security strategy and cloud platforms are fundamentals for the successful enterprise intended to survive in a new world of digital disrupters.


Cybersecurity and Georgia. New Challenges

Vladimer Svanadze,
Founder and chairman of the board, IDI

Modern threats, or why the Anti-Virus died

Oleksandr Chubaruk,
Technical Director in Ukraine and CIS, Check Point Software Technologies Ltd.

Hackers constantly modify their strategies and techniques to evade detection and reach corporate resources.

Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place.

To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.




Coffee Break and Partners Exhibition


Workforce transformation with Cloud client-computing

Durukan Artık,
Consultant, Cloud Client Computing, Dell

Why organizations are failing resilience to threats like WannaCry and how to get control on threats coming from vulnerabilities?

Andrzej Klesnicki,
Technical Account Manager for Central and Eastern Europe, Qualys

Vulnerabilities are disclosed and weaponized on daily basis and no tools can replace continues and threat oriented security processes. Recent attacks showed that even mature organizations are struggling with being ahead of attacks as prioritized and focused vulnerability management is still a challenge. Speech will cover current vulnerabilities landscape and how to design next generation vulnerability process.


Сonfidential information protection in the modern world: reducing risks, investment protection, technology DLP

Vladlen Lartsin,
Technical Support Leader of Symantec and VERITAS division, Symantec

As data is likely one of your organization’s most valuable assets,protecting it and keeping it out of the public domain is of paramount importance. In order to accomplish this, a number of DLP controls must be implemented, combining strategic, operational and tactical measures.
However, before DLP controls can be effectively implemented, your organization must understand the answer to these three fundamental questions:
1. What sensitive data do you hold?
2. Where does your sensitive data reside, both internally and with third parties?
3. Where is your data going?
This presentation explores these questions and the challenges organizations face in relation to business drivers and regulatory obligations for protecting this data. We will share our point of view and approach to data loss prevention, along with insights and lessons learned from our experiences working with some of the most advanced companies in the world on data loss prevention practices.




Coffee Break and Partners Exhibition


DevOps: Unlocking value of digital transformation

Roman Lobus,
Business critical consultant, Hewlett-Packard Enterprise

In the age of digital disruption, organisations are fundamentally measured by the speed at which they deliver new products and services, how they innovate and the reliability of their operations. Traditional models of application development and service delivery, which have multiple handovers between silos, face challenges when trying to achieve higher rates of change. This is where DevOps comes in and why it is fundamental to the success of Digital Transformation. We view DevOps as the “engine room of change” that allows new ideas to be delivered quickly. DevOps is a response to the perceived weaknesses of existing models and seeks to draw from Agile, Lean, Systems thinking, the Theory of Constraints and many other areas to create a new model that emphasises the fast flow of work across the entire application and product lifecycle


Security as an Enabler to Digital Transformation

Pavel Sotnikov,
Managing Director for Eastern Europe, Caucasus and Central Asia, Qualys

Innovations in cyber-attacks analysis – the ThreatSCALE model

Artem Mykhailov,
Information Security Expert

ThreatSCALE is a comprehensive model that describes the stages of attacks in Cyberspace. This model was developed by experts of the cyber laboratory as a result of studying and investigating numerous attacks targeting at IT infrastructures of various organizations of Ukraine.




Event Wrap-Up


Nadia Doroshenko

Sales & Marketing Manager


+380 675 165 889