Qubit Conference®
Prague 2026

About Event

Date: May 18 – 20, May 2026

Venue: Orea Hotel Pyramida, Prague

Audience: : CISOs, CTOs, CSOs, Information Security Managers, SOC Managers, Cyber Risk Managers, Security Architects, Forensic Experts, Security Engineers, and other specialists.

Conference Main Theme

The Trust Shift: Cybersecurity in the Age of Intelligent Autonomy

From human judgment to algorithmic control — can we still trust?

Security is changing in real time. AI is taking the wheel, autonomous systems are making decisions, and protocols run without human involvement. After years of building resilience, a new challenge emerges — trust in autonomy. Trust in systems that learn, never sleep, and remain beyond our full understanding. The Trust Shift is a silent earthquake shaking the very foundations of cybersecurity. Manual control is fading, traditional trust models are collapsing, and we are forced to rethink everything — from identity to the right to decide. That is exactly what Qubit Conference® Prague 2026 will be about.

Thematic
Blocks

Code Without Humans – AI, Autonomy and the End of Control

Focus: automated attacks, LLMs, autonomous defense systems, human-free red teaming

Securing Ordinary AI: How to Control What’s Already Running

Focus: robotic process automation, day-to-day AI operations, AI risk management

Synthetic Truth– Identity, Deepfakes and the Collapse of Verification

Focus: synthetic identities, deepfakes, social manipulation

Trustless by Design – Zero Trust in a Borderless Infrastructure

Focus: Zero Trust, cloud-native security, multicloud, edge computing, SBOM, CI/CD

Governance at Gunpoint – Regulation, Sovereignty & Accountability in Autonomy

Focus: AI Act, CRA, NIS2, digital sovereignty, accountability of autonomous systems

Practical trainings

09:00 – 17:00

How to Secure AI Generated Code Using Open Source Tools

Trainer
Mackenzie Jackson

Mackenzie Jackson

Researcher & Advocate |
Aikido Security | Netherlands

More

09:00 – 17:00

How to analyze Android malware

Trainer
Shyam Sundar R.

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

More

09:00 – 17:00

We are preparing the training for you.

Trainer
The speaker will be published soon.

The trainer will be published soon.

Conference moderator
Nicol Dankova

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

More

EXECUTIVE TRACK

1st Conference Day

Conference moderator
Boris Mutina

Boris Mutina

Security analyst | Excello and Virusfree.cz | Czech Republic

More

TECHNICAL TRACK

1st Conference Day

08:00-09:00

Registration

09:00-09:15
Keynote speaker
Maria Krahulecova

Maria Krahulecova

Co-founder of QuBit Security | Slovakia

More

Keynote speaker
Ondrej Krehel

Ondrej Krehel

Digital Forensics and Cybersecurity professional | USA

More

EXECUTIVE TRACK

Conference Opening

09:15-09:50

Keynote speaker
Nicol Dankova

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

More

EXECUTIVE TRACK

Post-Quantum Is Not Postponable: Rebuilding Trust Before It Breaks

Imagine your encryption like milk — it has an expiration date. Traditional algorithms like RSA and ECC have served us well for decades, but the quantum era is putting a “best before” label on them. Quantum computers are no longer the future they are already here and “harvest-now, decrypt-later” attacks are a real threat. If you want your data to remain confidential beyond 2030, the time to act is now. This is not just an IT issue. It’s about trust, reputation, contractual obligations, and legal responsibility. The world is moving fast. NIST has already approved post-quantum cryptography (PQC) standards, the NSA has introduced CNSA 2.0, and the European Union is advancing its own initiatives. Hybrid cryptography is only a temporary solution. Use it to keep your systems operational while transitioning to a fully post-quantum environment. But migration takes years — so start now: take inventory, set priorities, test, and deploy new solutions across TLS, code signing, firmware, VPNs, IAM, backups, and archives. Those who hesitate will become easy targets. Adopt a Zero Trust mindset for cryptography and assume failure, isolate, rotate, monitor, and verify. Crypto agility is becoming the new competitive edge: automate processes, accelerate change, and make it part of your everyday operations. Start today. Take small, measurable steps and automate wherever possible. Your future self and your auditors will thank you.

09:50-10:35

Keynote speaker
Dave Lewis

Dave Lewis

Global Advisory CISO | 1Password | Canada

More

EXECUTIVE TRACK
Agentic Gremlins: Do Not Feed After Midnight
Agentic systems are powerful. They can browse the web, use tools, store context, and act autonomously. That same power makes them an ideal target. OWASP’s 2025 list flags prompt injection and AI supply-chain risks as top concerns. Real incidents have already shown that malicious extensions, hidden instructions in web pages, and uncontrolled autonomous actions can lead to data leaks, environment damage, and compromised developer accounts. This talk explains why well-intentioned agents still execute dangerous instructions, maps the main attack types, and links them to concrete failure modes. We focus on defenses that actually reduce risk: strong isolation for browsing and retrieval, safe and typed tool invocation, signing of models and extensions, disciplined credential management (vaults, short-lived identities, rotation), and egress controls that prevent sensitive data from leaking out. A practical guide to running autonomous agents without turning them into an attack on your own infrastructure.
10:35-11:20
Keynote speaker
The speaker will be published soon.

The speaker will be published soon.

EXECUTIVE TRACK
The title of the presentation will be announced shortly.

11:20-11:40

Coffee break and refreshments
11:40-12:25
Keynote speaker
The speaker will be published soon.

The speaker will be published soon.

EXECUTIVE TRACK

The title of the presentation will be announced shortly.
12:25-13:05
EXECUTIVE TRACK

Shark Tank – 3 minute presentations

13:05-14:05

Lunch Break

14:05-14:50
Speaker
Domagoj Maric

Domagoj Maric

AI Customer Delivery Manager | Pontis Technology | Croatia

More

EXECUTIVE TRACK

“The Dead Internet Theory” and Its Cybersecurity Implications in the Age of Generative AI and Online Authenticity

The once-conspiratorial “Dead Internet Theory” — the idea that large parts of the online world are now filled with automated content and bots has taken on new relevance in the era of generative AI. While the theory itself remains speculative, its core concern is very real: the erosion of authenticity in the digital environment. This session explores how AI-generated content influences perception, user engagement, and social engineering; the cybersecurity risks posed by botnets and content manipulation; and the role of the EU AI Act and similar regulatory initiatives in promoting transparency, trust, and digital integrity. Attendees will gain insights into strategies for detecting synthetic activity, preserving the credibility of online platforms, and understanding how cybersecurity and data professionals are protecting the “human layer of the Internet” where the line between automation and authenticity grows increasingly thin.
14:05-14:50
Speaker
Josh Pyorre

Josh Pyorre

Security Research Engineering Technical Leader | Cisco (Talos) | USA

More

TECHNICAL TRACK
The Agentic SOC
Imagine a Security Operations Center (SOC) where humans are replaced by agentic artificial intelligence yet it remains as effective as a traditional SOC. This session explores how large language models (LLMs) can take over roles currently performed by analysts, threat hunters, and administrators, and what this shift means for the future of cybersecurity. The discussion will also address new types of threats that may emerge in autonomous environments and how attackers might adapt their tactics. Real-world examples will demonstrate LLM agents replacing human roles within an experimental SOC designed to deliver affordable security operations and monitoring for small businesses and non-profit organizations. Participants will also gain access to code and implementation guidelines, enabling them to experiment with the concept of an agentic SOC in their own environments.
14:50-15:25
Speaker
Joseph Carson

Joseph Carson

Chief Evangelist & Advisory CISO | Segura

More

EXECUTIVE TRACK

You Can’t Secure What You Don’t Measure: Real-World Identity Metrics for Reducing Risk

In a world where trust is being redefined by autonomous systems, AI decision-making, and identity sprawl, traditional security measures are no longer sufficient. Identity has become the central attack surface, but all too often, identity programs operate on intuition or incomplete data, leaving gaps that adversaries exploit. This session shows how identity success is rooted in meaningful metrics that connect tactical security controls to strategic business outcomes. Prostredníctvom reálnych príkladov a prípadov použitia z globálnych podnikov, implementácií a prevádzok SOC sa dozviete, ako premeniť údaje o identite na využiteľné informácie, ktoré odhaľujú skryté riziká, urýchľujú detekciu a reakciu a podporujú riadenie a dodržiavanie predpisov. Through real-world examples and use cases from global enterprises, deployments, and SOC operations, you will learn how to transform identity data into actionable intelligence that exposes hidden risks, accelerates detection and response, and supports governance and compliance. Attendees will see how metrics clarify the difference between noise and signals, align IAM/PAM/ITDR activities with Zero Trust and The Principle of Least Privilege, and help security leaders articulate identity risk and ROI to executives. From tracking privilege drift and non-human identity risk to identity-centric MTTC/MTTD measurements and behavioral signals, this session will equip you with the frameworks and examples needed to operationalize identity metrics today in your own environment.
14:50-15:25
Speaker
The speaker will be published soon.

The speaker will be published soon.

TECHNICAL TRACK
The title of the presentation will be announced shortly.
15:25-15:45

Coffee break and refreshments

15:45-16:20
Speaker
The speaker will be published soon.

The speaker will be published soon.

EXECUTIVE TRACK

The title of the presentation will be announced shortly.

15:45-16:20
Speaker
The speaker will be published soon.

The speaker will be published soon.

TECHNICAL TRACK
The title of the presentation will be announced shortly.
16:20-17:20
Keynote speaker
The speaker will be published soon.

The speaker will be published soon.

EXECUTIVE TRACK
The title of the presentation will be announced shortly.
17:20-17:35
EXECUTIVE TRACK

Conclusion of the first conference day

19:00-24:00

Networking dinner

Conference moderator
Nicol Dankova

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

More

EXECUTIVE TRACK

2nd Conference Day

Conference moderator
Boris Mutina

Boris Mutina

Security analyst | Excello and Virusfree.cz | Czech Republic

More
TECHNICAL TRACK

2nd Conference Day

09:00-09:05
Conference moderator
Nikol Dankova

Nikol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

More

Conference moderator
Boris Mutina

Boris Mutina

Security analyst | Excello and Virusfree.cz | Czech Republic

More

EXECUTIVE TRACK

Opening of the second day of the conference

09:05-09:40
Speaker
Joseph Carson

Joseph Carson

Chief Evangelist & Advisory CISO | Segura

More

EXECUTIVE TRACK
From Cyber War to Digital Trust: Estonia’s Evolving Blueprint for National Resilience
Estonia was one of the first nations to experience a coordinated cyber campaign targeting national digital services. Rather than retreating or centralizing control, Estonia responded by redesigning how trust, identity, and resilience were engineered into the foundations of government and public services. This session examines Estonia’s transformation from cyber target to digital pioneer through a practical, security-first lens. It explores how digital identity, decentralized trust, cryptographic integrity, and interoperability were deliberately designed to survive disruption, limit blast radius, and preserve citizen trust. Moving beyond headlines, the session focuses on how these systems actually work in practice, what trade-offs were made, and what failed before succeeding. Attendees will learn which elements of Estonia’s approach are transferable to enterprises, critical infrastructure, and governments today and which are uniquely tied to national sovereignty. The session closes by examining how Estonia is preparing for the next phase of trust challenges, including AI-enabled services and cross-border digital identity.
09:40-11:10
Keynote speaker
Zuzana Relovska

Zuzana Relovska

CEO | Wellbeing Advisory | Slovakia

More

Keynote speaker
Lenka Madudova

Lenka Madudova

Trainer | Wellbeing Advisory | Slovakia

More

EXECUTIVE WORKSHOP

Mind as Your Firewall: Neurohacks for Focus, Resilience & Grit

In cybersecurity and other high-stakes fields, mental performance is a critical asset – yet constant alerts, multitasking and 24/7 connectivity steadily drain focus and decision-making capacity. This 90-minute interactive workshop introduces neurohacking: science-based strategies to optimize brain performance and build mental resilience in demanding environments.

Participants will learn how the brain responds to stress and uncertainty, and how to deliberately train grit, focus and adaptive thinking to stay effective under pressure. Through practical exercises and evidence-backed tools, you will explore how to:

– stay calm, clear and confident in high-pressure situations,
– use simple “neurohacks” to boost focus, memory and mental stamina,
– activate the vagus nerve to balance the nervous system and enhance cognitive agility,
– recover faster from setbacks and maintain consistent performance,
– strengthen grit and self-confidence to sustain motivation in uncertainty.

Why attend: In cybersecurity, clarity under pressure and mental endurance are key defenses. This session will help you protect your brain from burnout, sharpen your cognitive edge and lead with resilience and confidence – whatever the challenge.

09:40-11:10
Keynote speaker
The speaker will be published soon.

The speaker will be published soon.

TECHNICAL WORKSHOP

The title of the workshop will be announced shortly.

11:10-11:30

Coffee break and refreshments
11:30-12:15
Speaker
Aleksander Gorkowienko

Aleksander Gorkowienko

Head of Security Testing Team | Risk Crew | United Kingdom

More

EXECUTIVE TRACK
Behavioural Risk Scoring: A New Trust Metric for AI-Age Access Management
In an era where artificial intelligence can mimic faces, voices, and even entire identities, traditional authentication methods such as passwords, PINs, and biometrics are no longer enough. The question is shifting from “Who are you?” to “How do you behave?” The answer lies in Behavioural Risk Scoring (BRS) — a revolutionary approach that measures trust based on real-time user behaviour. It analyses patterns such as typing rhythm, mouse movement, navigation flow, and contextual signals. BRS continuously verifies identity, adapts to changing risks, and integrates naturally into Zero Trust architectures. Real-world results from the financial and healthcare sectors show that this technology reduces false positives, limits insider threats, and enhances user experience — all without adding friction or complexity. But with great power comes great responsibility: where is the line between behavioural trust and user surveillance? This session offers a fresh perspective on trust in the AI era — where behaviour becomes identity, and adaptability defines the new foundation of security.
11:30-12:15
Speaker
Jan Dusatko

Jan Dusatko

Security Principal | DHL IT Services, s.r.o. | Czech republic

More

TECHNICAL TRACK
Agile cryptography impact on business
Post-quantum cryptography (PQC) and the concept of a Cryptography Bill of Materials (CBOM) are becoming essential topics for companies aiming to protect their systems against future quantum threats. This talk will explain what quantum-resistant cryptography is, why organizations cannot afford to ignore it, and what economic, operational, and supply-chain impacts its adoption may bring. We will focus on planning cryptographic changes within the system lifecycle, potential cost drivers, regulatory expectations across different regions, standardization efforts, and the role of CBOM in asset management. Attendees will gain a clear overview of the steps they should begin planning for today.
12:15-12:50
Speaker
Marek Zeman

Marek Zeman

Reserchear | FIIT STU BA | Chairman CISO Club | Slovakia

More

EXECUTIVE TRACK

Security Requirements for Contracts with Third Parties, Ranging from Mandatory to Optional
The NIS2 directive and the DORA regulation significantly raise cybersecurity requirements for organizations and their suppliers. In addition to mandatory measures, recommended standards and increasingly common above-standard client expectations create ambiguity and friction such as differing assessments of the severity of security incidents or the scope of required communication. This talk will categorize these requirements into legally binding, recommended, and optional, clarifying where obligations end and “best practice” begins. It will summarize the key NIS2 and DORA requirements for third parties, their priority, and their practical impact. Finally, it will provide a concrete overview of what modern supplier contracts should contain, along with actionable steps to help organizations update their contractual frameworks without unnecessary conflict.
12:15-12:50
Speaker
Yohann Sillam

Yohann Sillam

Senior Security Researcher | Imperva | Israel

More

TECHNICAL TRACK

Securing LLM-Integrated Systems: Real-World Vulnerabilities and Practical Recommendations
As large language models become deeply integrated into tools, IDEs, APIs, and automation workflows, application architectures inherit a significantly expanded attack surface. This session outlines common architectural patterns (RAG, function calling, agents, MCP servers, plugin ecosystems) and highlights typical failure points from prompt injection and fragile JSON handling to command-execution vectors. The core of the talk features case studies of real, high-impact vulnerabilities in popular agents and MCP servers, including instances of remote code execution. We conclude with a practical defense playbook: clear recommendations for evaluating, hardening, and monitoring LLM-enabled systems. Attendees will gain a concise overview of where and how to apply security best practices in this rapidly evolving AI ecosystem.
12:50-13:50

Lunch Break

13:50-14:25
Speaker
Martin Pavelka

Martin Pavelka

MKB and Researcher | Exemplar.sk and FIIT STU | Slovakia

More

EXECUTIVE TRACK

Securing Ordinary IT in SMB with tight budget

Small and medium-sized businesses (SMBs) and the public sector often struggle to meet cybersecurity requirements due to limited budgets and capacities. Although they typically do not use cutting-edge AI tools, they must still comply with legislative and regulatory standards, particularly ISO 27001 and NIS2. Recent incidents across government systems, healthcare, and critical services highlight the need to “do more with less” to creatively leverage existing technologies and low-cost solutions. This presentation will introduce practical and accessible strategies for SMBs and the public sector to strengthen cybersecurity using existing, free, or open-source tools while supporting ISMS and compliance with NIS2/ISO 27001. Special attention will be given to operators of essential services, who face stricter requirements. Participants will receive concrete recommendations on how to secure “ordinary IT” environments in a way that meets regulatory expectations while remaining financially sustainable.
13:50-14:25
Conference moderator
Boris Mutina

Boris Mutina

Security analyst | Excello and Virusfree.cz | Czech Republic

More

TECHNICAL TRACK
Race against the spam AI machine
The presentation provides an overview of the current malicious email (“malmail”) landscape – what techniques are prevalent today and how they have evolved with the arrival of large language models (LLMs). On real-world examples (unsolicited spam, fake dating scams, 419 fraud, business email compromise & CEO fraud, malware attachments, etc.) it illustrates how attackers’ strategies are changing and whether we can already see traces of adversarial or malicious LLM use. The presentation also summarizes current methods of malicious email detection, approaches to handling false negatives, and how LLM-based techniques compare with traditional approaches in terms of effectiveness.
14:25-15:00
Speaker
Jan Kopriva

Jan Kopriva

Cyber Security Consultant | Nettles Consulting | Czech Republic

More

EXECUTIVE TRACK

Practical threat modeling for Cyber Resilience Act compliance

The European Cyber Resilience Act (CRA) raises the bar for digital product security, requiring manufacturers to conduct meaningful risk assessments. It sounds simple but it’s not. Most organizations are used to broad, company-wide analyses rather than detailed, product-level risk evaluations. Existing standards such as ISO 27005 or IEC 62443 can help, but they weren’t designed for product-specific analysisbespecially at the hardware or embedded system level. This session will demonstrate how to go beyond formal compliance and build risk assessments that truly add value. Practical threat modeling approaches such as STRIDE and EMB3D will be presented, focusing on identifying real threats relevant to your product’s architecture, interfaces, and constraints. You will learn how to turn legal requirements into actionable steps and use CRA compliance as a driver of genuine cyber resilience, not just as an administrative obligation.

14:25-15:00
Speaker
Charlie Eriksen

Charlie Eriksen

Security Researcher | Aikido Security, Netherlands

More

TECHNICAL TRACK
The Supply Chain Is Already Infected – What We Do After Prevention Stops Working
Over the past year, supply-chain attacks have started to look less like isolated incidents and more like worms, spreading through normal packages and maintainer workflows faster than our defenses can react. This talk looks at what changes once you accept that some compromise is part of the system, and why resilience, detection speed, and blast radius matter more than perfect prevention.
15:00-15:30
Speaker
The speaker will be published soon.

The speaker will be published soon.

EXECUTIVE TRACK
The title of the presentation will be announced shortly.
15:00-15:30
Speaker
Mackenzie Jackson

Mackenzie Jackson

Researcher & Advocate | Aikido Security | Netherlands

More

TECHNICAL TRACK
When Prompts Become Payloads: Exploiting AI Inside infrastructure
Prompt injection was once treated as a harmless quirk of AI systems, mostly demonstrated through chatbot tricks. That view breaks down when AI agents are embedded into CI/CD pipelines and production infrastructure. This talk explores a real world prompt injection vulnerability discovered by Aikido Security in GitHub Actions workflows used by multiple Fortune 500 companies, including Google. These workflows integrated AI agents with privileged access to repositories, workflows, and execution environments. By supplying carefully crafted input, attackers were able to influence AI behavior to perform unintended actions such as executing commands and exposing credentials from inside trusted build pipelines. These were not hypothetical attacks. They were reproduced in controlled environments and responsibly disclosed. The root cause was not a single prompt or configuration issue, but a deeper failure to treat AI driven actions as an untrusted execution surface. Using this case study, the talk examines why common defenses like prompt filtering fail, how trust boundaries collapse when AI is introduced into automation, and what this means for the future of infrastructure security. As AI becomes a core part of build systems and operational tooling, prompt injection serves as an early signal of a broader class of risks that organizations must learn to model and mitigate.
15:30-15:50
Coffee break and refreshments
15:50-16:30
Keynote speaker
The speaker will be published soon.

The speaker will be published soon.

EXECUTIVE TRACK
Panel discussion
16:30-16:45

EXECUTIVE TRACK

Conclusion of the second conference day

Speakers and Trainers

Joseph Carson

Chief Security Evangelist & Advisory CISO | Segura | Estonia

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany | Czech Republic

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Mackenzie Jackson

Researcher & Advocate |
Aikido Security | Netherlands

Marek Zeman
Reserchear | FIIT STU BA | Chairman CISO Club | Slovakia
Josh Pyorre
Security Research Engineering Technical Leader | Cisco (Talos) | USA

Jan Kopriva

Cyber Security Consultant | Nettles Consulting | Czech Republic
Jan Dusatko
Security Principal | DHL IT Services, s.r.o. | Czech republic

Tickets

Important information before the Checkout:

We offer several types of passes to keep things fair for everyone. Please choose the PASS that truly matches your role:

  • Combo Pass – for end-user industry delegates
  • Conference Pass – for end-user industry delegates
  • Public Pass – only for government, academic, and non-profit delegates (proof may be required)
  • Solution Provider Pass – for vendors, sales and business development roles

If the wrong pass is purchased, a price difference will apply or the registration may be cancelled (with a 5% service fee).

For full details, please see our Terms & Conditions.

Thank you for choosing the correct pass and helping us keep the process smooth.

Combo Pass

Conference + training

May 18 – 20
1250 €* Regular price Until 19.4.2026
1050 €* 1450 €*
Early Bird Late price
27.10.-22.12.2025 20.4.-18.5.2026
*Price without VAT

Conference Pass

Conference

May 19 - 20
800 €* Regular price Until 19.4.2026
695 €* 950 €*
Early Bird Late price
27.10.-22.12.2025 20.4.-18.5.2026
*Price without VAT

Training Pass

Training

May 18 
550 €* Regular price Until 19.4.2026
550 €* 550 €*
Early Bird Late price
27.10.-22.12.2025 20.4.-18.5.2026
*Price without VAT

Solution Providers Pass

Conference

May 19 - 20

For vendors, distributors, and integrators who come to build relationships and offer solutions.

950 €* Regular price Until 19.4.2026
950 €* 950 €*
Early Bird Late price
27.10.-22.12.2025 20.4.-18.5.2026

*Price without VAT

Public Pass

Conference

May 19 - 20

For representatives of government institutions, students and university representatives with confirmation of their activities.

450 €* Regular price Until 19.4.2026
450 €* 450 €*
Early Bird Late price
27.10.-22.12.2025 20.4.-18.5.2026

*Price without VAT

Venue

OREA Hotel Pyramida, Bělohorská 24, 169 00 Prague

For the best rates, book your accommodation via this link.

On the date 17-20 May: SINGLE/DOUBLE at the price of 116/122 EUR.

The discounted reservation is available while limited capacity lasts, but must be made by 20/04/2026 at the latest.

After this date or when the promised capacity is exhausted, reservations will be confirmed on request only and the hotel reserves the right to set prices according to availability.

Cancellation conditions:

The reservation can be canceled free of charge up to 14 days in advance. In case of cancellation less than 14 days before arrival, a cancellation fee equal to the cost of the entire stay will be charged.

Breakfast, Wi-Fi and VAT are included in the price.

The price does not include city tax and parking: 11€ (250 CZK)/day.

If you wish to send an invoice for accommodation with company details, please indicate this in the “Special request” field on the booking form.

Speaking Bureau

The Speaking Bureau is annually responsible for the most important task,
which is compiling the list of speakers and their topics at the highest professional and qualitative level.

Speaking Bureau for conference
and panel discussions

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany | Czech Republic

Shyam Sundar R.

Senior Manager | Arctic Wolf Networks | India

Joseph Carson

Chief Security Evangelist & Advisory CISO | Segura | Estonia

Mackenzie Jackson
Researcher & Advocate | Aikido Security | Netherlands
Marek Zeman
Reserchear | FIIT STU BA | Chairman CISO Club | Slovakia

Partnering With Us Means Hitting the Mark Among Security Elite

Potential customers? Yes, they will be there.

Market developments? With us, in real time.

Your logo? Visible. Your people? In touch. In the right context.

New standards? We’re their primary testing ground.

Reach out and let’s go over the details.

Partners

Gold partners
Basic partners

Media partners

Supporting partners

Platinum partner

Silver partners

Bronze partners

Shark Tank partners

Jan Kopriva

Cyber Security Consultant | Nettles Consulting | Czech Republic

Vitaly Simonovich

Threat Intelligence Researcher | Cato Networks | Israel

Ondrej Krehel

Digital Forensics and Cybersecurity professional | USA

Josh Pyorre

Security Research Engineering Technical Leader | Cisco (Talos) | USA

Marek Zeman

CEO | Competence and Certification Center for Cyber Security | Chairman of the Qubit CISO Club | Slovakia

Zuzana Relovska

CEO | Wellbeing Advisory | Slovakia

Boris Mutina

Security analyst | Excello a Virusfree.cz | Czech Republic

Maria Krahulecova

Co-founder of QuBit Security | Slovakia

Lenka Madudova

Dave Lewis

Aleksander Gorkowienko

Domagoj Maric

Martin Pavelka

Jan Dusatko

Yohann Sillam

Ladislav Snapko

Tamas Buzgo

Stanislav Balko

Chief of Information Technology Department | University Hospital Martin | Slovakia

Michal Kaprinay

Systems Engineer | Fortinet | Slovakia

Lubomir Kriz

CISO | Slovak Post | Slovakia

Slavomir Zavacky

Head of Distribution System Automation Department | Východoslovenská distribučná a.s. and Západoslovenská distribučná a.s. | Slovakia

Zuzana Halasova

Head of the Cyber Security Department | the Slovak Ministry of the Interior | Slovakia

Marcela Zimova

Chief Information Security Officer | Piano Software | Slovakia

Zdenek Huspenina

Head of AI Solutions | Blogic | Czech Republic

Michal Gross

Head of IT Security | 365.bank | Slovakia

Boris Mittelmann

Senior Systems Engineer | Veeam Software | Slovakia

Branislav Magula

Global Cyber Security Manager | Marelli | Slovakia

Florian Ettinger

Solutions Architect | AWS Austria

Maximilian Stremy

rector | STU | Slovakia

Martin Zajicek

CISO | Medirex, a.s. | Slovakia

Ivan Malik

CEO/CTO | Logicworks | Slovakia

Ondrej Krajc

Solution Architect | ESET | Slovakia

Zuzana Rebrova

Head of Third Party Cyber Risk Management | Swiss Re | Slovakia

Rastislav Beno

EMEA Information Security & Cyber Resilience Manager | Mitsubishi Chemical Group Corporation | Slovakia

Pavol Dovicovic

Executive Consultant , certified auditor | Cyber Security Competence and Certification Centre | Slovakia

Michal Srnec

CISO | Aliter Technologies | Slovakia

Milan Oselsky

Partner & Board Member | Xolution Robots | Slovakia

Ing. Radoslav Stefanek

State Secretary of the Ministry of Investments, Regional Development and Informatization of the Slovak Republic and Government Plenipotentiary for Artificial Intelligence.

Martin Kupci

CISO | Tatra banka | Slovakia

Mackenzie Jackson

Researcher & Advocate | Aikido Security | Netherlands

Dusan Petricko

Cyber Security Domain Lead | SLSP | Slovakia

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

Igor Urban

Territory Account Manager | Forcepoint | Slovakia

Jean Gobin

Senior Technical Architect | Truesec AB | Sweden

Andrea Pezzotti

Global Head Cyber Security Operations | Sandoz | Czech Republic

Tiarne Hawkins

CEO & Co-Founder | Optica Labs | USA

Michal Susko

IT GRC and Security Team Leader | VOLKSWAGEN Financial Services Slovakia | Slovakia

Jozef Filko

Cyber security consultant | beluga | Slovakia

Tudor Damian

Cybersecurity & Cloud Advisor | D3 Cyber | Romania

Charles Tango

CISO | SYSCO | USA

Lukas Hatala

Regional CTO | DXC Technology | Slovakia

Pavel Minarik

VP, Product Security | Progress Software | Czech Republic