Program change reserved.
9:05 – 9:25
Opening Keynote
The agenda will be published soon.
TBA
Don’t be afraid of “GRC”
The legislative requirements and regulations may seem daunting for many organizations, but they are essential. They help enhance organizations’ resilience against cyber threats and establish a unified defense framework. Laws and rules define what and how to protect, describe risks and their management, create frameworks, and strengthen defense capabilities. In addition to these topics, we will address another critical area, supply-chain security.
TBA
DDoS attacks as a current digital threat how to effectively deal with them
In today’s world, DDoS attacks aimed at disrupting the smooth operation of publicly available services are common. They appear more frequently as a part of hybrid warfare, hacktivism, or competitive battles. Their execution is inexpensive, while defense against them is exponentially more complex and costly. The targets of these attacks are specific devices, services, or infrastructure, and even internet service providers often struggle to deal with them. Do you know what the effective ways to protect against DDoS attacks are?
TBA
Coffee Break
TBA
The joys and sorrows of everyday cybersecurity operations
The daily operation of securing an organization is a never-ending process. It involves organizational and technical measures, a dash of adrenaline, a wealth of knowledge, and a constantly changing environment—both internally from a business perspective and externally in terms of threats. With the panelists, we will explore how to optimally design security architecture, subsequently implement security measures, conduct security monitoring, and test the resilience, quality, and functionality of measures to protect the organization’s data, systems, and infrastructure.
TBA
Shark Tank – 3 minute presentations
Partners of the conference are invited to the stage and have 3 minutes to give their best to present their product or service. After the presentation concludes, the audience will vote for their favorite technology. Who will become the best?
Anect
SentinelOne
účastník
TBA
This is how we solved it
A good security incident is never bad. If an organization overcomes it, and of course, survives it, it strengthens it. There comes a moment of realization, the company becomes more resilient, better prepared, and more cohesive. What have security incidents taught us over the past two years? Security experts share real-life examples from their experiences, rich with lessons and recommendations. Can we learn from others’ mistakes, or only from our own?
TBA
Lunch Break
TBA
Caring for people in information security
• Recruitment, or choosing people in a new way
• The recruitment gap between generations
• What are the current job open security positions?
• Caring for people (difference between early days and later)
• People development
TBA
Coffee Break
TBA
Let’s look at security through the window of the future
• How do attacks develop and what is the biggest one
• Overview of innovative technologies
• Threats arising from new technologies
• New technologies in information security
• Opportunities
TBA
FIRESIDE CHAT: Technology on the Frontline
• How are technology companies currently approaching the protection of organizations?
• How autonomous are the technologies?
• Where is the development heading?
TBA
Networking dinner
TBA
Bowling tournament