Qubit Conference Slovakia 2025 Trainings
Risk management aligned with the updated methodology introduced under the provisions of the Cybersecurity Act
The training will take place on November 12, 2025.
The goal of this training is to explain the new risk management methodology and related updates. During the training, we will go through practical examples and cover all three approaches to risk management: Qualitative approach to risk management Semi-quantitative approach Quantitative methodology – a new element of the updated methodology Through practical simulations, participants will define and test the entire risk management lifecycle. By the end of the training, participants will learn how to set up risk management processes that effectively connect information security and business needs, and how to clearly explain key concepts to the organization’s top management.
Key Takeaways:
- Introduction to the new risk management methodology
- Positioning the risk management process as an essential part of organizational management
- Explanation of different risk management approaches: qualitative, semi-quantitative, and quantitative
- Demonstration of practical risk management implementation within an organization (aligned with EBA/GL/2019/04 and DORA)
- Understanding ICT security risk as part of the organization’s overall risk profile
- Setting KPIs in risk management with a focus on risk appetite and risk tolerance
- Effective reporting and escalation methods at various organizational levels
- Practical asset inventory management as a core element of risk management
- Building a risk management process understandable to both IT administrators and board members
More About the Training
As a bonus, we will also touch on cloud risk management and cover a special case of mitigating exit procedures, as well as risk management for artificial intelligence systems.
Trainer
Jozef Uroda
ICT and Security Risk Manager | Tatra banka | Slovakia
Expert Guest
Marek Zeman
General Director | Competence and Certification Center for Cybersecurity | Chairman of the CISO Club | Slovakia
Using ISO 27001 to comply with The Cybersecurity Act
The training will take place on November 12, 2025.
The training is divided into theoretical and practical parts.
In the theoretical part, participants will gain a basic overview of the information security management system (ISMS) according to ISO 27001:2023, become familiar with the Cybersecurity Act and the Decree on Security Measures, and learn how these requirements overlap with the ISO 27001 standard.
More About the Training
The practical part focuses on the implementation of ISO 27001 according to the ISO 27003 standard, with each step accompanied by hands-on exercises. Participants will go through all phases of the process:
- Context of the organization
Leadership and security policy - Planning, including risk analysis according to ISO 27005 and linking the requirements of the Decree to the Cybersecurity Act (ZoKB) with ISO 27001 controls
- Support
- Operation
- Performance evaluation
- Improvement
Participant Requirements:
- Participants should have basic knowledge of security concepts – risk, threat, vulnerability.
- Knowledge of technical controls on hosts and networks is an advantage, as work with risks will be demonstrated using technical risk examples.
- Familiarity with information security or IT management processes is also an advantage.
Cloud Security: Protecting Public Cloud Workloads
The training will take place on November 12, 2025.
More About the Training
The training will cover key AWS security domains including Identity and Access Management, Data Protection, Network & Perimeter Security, and Cloud Governance and Compliance. Attendees will learn how to design secure cloud architectures, implement fine-grained access controls, protect sensitive data using encryption and key management, and enforce governance policies.
Throughout the training, participants will gain both theoretical insights and practical experience through structured content and hands-on exercises delivered via pre-configured training labs. Each lab will function as a challenge in a Capture the Flag-style format, where participants earn points by successfully completing tasks and solving security scenarios. The final score will be evaluated at the end of the training.
Prerequisites:
- Have a working knowledge of English, as the training materials and labs will be delivered in English.
- Personal laptop with Wi-Fi capability and modern browser (Chrome, Firefox, Edge)
- General knowledge of IT infrastructure and security principles (e.g. access control, encryption, network segmentation)
- Basic understanding of cloud computing concepts, including IaaS and PaaS service models
- Familiarity with AWS fundamentals (e.g. IAM, EC2, S3, VPC) is recommended but not mandatory.
Trainers
CISO | Tatra banka | Slovakia