Qubit Conference Slovakia 2025 Trainings

Risk management aligned with the updated methodology introduced under the provisions of the Cybersecurity Act

The training will take place on November 12, 2025.

On-site | Duration: 6 hours | Suitable for: CISO, CSO, Risk Managers, Cybersecurity Managers, Security Officers, positions responsible for defining security policies, positions responsible for methodological security management, information security consultants | Maximum number of participants: 20.

The goal of this training is to explain the new risk management methodology and related updates. During the training, we will go through practical examples and cover all three approaches to risk management: Qualitative approach to risk management Semi-quantitative approach Quantitative methodology – a new element of the updated methodology Through practical simulations, participants will define and test the entire risk management lifecycle. By the end of the training, participants will learn how to set up risk management processes that effectively connect information security and business needs, and how to clearly explain key concepts to the organization’s top management.

Key Takeaways:

  1. Introduction to the new risk management methodology
  2. Positioning the risk management process as an essential part of organizational management
  3. Explanation of different risk management approaches: qualitative, semi-quantitative, and quantitative
  4. Demonstration of practical risk management implementation within an organization (aligned with EBA/GL/2019/04 and DORA)
  5. Understanding ICT security risk as part of the organization’s overall risk profile
  6. Setting KPIs in risk management with a focus on risk appetite and risk tolerance
  7. Effective reporting and escalation methods at various organizational levels
  8. Practical asset inventory management as a core element of risk management
  9. Building a risk management process understandable to both IT administrators and board members
As part of the training, we will explore the reasons and needs for managing ICT risks. The new risk management methodology will be introduced directly by one of its authors. We will explain the role of risk management within an organization and how it should contribute to overall security governance. Following this, we will present the fundamental theories that will be used throughout the training, with a focus on qualitative and semi-quantitative approaches. Participants will learn how vulnerabilities, threats, and risks are interconnected, and how to create a sustainable asset management concept that serves as a solid foundation for effective risk management — not just on paper, but also in practical application. We will also explain the links to other essential organizational processes and how risk management operates in synergy with other management processes, ensuring a comprehensive and integrated approach.
You can also look forward to demonstrations showcasing practical implementations of various methods, as well as an overview of the most common mistakes made when implementing a security risk management system.
Together, we will go through practical exercises focused on creating processes for risk management in specific application solutions, with the goal of risk analysis using a library of vulnerabilities and threats, creating evaluation matrices and their use, designing mitigating measures, and defining key indicators for monitoring the risk profile using risk appetite and tolerance. In this way, we will go through the entire cycle of security risk management using specific situations.

As a bonus, we will also touch on cloud risk management and cover a special case of mitigating exit procedures, as well as risk management for artificial intelligence systems.

Trainer

Jozef Úroda

Jozef Uroda

ICT and Security Risk Manager | Tatra banka | Slovakia

Expert Guest

Marek Zeman

Marek Zeman

General Director | Competence and Certification Center for Cybersecurity | Chairman of the CISO Club | Slovakia

Using ISO 27001 to comply with The Cybersecurity Act

The training will take place on November 12, 2025.

On-site | Duration: 6 hours | Suitable for: Employees who have found themselves in the position of a cybersecurity manager and need to start addressing compliance with the Cybersecurity Act (ZoKB) and decrees. The training is not suitable for established CISOs or people who have been working in information security management for a longer time (e.g., 3+ years) | Maximum number of training participants: 15.

The training is divided into theoretical and practical parts.

In the theoretical part, participants will gain a basic overview of the information security management system (ISMS) according to ISO 27001:2023, become familiar with the Cybersecurity Act and the Decree on Security Measures, and learn how these requirements overlap with the ISO 27001 standard.

The practical part focuses on the implementation of ISO 27001 according to the ISO 27003 standard, with each step accompanied by hands-on exercises. Participants will go through all phases of the process:

  1. Context of the organization
    Leadership and security policy
  2. Planning, including risk analysis according to ISO 27005 and linking the requirements of the Decree to the Cybersecurity Act (ZoKB) with ISO 27001 controls
  3. Support
  4. Operation
  5. Performance evaluation
  6. Improvement
The goal of the training is to prepare participants for the effective implementation and management of an Information Security Management System (ISMS) in practice.

Participant Requirements:

  1. Participants should have basic knowledge of security concepts – risk, threat, vulnerability.
  2. Knowledge of technical controls on hosts and networks is an advantage, as work with risks will be demonstrated using technical risk examples.
  3. Familiarity with information security or IT management processes is also an advantage.

Trainer

Chromek

Daniel Chromek

CISO | ESET | Slovakia

Cloud Security: Protecting Public Cloud Workloads

The training will take place on November 12, 2025.

On-site | Duration: 6 hours | Suitable for: Cloud Security Engineers, Security Consultants, Security officers, CISOs/Security Managers, Cloud Architects, Solutions Architects, Cloud Migration Consultants, DevSecOps Engineers. Maximum number of training participants: 30.
This full-day training provides a comprehensive overview of security in public cloud environments, with a focus on IaaS and PaaS models in Amazon Web Services (AWS). Participants will explore the core principles of cloud security and gain hands-on experience in securing various layers of cloud infrastructure and services.

The training will cover key AWS security domains including Identity and Access Management, Data Protection, Network & Perimeter Security, and Cloud Governance and Compliance. Attendees will learn how to design secure cloud architectures, implement fine-grained access controls, protect sensitive data using encryption and key management, and enforce governance policies.

Throughout the training, participants will gain both theoretical insights and practical experience through structured content and hands-on exercises delivered via pre-configured training labs. Each lab will function as a challenge in a Capture the Flag-style format, where participants earn points by successfully completing tasks and solving security scenarios. The final score will be evaluated at the end of the training.

Prerequisites:

  1. Have a working knowledge of English, as the training materials and labs will be delivered in English.
  2. Personal laptop with Wi-Fi capability and modern browser (Chrome, Firefox, Edge)
  3. General knowledge of IT infrastructure and security principles (e.g. access control, encryption, network segmentation)
  4. Basic understanding of cloud computing concepts, including IaaS and PaaS service models
  5. Familiarity with AWS fundamentals (e.g. IAM, EC2, S3, VPC) is recommended but not mandatory.

Trainers

Martin Kupči
Martin Kupci

CISO | Tatra banka | Slovakia

Dizajn bez názvu (2)
Florian Ettinger
Solutions Architect | AWS | Austria

Jozef Úroda

ICT & Security risk manažér | Tatra banka  Slovensko

Marek Zeman

Generálny riaditeľ | Kompetenčné a certifikačné centrum kybernetickej bezpečnosti | Chairman Qubit CISO Clubu | Slovensko

Daniel Chromek

CISO | ESET | Slovensko

Martin Kupči

CISO | Tatra banka | Slovensko

Florian Ettinger

Solutions Architect | AWS | Rakúsko

Jozef Uroda

ICT & Security risk manager

Tatrabanka | Slovakia

Marek Zeman

CEO | Competence and Certification Center for Cyber Security | Chairman of the Qubit CISO Club | Slovakia

Daniel Chromek

CISO | ESET | Slovakia

Martin Kupci

CISO | Tatra banka | Slovakia

Florian Ettinger

Solutions Architect | AWS Austria

Lenka Madudova

Dave Lewis

Aleksander Gorkowienko

Domagoj Maric

Martin Pavelka

Jan Dusatko

Yohann Sillam

Ladislav Snapko

Tamas Buzgo

Stanislav Balko

Chief of Information Technology Department | University Hospital Martin | Slovakia

Michal Kaprinay

Systems Engineer | Fortinet | Slovakia

Lubomir Kriz

CISO | Slovak Post | Slovakia

Slavomir Zavacky

Head of Distribution System Automation Department | Východoslovenská distribučná a.s. and Západoslovenská distribučná a.s. | Slovakia

Zuzana Halasova

Head of the Cyber Security Department | the Slovak Ministry of the Interior | Slovakia

Marcela Zimova

Chief Information Security Officer | Piano Software | Slovakia

Zdenek Huspenina

Head of AI Solutions | Blogic | Czech Republic

Michal Gross

Head of IT Security | 365.bank | Slovakia

Boris Mittelmann

Senior Systems Engineer | Veeam Software | Slovakia

Branislav Magula

Global Cyber Security Manager | Marelli | Slovakia

Maximilian Stremy

rector | STU | Slovakia

Martin Zajicek

CISO | Medirex, a.s. | Slovakia

Ivan Malik

CEO/CTO | Logicworks | Slovakia

Ondrej Krajc

Solution Architect | ESET | Slovakia

Zuzana Rebrova

Head of Third Party Cyber Risk Management | Swiss Re | Slovakia

Rastislav Beno

EMEA Information Security & Cyber Resilience Manager | Mitsubishi Chemical Group Corporation | Slovakia

Pavol Dovicovic

Executive Consultant , certified auditor | Cyber Security Competence and Certification Centre | Slovakia

Michal Srnec

CISO | Aliter Technologies | Slovakia

Milan Oselsky

Partner & Board Member | Xolution Robots | Slovakia

Ing. Radoslav Stefanek

State Secretary of the Ministry of Investments, Regional Development and Informatization of the Slovak Republic and Government Plenipotentiary for Artificial Intelligence.

Mackenzie Jackson

Researcher & Advocate | Aikido Security | Netherlands

Dusan Petricko

Cyber Security Domain Lead | SLSP | Slovakia

Nicol Dankova

Head of Security Operations Center | Researcher | Henkel | Tomas Bata University | Germany

Igor Urban

Territory Account Manager | Forcepoint | Slovakia

Jean Gobin

Senior Technical Architect | Truesec AB | Sweden

Andrea Pezzotti

Global Head Cyber Security Operations | Sandoz | Czech Republic

Tiarne Hawkins

CEO & Co-Founder | Optica Labs | USA

Michal Susko

IT GRC and Security Team Leader | VOLKSWAGEN Financial Services Slovakia | Slovakia

Jozef Filko

Cyber security consultant | beluga | Slovakia

Tudor Damian

Cybersecurity & Cloud Advisor | D3 Cyber | Romania

Charles Tango

CISO | SYSCO | USA

Lukas Hatala

Regional CTO | DXC Technology | Slovakia

Pavel Minarik

VP, Product Security | Progress Software | Czech Republic