back  Back to IS2...


Wednesday, May 24, 2006

8.00 - 9.00 Registration, coffe
9.00 - 9.20 Opening Ceremony
9.30 - 10.15

Security Standards
Mark Lomas(GB), ... Information Security Officer for European and American branches of the Arab Bank Group.

10.15 - 11.00 Baseline Protection Manual
Martin Meints (Germany), ... Focuses on security of mobile police systems, preparation and implementation of security concepts for large private networks.
11.00 - 11.30 Coffe Break and exhibition visits
11.30 - 12.15 Self-Defending Networks
Rene Pluis (Netherland), ... Manages strategic ICT projects, actively participates in development teams in the Netherland.
12.15 - 13.00 Mearsing Performance and Return on Investments in Information Security
John Sherwood (GB), ... Is a director of idRisk, leading expert in enterprise security architecture, has many experience in the banking and financal services.
13.00 - 14.20 Lunch
14.20 - 15.05

How Security Impacts Regulator Compliance
Stuart Hotchkiss (GB), ... Is advising clients within Eastern Europe, the Middle East and Africa, consults on compliance, business continuity planning, isaster recovery, security architecture, and the legal aspects of security.

15.05 - 15.50 DHL - Information Security Governance
Marek Fialka (CZ), ... is a Global Information Security Risk Manager of DHL Information Services that services business units of DHL all over the world. He is responsible for implementation of information risk management processes, assessment of information risks and enforcement of information security awareness program. For his responsibilities he uses also experience gained during his several years in the Risk Advisory Services department of KPMG Czech Republic.
15.50 - 16.15 Coffe Break and exhibition visits
16.15 - 17.30 Panel Discussion
19.00 - 22.00 Reception Buffet in the Royal Garden of the Prague Castle
Thursday, May 25, 2006
8.00 - 9.00 Registration, coffe
9.00 - 9.20 Opening Address
9.20 - 10.05

Prospects of Secure Computing
Whitfield Diffie (USA), ... Best known for his discovery of the concept of public key cryptography, Diffie spent the 1990s working primarily on the public policy aspects of cryptography and has testified several times in the Senate and House of Representatives.

10.05 - 10.50 Eavesdropping of Computer Displays
Markus Kuhn (GB), ... Leading world authority in electronic intelligence of computer systems - monitoring of information emitted by computer systems.
10.50 - 11.20 Coffe Break and exhibition visits
11.20 - 12.05 Identity Metasystem Design Rationale
Caspar Bowden (GB), ... Is a specialist in data protection policy, privacy enhancing technology research, identity management and authentication.
12.05 - 12.50 Identity Management Case Study in Central Eastern Europe
Andrea Multari (Italy), ... His main areas of expertise cover Identity and Access Management, Public Key Infrastructure, security architecture, security event management and security operation management.
12.50 - 14.00 Lunch
14.00 - 14.45

Activism in the Name of Chaos - backround and Projects of the Chaos Computer Club
Tim Pritlove (Germany), ... Is a long-time hacker, events organizer and member of Chaos Computer Club, programmer, teacher and consultant.

14.45 - 15.30 Payment Card Industry (PCI) Data Security Standard
Steve Wilson (GB), ... Works for Visa Europe, manages a variety of areas within the Compliance Department, focuses on data security trough Visa Account Information Security Programme.
15.30 - 16.00 Coffe Break and exhibition visits
16.00 - 16.45

Information Security ForecastGlobální bezpečnostní hrozby - aktualizace
Eugene Schultz (USA), ... Government consultant during the Gulf War, editor in chief of the journal Computers and Security, consultant to the government and bank institutions in the CR.

16.50 Trivia Lottery, Closing Ceremony

All lectures and panel discussions will be simultaneously interpreted to Czech and English. Attendees will receive published conference proceedings in Czech and English.

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.


is2 20 let

Conference IS2

A prestigious international conference on information security, organized under the auspices of the prime minister and other eminent representatives of the Czech government.



Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top