Programme
Wednesday, May 24, 2006 |
|
8.00 - 9.00 | Registration, coffe |
9.00 - 9.20 | Opening Ceremony |
9.30 - 10.15 |
Security Standards |
10.15 - 11.00 | Baseline Protection Manual Martin Meints (Germany), ... Focuses on security of mobile police systems, preparation and implementation of security concepts for large private networks. |
11.00 - 11.30 | Coffe Break and exhibition visits |
11.30 - 12.15 | Self-Defending Networks Rene Pluis (Netherland), ... Manages strategic ICT projects, actively participates in development teams in the Netherland. |
12.15 - 13.00 | Mearsing Performance and Return on Investments in Information Security John Sherwood (GB), ... Is a director of idRisk, leading expert in enterprise security architecture, has many experience in the banking and financal services. |
13.00 - 14.20 | Lunch |
14.20 - 15.05 |
How Security Impacts Regulator Compliance |
15.05 - 15.50 | DHL - Information Security Governance Marek Fialka (CZ), ... is a Global Information Security Risk Manager of DHL Information Services that services business units of DHL all over the world. He is responsible for implementation of information risk management processes, assessment of information risks and enforcement of information security awareness program. For his responsibilities he uses also experience gained during his several years in the Risk Advisory Services department of KPMG Czech Republic. |
15.50 - 16.15 | Coffe Break and exhibition visits |
16.15 - 17.30 | Panel Discussion |
19.00 - 22.00 | Reception Buffet in the Royal Garden of the Prague Castle |
Thursday, May 25, 2006 | |
8.00 - 9.00 | Registration, coffe |
9.00 - 9.20 | Opening Address |
9.20 - 10.05 |
Prospects of Secure Computing |
10.05 - 10.50 | Eavesdropping of Computer Displays Markus Kuhn (GB), ... Leading world authority in electronic intelligence of computer systems - monitoring of information emitted by computer systems. |
10.50 - 11.20 | Coffe Break and exhibition visits |
11.20 - 12.05 | Identity Metasystem Design Rationale Caspar Bowden (GB), ... Is a specialist in data protection policy, privacy enhancing technology research, identity management and authentication. |
12.05 - 12.50 | Identity Management Case Study in Central Eastern Europe Andrea Multari (Italy), ... His main areas of expertise cover Identity and Access Management, Public Key Infrastructure, security architecture, security event management and security operation management. |
12.50 - 14.00 | Lunch |
14.00 - 14.45 |
Activism in the Name of Chaos - backround and Projects of the Chaos Computer Club |
14.45 - 15.30 | Payment Card Industry (PCI) Data Security Standard Steve Wilson (GB), ... Works for Visa Europe, manages a variety of areas within the Compliance Department, focuses on data security trough Visa Account Information Security Programme. |
15.30 - 16.00 | Coffe Break and exhibition visits |
16.00 - 16.45 |
Information Security ForecastGlobální bezpečnostní hrozby - aktualizace |
16.50 | Trivia Lottery, Closing Ceremony |
All lectures and panel discussions will be simultaneously interpreted to Czech and English. Attendees will receive published conference proceedings in Czech and English.