News

  • Preparations for the XXVI international professional conference Information Security Summit - IS2 under the title "DIGITAL OPTIMISM" are in full progress. The conference will be held on June 3-4, 2025 in the beautiful Ceremonial Hall of the Czech Technical University in Prague Bethlehem Chapel in Prague. More information HERE...

  • Recordings of selected presentations from last year's IS2 2024 Conference - 29-30 May 2024 - "25 years of IS2 - A SAFE AND DIGITAL SOCIETY" are available. More information HERE...

  • The IS2 2024 conference hosted the panel discussion on "Being Prepared". The accompanying videos with the views of eminent personalities are still available. More information HERE...

back  Back to IS2...

Programme

Wednesday, May 16, 2007
8.00 - 9.00 Registration, coffe
9.00 - 9.20 Opening Ceremony, KEYNOTE Hewlett-Packard
9.30 - 10.15

The Security Management Console (Evaluating, Modelling & Measuring Security)
David Lynas (Great Britain) ... Lifetime Achievement Award from the Computer Security Institute (the only professional from outside of North America)

10.15 - 11.00 Unify and Simplify Identity and Access Management
Michael Coady (Great Britain) Vice President with Computer Associates Inc. Security Practice
11.00 - 11.30 Coffe Break and exhibition visits
11.30 - 12.15 Introducing Traffic Analysis – Attacks, Defences and Public Policy Issues...
George Danezis (Belgium) … Guru in anonymous communications, privacy enhancing technologies, and traffic analysis
12.15 - 13.00 Electronic Passports
Zdeněk Říha (Italy) … Expert of the Joint Research Centre (JRC) of the European Commission, Institute for the Protection and Security of the Citizen
13.00 - 14.15 Lunch
14:15 - 14:35 KEYNOTE Telefónica O2
14.20 - 15.05

Improving the operational reliability of power supply systems for IT sites and technology
Karel Kuchta, Ondřej Komenda, David Štefka (Czech Republic) … Presenting an innovative analytical solution for operational reliability of backup power supply systems

15.05 - 15.50 Please Repeat after Me: 'My Voice Is My Password', from the Basics to Real-life Implementations of Speaker Verification Technologies
Jean Hennebert (Switzerland) … Respected researcher in speaker verification, biometric systems, speech processing and pattern recognition
15.50 - 16.15 Coffe Break and exhibition visits
16.15 - 17.30 Panel Discussion
Rudolf Haňka, Jan Hlaváček, Tomáš Holenda, Ivo Kramoliš, Karel Neuwirt, Zdeněk Říha; moderator: Václav (Vashek) Matyáš
19.00 - 22.00

Reception Buffet in the Royal Garden of the Prague Castle, KEYNOTE Secunet

 

Thursday, May 17, 2007
8.00 - 9.00 Registration, coffe
9.00 - 9.20 Opening Address, KEYNOTE Oracle
9.20 - 10.05

Electronic Government – The Commercialization of Federated Information
Ed Dawson (Australia) … Research Director of the Information Security Institute, Professor of Cryptology and Its Applications at Queensland University of Technology

10.05 - 10.50 Laveraging Information in Network Centric Environments to Enable Situational Awareness
Augusto Del Pistoia (Italy) … Brigadier General (Ret.) of the Italian Army, previously assigned to NATO Headquarters as the INFOSEC Branch Chief
10.50 - 11.20 Coffe Break and exhibition visits
11.20 - 12.05 Authorizing card payments with PINs or signatures?
Václav (Vashek) Matyáš (Czech Republic) … First presentation of non-trivial field experiment results on the ease of PIN in-shop observation to the general public
12.05 - 12.50 An Analysis of New Security Features in Windows Vista
Edward Ray (USA)… President of NetSec Design And Consulting, Inc. Expert on implementation of defense in depth layered security solutions
12.50 - 14.20 Lunch, KEYNOTE ICZ
14.20- 14.50

Examples of Unorthodox Counter-Measures Against Email Scammers
Eve Eve Edelson (USA) … Specialist of the Energy & Environmental Technologies Division at Lawrence Berkeley National Laboratory

14.50- 15.30 Telecommunication Threats
Radek Kummer (Czech Republic) ... Team-leader responsible for development of systems for detection, registration and evaluation of telecommunication fraud
15.30 - 16.00 Coffe Break and exhibition visits
16.00 - 16.45

A Brief History of Computer Security
Dieter Gollmann (Germany) ... World-class expert, Chair for Security in Distributed Applications at the Hamburg University of Technology

16.50 Trivia Lottery, Closing Ceremony

All lectures and panel discussions will be simultaneously interpreted to Czech and English. Attendees will receive published conference proceedings in Czech and English.

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.

More...

is2 20 let

Conference IS2

Prestigious international conference on information security, organized under the auspices of prominent representatives of the Czech government and other important personalities..

More...

 
 

Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top