News

  • The jubilee XXV year of the IS2 conference took place on 29-30 May 2024 in the Aula of the Czech Technical University - Bethlehem Chapel.
    It was an honour to welcome all the distinguished personalities and speakers.
    Thank you to all partners.
    We are now preparing websites with the archive of lectures.
  • Videos and summit books from past conferences are available for registered participants after logging to "Off-line Access" HERE...

back  Back to IS2...

Wednesday, May 25th 2011
8:00 – 9:00 Registration, coffee
9:00 – 9:30 Opening Ceremony
9:30 – 10:15 Enterprise Amnesia and Data Overload
Jeff Jonas
10:15 – 11:00 Log Management & Intelligence: Taking Care of What’s Important
Ramses Gallego
11:00 – 11:30 Coffee break and exhibition visits
11:30 – 12:15 Crisis Plans where Minutes are Essential
Martin Kašša, Libor Široký
12:15 – 13:00 The New German Identity Cards
Dennis Kügler
13:00 – 13:05 Keynote ICZ
13:05 – 14:15 Lunch
14:15 – 15:00 Problems of ISO 27001 Matrix Certification
Martin Dvořák, Zora Říhová
15:00 – 15:45

A Recovery Disaster Plan for Primary IT Infrastructure
as a Tool for Shareholder Peace of Mind
Jozef Opálený

15:45 – 16:15 Coffee break and exhibition visits
16:15 – 16:45 Certain Fundamentals in the Drafting of Crisis Documentation and the Infl uence of Crisis Planning on the Operations of an Organization
Ondřej Bos
16:45 – 18:00 Panel Discussion – Data Leakage Prevention in Practice
Tomáš Filip, Martin Maisner, Tomáš Matoušek, Jana Plater, Alžběta Rathanová

Chaired by: Iva Steinerová
19:00 – 19:05 Keynote IBM
19:05 – 22:00 Reception Buffet

 

Thursday, May 26th 2011
8:00 – 9:15 Registration, coffee
9:15 – 9:30 Opening Address
9:30 - 10:15 The Most Common Mistakes in Incident Response
Eugene Schultz
10:15 – 11:00 Cryptography for (partially) Compromised Sensor Networks
Petr Hanáček, Petr Švenda
11:00 – 11:30 Coffee break and exhibition visits
11:30 – 12:15 Bottlenecks in Applied Digital Signatures Schemes
Danilo Gligoroski
12:15 – 12:40 Wiggum in Cyberspace: Legal Issues in Czech and EU Cybersecurity
Radim Polcák
12:40 – 14:15 Lunch
14:15 – 15:00 Network Monitoring – Tool for Detecting and Avoiding Incident
Pavel Minarík
15:00 – 15:45 Practical Models for Incident Management
Matthew Pemble
15:45 – 16:00 Lottery Draw, Closing Ceremony

All lectures and panel discussions will be simultaneously interpreted to Czech and English.
Attendees will receive published conference proceedings in Czech and English.

ikona IS2 Programme (PDF = 1,44 MB)

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.

More...

is2 20 let

Conference IS2

A prestigious international conference on information security, organized under the auspices of the prime minister and other eminent representatives of the Czech government.

More...

 
 

Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top