Programme - year 2017
Conference will be simultaneously translated (Czech/English)
Program may be subject to change
Conference venue: Kaiserštějnský palác, Malostranské nám. 37/23, 110 00 Praha 1-Malá Strana (mapka...)
Download programme in PDF...
Programme for the 2nd day... | Back to conference page...
I. day - May 24th 2017
Partner of Section 0 is
Registration
Experience of Česká pojišťovna's fight with a horrible Ransomware
Tomáš Bartoň, Generali - Česká pojišťovna
Mini-Panel discussion: Ransomware
10:00 - 12:20 - Game of Threats - Cybersecurity risk simulation
Michal Wojnar, PwC
Michal Čábela, PwC
Registration
OPENING CEREMONY
Zdeněk Adamec, Deputy Minister of Agriculture
Jaroslav Strouhal, Deputy Minister of the Interior
Jaroslav Šmíd, Deputy Director of the National Security Authority
Information from the perspective of former governor of the Czech National Bank
Miroslav Singer, Generali
Intelligence games in power grid - deception, denial, manipulation
Jeff Bardin, Treadstone71
Coffee break
Europol's fight against terrorist propaganda online And what about our privacy?
Jan Ellermann, Europol
Cyber security resilience at Amsterdam Airport Schiphol
Antony Verheijen, Air Traffic Control the Netherlands
Coffee break
Panel Discussion - "The Act - threat or opportunity"
Bohuslav Chalupa,
Poslanecká sněmovna Parlamentu ČR, místopředseda výboru pro bezpečnost
Hana Gawlasová,
Squire Patton Boggs, advokátka
Kamil Tichý,
Národní centrum kybernetických sil, zástupce ředitele
Josef Prokeš,
ÚOOÚ,
ředitel sekce správní
Daniel Rous,
ČEZ,
bezpečnostní ředitel
Jaroslav Šmíd, náměstek ředitele Národního bezpečnostního úřadu
Ivan Makatura, Senior security consultant z IBM
Radim Kolář, Medtronic, Data privacy
Evening Ceremony
II. day - May 25th 2017
Registration
Conference Opening
Encryption and protection of the legitimate interests versus the fight against cyberterrorism and other cybercrimes
Vladimír Smejkal, Jindřich Kodl, Moravian University College Olomouc
Biometric recognition suffers from time-span induced accuracy degradation
Andreas Uhl, University of Salzburg
Coffee break
Cyber: security, defence and crime - why is the difference important?
Daniel Bagge, NBÚ
Partner of Section 2 is Behavioral analysis - Trends and Practices
Dušan Mondek, EY
Petr Plecháček, EY
The Cyber Security Act and its compliance audit
Martin Konečný, NBÚ
Use of situational analysis to detect potential attacks
Michal Novák, O2 CR
Pavel Kubín, Altworx
Should we fear the GDPR?
Martin Maisner, ROWAN LEGAL,
Law Office
Classification of information in context
Matej Kačic, AEC
Maroš Barabas, AEC
Mini-Panel Discussion SECTION 1
Mini-Panel Discussion SECTION 2
Lunch
The clock is ticking - less than two years until the GDPR comes into force
Michal Nulíček,
Jan Tomíšek,
ROWAN LEGAL, Law Office
The IoT: Weapon of Mass Disruption
Sean S. Costigan, George C. Marshall European Center for Security Studies
Responsibilities of the organization to protect information networks and data
Tomáš Nielsen, partner, NIELSEN MEINL, Law Office
Embedded device security
Michal Hojsík, Honeywell
GDPR and the protection of sensitive personal data in Czech health care system
Ondřej Dostál, PwC Legal, Law Office
Defending Against Zero-Day Threats. Why your antivirus protection isn't perfect?
Tomáš Růžička,
Checkpoint
Mini-Panel Discussion SECTION 3 - GDPR
Mini-Panel Discussion SECTION 4 - IoT
Coffee break
The CISO Challenge: how to engage CEO and Board of directors and demonstrating Security Business Relevance
Alberto Meneghini, Accenture
What to Protect and What to Sacrifice? 'Humanware' and IT Security Culture
Hana Gawlasová, Squire Patton Boggs, Law Office
The Future of Cyberterrorism
Sean S. Costigan, George C. Marshall European Center for Security Studies
Closing Ceremony, lottery draw
Programme for the 1st day... | Back to conference page...
Programme - year 2017
Conference will be simultaneously translated (Czech/English)
Program may be subject to change
Download programme in PDF...
I. day - May 24th 2017
Partner of Section 0 is
Registration
The Ransomware history
Paul Rascagneres, Cisco Talos Outreach
Evolution of Ransomware
Peter Stančík, Eset
Your website has been compromised! What now?
Carl Leonard, Forcepoint
Experience of Česká pojišťovna's fight with a horrible Ransomware
Tomáš Bartoň, Generali - Česká pojišťovna
Minipanelová diskuse: Ransomware
Registration
OPENING CEREMONY
Zdeněk Adamec, Deputy Minister of Agriculture
Jaroslav Strouhal, Deputy Minister of the Interior
Jaroslav Šmíd, Deputy Director of the National Security Authority
Information from the perspective of former governor of the Czech National Bank
Miroslav Singer, Generali
Intelligence games in power grid - deception, denial, manipulation
Jeff Bardin, Treadstone71
Coffee break
Game of Threats™ introduction
Tomáš Kuča, PwC
Europol's fight against terrorist propaganda online And what about our privacy?
Jan Ellermann, Europol
Cyber security resilience at Amsterdam Airport Schiphol
Antony Verheijen, Air Traffic Control the Netherlands
Traps and Pitffalls of Behavioural Analysis
Petr Černohorský, Cisco Systems
Coffee break
Panel Discussion - "The Act - threat or opportunity"
Bohuslav Chalupa, Poslanecká sněmovna Parlamentu ČR, místopředseda výboru pro bezpečnost
Hana Gawlasová, Squire Patton Boggs, advokátka
Kamil Tichý, Národní centrum kybernetických sil, zástupce ředitele
Josef Prokeš, ÚOOÚ, ředitel sekce správní
Daniel Rous, ČEZ, bezpečnostní ředitel
Jaroslav Šmíd, náměstek ředitele Národního bezpečnostního úřadu
Ivan Makatura, Senior security consultant z IBM
Radim Kolář, Medtronic, Data privacy
Evening Ceremony
II. day - May 25th 2017
Registration
Conference Opening
Encryption and protection of the legitimate interests versus the fight against cyberterrorism and other cybercrimes
Vladimír Smejkal, Jindřich Kodl, Moravian University College Olomouc
Biometric recognition suffers from time-span induced accuracy degradation
Andreas Uhl, University of Salzburg
Coffee break
Partner of Section 2 is
Behavioral analysis - Trends and Practices
Dušan Mondek, EY | Petr Plecháček, EY
The Cyber Security Act and its compliance audit
Martin Konečný, NBÚ
Use of situational analysis to detect potential attacks
Michal Novák, O2 CR | Pavel Kubín, Altworx
Should we fear the GDPR?
Martin Maisner, ROWAN LEGAL, Law Office
Classification of information in context
Matej Kačic, AEC | Maroš Barabas, AEC
Mini-Panel Discussion SECTION 1
Mini-Panel Discussion SECTION 2
Lunch
The clock is ticking - less than two years until the GDPR comes into force
Michal Nulíček and Jan Tomíšek, ROWAN LEGAL, Law Office
The IoT: Weapon of Mass Disruption
Sean S. Costigan, George C. Marshall European Center for Security Studies
Responsibilities of the organization to protect information networks and data
Tomáš Nielsen, partner, NIELSEN MEINL, Law Office
Embedded device security
Michal Hojsík, Honeywell
GDPR and the protection of sensitive personal data in Czech health care system
Ondřej Dostál, PwC Legal, Law Office
Defending Against Zero-Day Threats. Why your antivirus protection isn't perfect?
Tomáš Růžička,
Checkpoint
Mini-Panel Discussion SECTION 3 - GDPR
Mini-Panel Discussion SECTION 4 - IoT
Coffee break
The CISO Challenge: how to engage CEO and Board of directors and demonstrating Security Business Relevance
Alberto Meneghini, Accenture
What to Protect and What to Sacrifice? 'Humanware' and IT Security Culture
Hana Gawlasová, Squire Patton Boggs, Law Office
The Future of Cyberterrorism
Sean S. Costigan, George C. Marshall European Center for Security Studies
Closing Ceremony, lottery draw