cz / en

cz / en

08:30

Registration and Morning Coffee

09:00

Welcome Address

Petr Riha,
Country Manager, Czech & Slovak, IDC CEMA
09:10

Information Security in the Multi-platform Era

Mark Child,
CEE Security Practice Lead, IDC CEMA
09:30

Cyber Crime s.r.o.

Daniel Šafář,
Country Manager CZR Region, Check Point Software Technologies
09:50

Biometrics our fingertips - Privacy

Martin Černý,
Senior Project Manager, Fujitsu Technology Solutions
10:10

Even sophisticated attacks can be stopped automatically

Jakub Jiříček,
Systems Engineer, Eastern Europe, Palo Alto Networks

Attackers leverage asymmetry in the economy of attacks to their benefit but good intelligence and automated rapid response can stop an attack in its tracks. If we set a sufficient number of effective roadblocks for attackers to overcome to reach their target, sooner or later their illicit activities will cease paying off and they will be forced to seek other targets or new jobs.

10:30

It’s Time To Change the Way We Think About Cyber Security

Patrick Grillo,
Senior Director, Solutions Marketing, Fortinet

It’s harder than ever to secure the enterprise network, confirmed by the continuing string of high profile data breaches. While being attacked and possibly breached is not going to change, what can change is how we perceive cyber security and how to defend your organization’s network. This session will focus on some of the key contributors to successful data breaches and what an enterprise can do to break the cycle of attack, breach and spend.

11:00

Coffee Break and Facilitated 1:1 Meetings with Partner´s Representatives, DemoZone

11:30

Technology Sessions

Endpoint Defence

Endpoint Defence in the 3rd Platform Era

Mark Child,
CEE Security Practice Lead, IDC CEMA

Threat intelligence and malware defense in the 3rd Platform era. Moving beyond signature-based protection to incorporate next-generation security solutions into the evolving architecture.

Malware and ransomware, endpoint protection and GDPR: How does it all fit together?

Ivan Svoboda,
Business Development Manager for ICT Security, Anect

Modern malware attacks aim increasingly at the weakest spot, the endpoint. Such attacks frequently result in a violation of personal data protection regulations (GDPR). In our presentation, we will show a few real-life case studies and outline a possible comprehensive solution leveraging CheckPoint tools (such as SandBlast Agent and Endpoint Security).

Do you use mobile phones in your company?

Marek Bradáč,
Country Manager, CZ/SK, Storware

Working with various IT and security managers, we have found out that one of the biggest issues they currently face is user endpoint security and effectiveness of employees who use mobile devices. Everyone uses a mobile phone many times every day and how many of us have sometimes made our lives simpler by copying work documents to a public cloud storage. Wouldn’t it be much better to have current versions of corporate documents always safely available anywhere you go, to be certain that corporate data do not lie around public clouds, to get smart phones under control and secure them at the same level as any other part of the infrastructure, and, last but not least, be protected against increasingly frequent ransomware attacks and harmful conduct by employees (whether intentional or accidental)?

Panel Discussion

Mark Child,
CEE Security Practice Lead, IDC CEMA
Ivan Svoboda,
Business Development Manager for ICT Security, Anect
Marek Bradáč,
Country Manager, CZ/SK, Storware
Peter Lechman,
Regional Sales Manager - Eastern Europe, Palo Alto Networks

Identity as Perimeter

Identity and Access Management

Mohamed Hakam Hefny,
Program Manager, Systems & Infrastructure Solutions, CEMA

Identity is already the new perimeter – is your organization dealing with it? The rise of biometrics and the demise of BYOD; multi-factor authentication as a bare minimum and a mobile workforce enabler.

CyberArk Case Study

Daniel Hetényi,
Regional Sales Manager, CyberArk

Case Study TDP

Panel Discussion

Mohamed Hakam Hefny,
Program Manager, Systems & Infrastructure Solutions, CEMA
Daniel Hetényi,
Regional Sales Manager, CyberArk

Data-Centric Security

Data-Centric Security

Alexei Proskura,
Program Director, Security, IDC CEE

Protecting data is a management and security journey that takes in access controls and privileged user management, encryption and obfuscation, policy and compliance, and the company’s security culture.

APT@HOME?

Jiří Gogela,
Manager, DVlabs Praha, Trend Micro

With the dramatically increasing number of attacks on simple devices IOT wonders what is the motivation for attackers, and what are the other trends. Methods are becoming more sophisticated and longer did not constitute a threat to the home.

Cryptelo Case Study

Martin Baroš,
CEO at Cryptelo

Panel Discussion

Alexei Proskura,
Program Director, Security, IDC CEE
Daniel Šafář,
Country Manager CZR Region, Check Point Software Technologies
Martin Baroš,
CEO at Cryptelo
Patrick Grillo,
Senior Director, Solutions Marketing, Fortinet
Jiří Gogela,
Manager, DVlabs Praha, Trend Micro
13:00

Coffee Break and Facilitated 1:1 Meetings with Partner´s Representatives, DemoZone

13:30

Vertical Sessions

Cyber Security Action Plan

National Cybersecurity Act amendment

Aleš Špidla,
President of the Czech Institute of Information Security Managers, ČIMIB

Security in the cyberspace cannot be divided into separate sectors. It is complex, interconnected, dynamic and adrenaline-inducing.

GDPR in Public Administration

Cyberspace, too, is governed by criminal laws – the Act on Criminal Liability of Legal Entities that is based on GDPR as well as the Cybersecurity Act and other regulations.

Electronic identity

Aleš Kučera,
Director, ICT Unie

eIDAS is an EU regulation on electronic identification and trust services for electronic transactions in the internal market, coming into full force and effect in 2018. The regulation obviously applies to the Czech Republic as well. How is the government sector getting ready? How is the commercial sector gearing up? Are we going to make it by the deadline? What business opportunities does the regulation bring about? Are we going to become a digital tiger or will we remain a digital chicken?

 

User Identity in Practice

Martin Řehořek,
CEO, NEWPS.CZ

Panel Discussion

Aleš Špidla,
President of the Czech Institute of Information Security Managers, ČIMIB
Aleš Kučera,
Director, ICT Unie

Security Business Case

New challenges in the field of authentication in conception of RSA

Pavel Březina,
IT Security Consultant, Actinet Informační systémy

Secure what you really love

Peter Ocásek,
CEO at Angelcam #500strong

Are you sure you can trust your IT Security?

Petr Chaloupka,
CEO at GreyCortex

Panel Discussion

Mark Child,
CEE Security Practice Lead, IDC CEMA
Peter Ocásek,
CEO at Angelcam #500strong
Petr Chaloupka,
CEO at GreyCortex
Pavel Březina,
IT Security Consultant, Actinet Informační systémy
14:50

Technical Break

15:00

Pursuit

Bradford A. Bleier,
Cyber Assistant Legal Attaché at Embassy of the United State of America, FBI

A discussion of the intrusion response and investigative value of public-private partnerships in addressing cyber threats, with a focus on preserving information to assist in the identification and pursuit of the criminals behind the keyboard.

15:15

Raffle

15:20

Close of Event and Networking Lunch

name

lucie padourkova

Senior Conference Specialist

lpadourkova@idc.com

+420 736 608 563

name

petra krizova

Sales Director

pkrizova@idc.com

+420 602 608 405