This site uses cookies, including third-party cookies that help us provide and improve our services. If you want to find out more, click “Read more” to read our Privacy Policy.

READ MORE COOKIE SETTINGS

Agenda

Time Event & Speakers
08:00

Registration and Morning Coffee

08:20

Welcome

Dana Vaníčková
Associate Vice President, Head of CEE Events & Country Director, Czech & Slovak Republic, IDC CEMA
09:10

IDC Keynote: Business Resilience

Mark Child
CEE Security Practice Lead, IDC CEMA
09:35

Corporate Security: Business as Usual?

Jakub Ludvík
Cluster Security Officer CZ/SK/PL/HU, Nordics & Baltics,Teva Pharmaceutical Industries
09:55

Enemy From Within

Petr Moroz
Managing Partner, Screening Solutions
Petr Stuchlík
Co-founder and CEO, Fincentrum

The shareholders of Company A receive a whistleblowing allegation informing about a scheme of transfer of its business (esp. know-how, information, employees) to a newly formed Company B. The acusation claims involvement of unindentified top managers of Company A, and unknown third parties. It is believed that the scheme involves more than a half of Company A’s employees and that it has been in the works for several months.

10:15

Addressing the Cyber Threats on the Horizon by adapting a Simple, Open and Integrated Threat Defense Architecture

Milan Habrcetl
Cyber Security Sales, Cisco Systems Czech Republic

Organizations face multi-vector, multi-stage treats and IT Leaders are not confident in their ability to prevent the next big breach.

They try to solve the problem by adding more security tools into the mix that do not integrate, but this just adds more complexity.

There’s also a lack of talent in information security. In fact, security might be the only field where there is negative unemployment.

So IT Leaders have limited budgets, staff and time and they can’t keep up with the constant attacks and threat alerts. 

Organizations should adapt an integrated security architecture that is simple, open, automated, effective that would enable them to detect, investigate, and remediate threats much faster and easier – a necessity in today’s cyber landscape and the only way to be protected 24/7.

 

10:35

How to use behavioral analytics to detect fraud and safeguard your customers, and prevent operational or reputational risk?

Adam Falus
Senior Head of Fraud Management, T-Mobile Czech Republic
10:55

1-2-1 Meetings & Coffee break

12:00

Privacy Protection and the Future of Artificial Intelligence

Jan Romportl
Chief Data Scientist, O2 Czech Republic

Today’s Artificial Intelligence (AI) is almost entirely based on machine learning that leverages enormous amounts of data. As a general rule, the more data, the better AI works. The AI boom over the past few years has largely been enabled by an expanding “Big Data culture”. However, data collected for such purposes often contain not only personal data but also other potentially highly sensitive information. In addition, a well-functioning AI gives substance to an increasingly popular meme about security through obscurity being no security. We need to act now to prevent AI and Big Data culture from becoming more of a Big Brother culture. At the same time, we should strive to prevent a strict Kafka-style interpretation of GDPR from irrevocably thwart the development of AI in the EU. What shall we do? Will we find a way to turn the GDPR ethics in connection with further expansion of AI into a strength?

12:20

Managing third-party IT and InfoSec risks: a practical insight from inside

Lucie Andreisová
CE Information Security Manager, Tesco
12:40

Implementing Security with Digital Transformation Initiatives

Horymír Šíma
Major Account Manager, Fortinet
13:00

Redefining Security in the Cloud Era

Igor Tomeš
Solution Architecture Lead, DataSpring
13:20

Scale as you Grow

Jiří Sedláček
Key Account Manager, Actinet Informační systémy
13:40

Case Study: Digital Transformation and its Impact on Security

Petr Podaný
Head of Data & Analytics, Sberbank CZ
Milan Habrcetl
Cyber Security Sales, Cisco Systems Czech Republic
Ivan Svoboda
Business Development Manager for ICT Security, Anect
13:55

Lunch and 1-2-1 meetings

14:30

IDC Connect - Roundtable discussion: Ambassador, IDC analyst and technology partner

  • Data Leakage: Espionage, Intellectual Property Theft
  • Data Leakage: Data Records
  • Production Disruption: Sabotage
  • Financial Loss caused by hijacked accounts
  • Enemy from Within
15:30

Closing networking and drinks

Contacts

Lucie Padourkova

Senior Conference Specialist

+420 736 608 563

Petra Krizova

Sales Manager, Czech Republic and Slovakia

+420 602 608 405

About IDC

55 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.