XXII th annual prestigious International  Conference

IS2 - information security Summit

The date: 16th - 17th August 2021

The President of the Senate Miloš Vystrčil

introduced Andrea Kropačová

to the Cybersecurity Hall of Fame in 2021

  • Possibility of registration on the stream
  • The President of the Senate Miloš Vystrčil introduced Andrea Kropačová to the Cybersecurity Hall of Fame in 2021
  • We have also prepared for you the opportunity to participate online for a special price HERE ... 

  • Azure Sentinel from Microsoftu HERE...

 

IS2 2021 HAS BEEN
SUCCESFULLY FINISHED!

Conference Venue

Convent of St Agnes of Bohemia
U Milosrdných 17, Prague 1

Looking back at the past year

Do not miss

22nd IS2 conference

Please accept our invitation to the XXII. year of the IS2 conference. As always, IS2 2021 will bring together renowned international experts and provide you leading-edge thinking on key cyber security topics and concepts.

Great ideas and fresh inspiration from ourrenowned speakers

Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Enterprise Threat Mitigation and as the Deputy Director of the National Insider Threat Task Force (NITTF).  NITTF is an interagency task force co-chaired by the Office of the...

Crypto currencies demonized as “crime currencies”, claw their way back and gain more and more ground in the "White Color Business". Rules and Regulations – especially in Europe - become clearer and Anti Money Laundry Regulations are set. Crypto Custodians become partners...

CISO from EON Group will tell us - How is the role of cybersecurity changing in a time of change in the European market in the energy and utilities sector? How can responsibilities across borders be addressed when...

I will focus my talk on quantum key distribution (QKD) - the most reliable way how to securely distribute cryptographic keys. The QKD is one of several applications of an emergent field of quantum (information) technologies. In order to appreciate better the transformative potential of quantum...

As can be shown, each and every infectious disease has its own inherent “epidemic code”, that drives its spreading mercilessly on the background of random fluctuations. The particular form of this code depends on the mathematical model used. In this lecture, we will study a typical epidemic...

The fight against COVID-19 has significantly affected our lives and undoubtedly also a number of fundamental rights guaranteed by the Charter of Fundamental Rights and Freedoms. These include interference with freedom of movement in the form of restricted travel, interference with freedom of...

Joseph is Microsoft’s Chief Security Advisor focused on the Healthcare and Life Sciences in the US where he supports Microsoft customers on industry-related cybersecurity and compliance matters. He acts as an extension of Microsoft’s customers’ security teams by routinely providing them with...

Scott Knight is a Professor Emeritus at the Royal Military College of Canada, and a previous Head of Electrical and Computer Engineering and Chair of Cyber Security.

With terrorism concerns at the top of security agendas, this presentation will discuss the cyberterrorism landscape with a focus on ISIS and Al-Qaeda, and what the future of cyberterrorism will look like.

The biggest threats to Czech hospitals and hospital alignment with the Cyber Security Law It is not only the Czech healthcare sector that is continuously facing cyber threats, but in the time of the Covid pandemic, attacks on the Czech healthcare sector in particular are significantly more...

Dominik is a senior associate in Pierstone (law firm) where he advises on all aspects of privacy, cybersecurity, telecommunications, ICT and IP law.

China's Use of Computers as a Strategic Weapon System  During "China's Use of Computers as a Strategic Weapon System" attendees will learn firsthand from the only Westerner to have met the authors of Unrestricted Warfare, Lieutenant General Qiao Liang & Wang Xiao Sui, People's...

Who oversees the high level of the IS2 conference programme

expert program committeeadvisorshall of fame commissionhonorary members

More than 20 years with you

0
speakers
0
expert lectures
0
participants

Information Security with IS2

The conference is intended primarily for senior and middle management from the public and commercial sectors

Especially for public administration, utilities and finance

Information security and personal data specialists will also be pleased

For all those involved in building and managing information security within their organizations or projects

Conference to be held under the patronage of

Image

Parliament CZ

Ing. Jan Bartošek
Chairman KDU-ČSL

Image

MZV

Jakub Kulhánek
Minister of Foreign Affairs

661664 636396 mzv cz

Image

NUKIB

Ing. Karel Řehka 

Image

UOOU

Mgr. Jiří Kaucký
 
Image

Goverment CZ

Vladimír Dzurilla
Government Designated Representative for IT and Digitalization

Image

Director of the Military Intelligence

Brigadier General Jan Beroun

Image

State Secretary at ministry of the Interior

RNDr. Josef Postránecký

Conference partners

TOP partner

PLATINUM partner

ICZ

GOLD partner

T CB 3c n

CZ NIC

SILVER
partners

Cybersecurity Hall of Fame Partner

insighti

Microsoft 2

PwC
Cetin

Partners

PwC

Technical partners

Cesnet
Cetin

Organized by

Cetin