News
The conference program can be found HERE.
Videos and summit books from past conferences are available for registered participants after logging to "Off-line Access" ...
PATRONAGE

Tom Philipp
Vice-President Committee on Health


deputy chairman

ÚOOÚ
Programme and Speakers

Eva Macháčková & Barbora Kunzová
DORA – even regulation can be sexy... at Komerční banka turned implementation into an opportunity into innovation...

Václav Žid
How to protect space infrastructure will be introduced by Brigadier General of Military Intelligence...

Bill Hagestad
A former U.S. Marine Corps officer, ethical hacker, and expert on Chinese cyber activities will introduce us to China's military use of AI as a cyber weapon of war...

Agáta Kružíková & Vashek Matyáš
How fake fingerprints from photos threaten smartphone authentication...

David Pecl & Matej Kačic
The antivirus was silent, the attackers were stealing. In a Czech hospital, malware survived unnoticed for 18 months...

Lukáš Hlavička
Revealing the most common and overlooked vulnerabilities that threatens the operation of infrastructure...

Jiří Diepolt
Design a strategic approach to AI risk management, systematic AI risk analysis, prioritization by impact and design of appropriate strategies...

Petr Špiřík
No, people are NOT the weakest link - that's a topic for an experienced CISO and a global cybersecurity manager with a strategic vision...

Lukáš Kintr
The director of NÚKIB will reveal how the state protects the Czech Republic in the digital space...

Tomáš Rosa & Jiří Pavlů
How to master the era of post-quantum cryptography and avoid the futility...

Lee Casey
A behavioural expert from the UK will offer practical advice to leaders on how to maximise the effectiveness of security strategies...

Josef Šlerka
What happens when propaganda combines with generative AI? The impact on elections, society and security...

David Mussington
A former top U.S. cyber agency official will advise on how to counter new threats to key state systems...
Panel Discussion Day 1 – „aDORAtion: Resilience as a State of Mind"
Panel Discussion Day 2 – „AI – Inspiration or Inquisition”
Programme committee
The high standard of the IS2 programme is ensured each year by the Programme Committee members alongside the Ambassadors, Honorary Members and Advisors.
Advisors
About IS2
A look back
at the jubilee XXV last year
Renowned speakers from abroad and the Czech Republic presented papers on current topics and trends in the field of information security and data protection.
More than 25 years together with Information Security
The conference is designed primarily for senior and middle management from the public and commercial sectors
Especially for utilities, finance, industry, healthcare and government
Conference is also suitable for Information, Security and Data protection specialists
Relevant for everyone who is involved in building and managing information security within their organizations, firms or projects
Partners of Summit
Platinum partners
Gold partners
Silver partner
Partners

Technical partners
Accommodation Partner
Price list
Full conference pass
(until January 31, 2025)
- + 21% (VAT)
Full conference pass
(since February 1, until May 12, 2025)
- + 21% (VAT)
Full conference pass
(since May 13, 2025)
- + 21% (VAT)
One day conference pass
- + 21% (VAT)
Video archive – single year of IS2
- + 21% (VAT)
Video archive – single lecture
- + 21% (VAT)
Possible accommodation for conference participants at the beautiful BOOKQUET Hotel from 1st to 9th June 2025 at special prices