IS2 2020 Speakers

Jeff Bardin is currently serving as the Chief Intelligence Officer for Treadstone71, a private intelligence company, and a founding member of the Cloud Security Alliance...

How will the banking identity system work for the public and private sector, and under what conditions will banks gain access...

 Why is disinformation dangerous? And what is the Czech state doing to protect its interests and those of its citizens from hybrid campaigns and disinformation?

iHub superintendent in Holland shows practical ways to deploy Intentional Privacy…

 The aim of the lecture will be to summarize the current ten-year experience with the operation of the service, to point out some aspects of the connection to the state identity system NIA and...

Program manager at ČSOB gives a lecture about banking identity...

Exploitation of electronic communications data in the fight against terrorism”, including the ruling of the EU Court of Justice, will be presented by a renowned lawyer…

The main part of the presentation will be devoted to the preparation of the CAB. We will present the starting point of the project, describe advancement of the work and current status of CAB...

Using the example of Česká spořitelna and Erste group, he will describe the challenges in identifying client devices, client applications and…

He helps raise awareness about pro-Kremlin disinformation campaigns and he was responsible for the EUvsDisinfo campaign...

In his lecture he explains various types of hybrid-based warfare attacks on the financial industry as well as critical infrastructure...  

 The global outbreak of SARS-Cov-2 virus brought in a series of new questions and challenges linked to processing of most sensitive types of personal data during pandemics…

To ensure cybersecurity, we need procedures and tools that allow us to educate our professionals effectively. Though not a universal solution, the Cyber Range provides …

In the talk we will focus on specifics of the OT world and discuss the impacts they have into structure of the team.

Protection of Industrial Control System/Operational Technology – ICS/OT is dynamically growing area of security. It is given by the importance of those systems – whether it is part of critical...

What is critical information infrastructure for CETIN – difference between critical information infrastructure and critical infrastructure? What must CETIN protect?