Great speakers coming soon ...

Joseph is Microsoft’s Chief Security Advisor focused on the Healthcare and Life Sciences in the US where he supports Microsoft customers on industry-related cybersecurity and compliance matters. He...

Last year was a breakthrough year in terms of cybersecurity. We have been forced to bring our personal lives and work online and without information technology, crises like the coronavirus pandemic...

The fight against COVID-19 has significantly affected our lives and undoubtedly also a number of fundamental rights guaranteed by the Charter of Fundamental Rights and Freedoms. These include...

The biggest threats to Czech hospitals and hospital alignment with the Cyber Security Law It is not only the Czech healthcare sector that is continuously facing cyber threats, but in the time of the...

Ondřej Nekovář He currently works as CISO at the Státní pokladně Centrum sdílených služeb, s. p., where he and his team provide cyber and information security for the national data centre of the...

Crypto currencies demonized as “crime currencies”, claw their way back and gain more and more ground in the "White Color Business". Rules and Regulations – especially in Europe - become clearer and...

The presentation focuses on ransomware attacks this year. It shows selected aspects and challenges faced by those affected. It does not neglect prevention against these attacks.

I will focus my talk on quantum key distribution (QKD) - the most reliable way how to securely distribute cryptographic keys. The QKD is one of several applications of an emergent field of quantum...

Scott Knight is a Professor Emeritus at the Royal Military College of Canada, and a previous Head of Electrical and Computer Engineering and Chair of Cyber Security.

The article deals with issues of continuous education of employees. Due to new technologies and new conditions that have arisen after the implementation of individual elements of protection against...

China's Use of Computers as a Strategic Weapon System  During "China's Use of Computers as a Strategic Weapon System" attendees will learn firsthand from the only Westerner to have met the...

As can be shown, each and every infectious disease has its own inherent “epidemic code”, that drives its spreading mercilessly on the background of random fluctuations. The particular form of...

The gap between network security and engineering can be an existential threat to Operations. Globally, there have already been almost 12 million control system cyber incidents that have killed...

CISO from EON Group will tell us - How is the role of cybersecurity changing in a time of change in the European market in the energy and utilities sector? How can responsibilities across borders be...

Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Enterprise Threat Mitigation and as the Deputy Director of the National Insider...

With terrorism concerns at the top of security agendas, this presentation will discuss the cyberterrorism landscape with a focus on ISIS and Al-Qaeda, and what the future of cyberterrorism will look...

Dominik is a senior associate in Pierstone (law firm) where he advises on all aspects of privacy, cybersecurity, telecommunications, ICT and IP law.