IS2 2021 preparing ...

Joseph is Microsoft’s Chief Security Advisor focused on the Healthcare and Life Sciences in the US where he supports Microsoft customers on industry-related cybersecurity and compliance matters. He...

Adoption of Crypto Trading in Retail Banks   AML and Security requirements. Martin holds a MSc of the technical University of Vienna and an MBA of University...

The gap between network security and engineering can be an existential threat to Operations. Globally, there have already been almost 12 million control system cyber incidents that have killed...

Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Enterprise Threat Mitigation and as the Deputy Director of the National Insider...

Scott Knight is a Professor Emeritus at the Royal Military College of Canada, and a previous Head of Electrical and Computer Engineering and Chair of Cyber Security.

CISO from EON Group will tell us - How is the role of cybersecurity changing in a time of change in the European market in the energy and utilities sector? How can responsibilities across borders be...

Lieutenant Colonel, USMC (Retired) Bill Hagestad a field experienced international cyber warfare officer. Specializing in both defensive & offensive cyber operations. He teaches cyber...

I will focus my talk on quantum key distribution (QKD) - the most reliable way how to securely distribute cryptographic keys. The QKD is one of several applications of an emergent field of quantum...

 Ing. Antonín Hlavinka: CIO and Deputy CEO at the Olomouc University Hospital, where he is also the ICT Coordinator of the National Telemedicine Center (NTMC)...

With terrorism concerns at the top of security agendas, this presentation will discuss the cyberterrorism landscape with a focus on ISIS and Al-Qaeda, and what the future of cyberterrorism will look...

As can be shown, each and every infectious disease has its own inherent “epidemic code”...