Great ideas and fresh inspiration from our renowned speakers ...

The European Union is preparing a new cybersecurity regulation, NIS 2. The presentation will describe how this directive will affect the amendment to the Cybersecurity Act and how it will affect the...

Miroslav is active at LEGALITÉ law firm and as a director of the company LEGALITÉ Data Protection Services s.r.o. focusing on data and information security. 

The topic of cyber protection of vehicles is popularized thanks to new legislation. In addition to meeting legislative requirements, it is also important that manufacturers strive to protect the...

What would you do if another country attacked yours without provocation? Should your country create a cyber militia as a normal part of a cyber security support organization? This will be...

Adéla focuses on conflicts in cyberspace and cyberactivism. She graduated summa cum laude from the School of War Studies at King's College London. She has led research projects on cyber and...

Mobile documents are on the rise and are becoming common practice in identifying citizens and verifying their eligibility. A mobile ID solution will be rolled out across the EU within two years.

Organizations face multi-vector, multi-stage threats, and IT Leaders are not confident in their ability to prevent the next big breach. There’s also a lack of talent in information security. In...

Pete Herzog, creator of HackerHighschool.org, a discrete problem-solver, security researcher and hacker. He lives by the motto: Hack everything but harm none.

Consultant and system architect with more than 15 years of experience in information technology. He focuses primarily on Amazon Web Services and Microsoft Azure with a primary emphasis on the...

If you ask (not only) hospital top managers about cyber security, they will almost certainly tell you that it is hot topic for them and the hospital invests a lot of money into it. But is it really...

is a researcher in the areas of artificial intelligence, human-computer interaction, human computation, crowdsourcing and human-AI symbiosis. His research domain is disinformation combatting through...

In 2018, he joined the FN Ostrava as Deputy Director for IT, where he is currently working. He has been actively involved in cybersecurity issues in the healthcare sector since 2016.

Josef, holder of the prestigious Lawyer of the Year award in the field of ICT law for 2014, is the head of the ICT Law specialization at law firm ROWAN LEGAL as well as being a registered mediator...

Helio was CIO at the Presidency of the Republic of Brazil, he is a Master's student in Cyber Security, Post-Graduate in IT Management and Digital Expertise. Graduated in Information Systems from the...

has been working in Hospital Jihlava, in the ICT department for more than 24 years, at first as an information-systems administrator, currently as the Deputy for Informatics and Cyber Security. From...

How Anonymous together with Cyber-partisans in Belarus came to the foreground, due to the occurrences in Ukraine, will be discussed by the founder of the course of criminology and cybercrime in the...

Is a cybersecurity instructor in Italian courses focusing on Blockchain Technology and having the opportunity to cooperate with recognized experts in the field.

 Which threats target the Czech Republic? Trends from telemetry and experience Two years into the COVID-19 pandemic, Czech organizations still face billions of brute-force attacks targeted...

Dedicates himself to projects and training in the field of cybersecurity, the fight against cybercrime, user protection, etc., both at the national and international level.

In addition to his work for the Marshall Center, he is presently serving as the Senior Adviser to the NATO/PfPC Emerging Security Challenges Study Group, where he heads cybersecurity education...