Great ideas and fresh inspiration from ourrenowned speakers

Bill Hagestad, LtCol
China's Use of Computers as a Strategic Weapon System During "China's Use of Computers as a Strategic Weapon System" attendees will learn firsthand from the only Westerner to have met the...

Ondřej Nekovář and Jan Pohl
Ondřej Nekovář He currently works as CISO at the Státní pokladně Centrum sdílených služeb, s. p., where he and his team provide cyber and information security for the national data centre of the...

Dominik Vítek
Dominik is a senior associate in Pierstone (law firm) where he advises on all aspects of privacy, cybersecurity, telecommunications, ICT and IP law.

Jakub Onderka
Last year was a breakthrough year in terms of cybersecurity. We have been forced to bring our personal lives and work online and without information technology, crises like the coronavirus pandemic...

Martin Melkowitsch
Crypto currencies demonized as “crime currencies”, claw their way back and gain more and more ground in the "White Color Business". Rules and Regulations – especially in Europe - become clearer and...

Miroslav Uřičař
The fight against COVID-19 has significantly affected our lives and undoubtedly also a number of fundamental rights guaranteed by the Charter of Fundamental Rights and Freedoms. These include...

Rene Rinderman
CISO from EON Group will tell us - How is the role of cybersecurity changing in a time of change in the European market in the energy and utilities sector? How can responsibilities across borders be...

Tomáš Rosa
As can be shown, each and every infectious disease has its own inherent “epidemic code”, that drives its spreading mercilessly on the background of random fluctuations. The particular form of...

Ondřej Šrámek
The presentation focuses on ransomware attacks this year. It shows selected aspects and challenges faced by those affected. It does not neglect prevention against these attacks.

Joe Weiss
The gap between network security and engineering can be an existential threat to Operations. Globally, there have already been almost 12 million control system cyber incidents that have killed...

Vladimír Bužek
I will focus my talk on quantum key distribution (QKD) - the most reliable way how to securely distribute cryptographic keys. The QKD is one of several applications of an emergent field of quantum...

Joseph W. Davis
Joseph is Microsoft’s Chief Security Advisor focused on the Healthcare and Life Sciences in the US where he supports Microsoft customers on industry-related cybersecurity and compliance matters. He...

Dr Scott Knight
Scott Knight is a Professor Emeritus at the Royal Military College of Canada, and a previous Head of Electrical and Computer Engineering and Chair of Cyber Security.

Marek Zeman
The article deals with issues of continuous education of employees. Due to new technologies and new conditions that have arisen after the implementation of individual elements of protection against...

Antonín Hlavinka
The biggest threats to Czech hospitals and hospital alignment with the Cyber Security Law It is not only the Czech healthcare sector that is continuously facing cyber threats, but in the time of the...

Laith Al Khouri
With terrorism concerns at the top of security agendas, this presentation will discuss the cyberterrorism landscape with a focus on ISIS and Al-Qaeda, and what the future of cyberterrorism will look...

Rebecca Morgan
Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Enterprise Threat Mitigation and as the Deputy Director of the National Insider...
O vysokou úroveň
programu konference IS2
se staral tým
Who oversees the high level of the IS2 conference programme
odborný programový výborvýbor poradcůkomise síně slávyčestní členové PV