XXII th annual prestigious International  Conference

IS2 - INFORMATION SECURITY SUMMIT

The date: 16th - 17th August 2021

Place: Anežský Klášter

Theme: The World Has Changed … More Connected Than Ever

Cybersecurity Hall of Fame in 2021 is Andrea Kropáčová

Great ideas and fresh inspiration from ourrenowned speakers

China's Use of Computers as a Strategic Weapon System  During "China's Use of Computers as a Strategic Weapon System" attendees will learn firsthand from the only Westerner to have met the...

Ondřej Nekovář He currently works as CISO at the Státní pokladně Centrum sdílených služeb, s. p., where he and his team provide cyber and information security for the national data centre of the...

Dominik is a senior associate in Pierstone (law firm) where he advises on all aspects of privacy, cybersecurity, telecommunications, ICT and IP law.

Last year was a breakthrough year in terms of cybersecurity. We have been forced to bring our personal lives and work online and without information technology, crises like the coronavirus pandemic...

Crypto currencies demonized as “crime currencies”, claw their way back and gain more and more ground in the "White Color Business". Rules and Regulations – especially in Europe - become clearer and...

The fight against COVID-19 has significantly affected our lives and undoubtedly also a number of fundamental rights guaranteed by the Charter of Fundamental Rights and Freedoms. These include...

CISO from EON Group will tell us - How is the role of cybersecurity changing in a time of change in the European market in the energy and utilities sector? How can responsibilities across borders be...

As can be shown, each and every infectious disease has its own inherent “epidemic code”, that drives its spreading mercilessly on the background of random fluctuations. The particular form of...

The presentation focuses on ransomware attacks this year. It shows selected aspects and challenges faced by those affected. It does not neglect prevention against these attacks.

The gap between network security and engineering can be an existential threat to Operations. Globally, there have already been almost 12 million control system cyber incidents that have killed...

I will focus my talk on quantum key distribution (QKD) - the most reliable way how to securely distribute cryptographic keys. The QKD is one of several applications of an emergent field of quantum...

Joseph is Microsoft’s Chief Security Advisor focused on the Healthcare and Life Sciences in the US where he supports Microsoft customers on industry-related cybersecurity and compliance matters. He...

Scott Knight is a Professor Emeritus at the Royal Military College of Canada, and a previous Head of Electrical and Computer Engineering and Chair of Cyber Security.

The article deals with issues of continuous education of employees. Due to new technologies and new conditions that have arisen after the implementation of individual elements of protection against...

The biggest threats to Czech hospitals and hospital alignment with the Cyber Security Law It is not only the Czech healthcare sector that is continuously facing cyber threats, but in the time of the...

With terrorism concerns at the top of security agendas, this presentation will discuss the cyberterrorism landscape with a focus on ISIS and Al-Qaeda, and what the future of cyberterrorism will look...

Ms. Rebecca Morgan serves as the National Counterintelligence and Security Center (NCSC) Deputy Assistant Director for Enterprise Threat Mitigation and as the Deputy Director of the National Insider...

O vysokou úroveň

programu konference IS2

se staral tým

Who oversees the high level of the IS2 conference programme

odborný programový výborvýbor poradcůkomise síně slávyčestní členové PV

More than 20 years with you

0
speakers
0
expert lectures
0
participants

Information Security with IS2

The conference is intended primarily for senior and middle management from the public and commercial sectors

Especially for public administration, utilities and finance

Information security and personal data specialists will also be pleased

For all those involved in building and managing information security within their organizations or projects

Conference to be held under the patronage of

Image

Parliament CZ

Ing. Jan Bartošek
Chairman KDU-ČSL

Image

MZV

Jakub Kulhánek
Minister of Foreign Affairs

661664 636396 mzv cz

Image

NUKIB

Ing. Karel Řehka 

Image

UOOU

Mgr. Jiří Kaucký
 
Image

Goverment CZ

Vladimír Dzurilla
Government Designated Representative for IT and Digitalization

Image

Director of the Military Intelligence

Brigadier General Jan Beroun

Image

State Secretary at ministry of the Interior

RNDr. Josef Postránecký

Conference partners

TOP partner

PLATINUM partner

ICZ

GOLD partner

T CB 3c n

CZ NIC

SILVER
partners

Cybersecurity Hall of Fame Partner

insighti

Microsoft 2

PwC
Cetin

Partners

PwC

Technical partners

Cesnet
Cetin

Organized by

Cetin