Technology architecture and processes management are coming together on the 2016 Cyber Security Summit on 6th-7th April in the beautiful city of Prague. All attendees have the opportunity to be part of a dynamic cyber-mix of presentations, discussions and hands-on workshops, all of which are tailor-made for the needs of your organization.

Inspiring and extensive agenda

The 2016 Cyber Security Summit offers you the advantage of creating your own agenda depending on your industry. Choose between 4 keynotes, 6 workshops, 34 sessions and over 10 hours of networking and find the solution you need to get you out of your cyber security comfort zone. With industries in focus such as finance, electricity, oil and gas, government, pharma, transportation, manufacturing and the telecoms industry, each attendee will have the opportunity to learn about poor corporate security and insider threats, the harsh reality of widespread data breaches as well as how the lack of cyber defense automation actually harms your corporation.

This year, you can choose from 6 different tracks depending on your industry and interests, 3 morning and 3 afternoon tracks:

Track A: Security Infrastructure Architecture

Track B: Cyber Crisis & Law Enforcement

Track C: Internet of Things

Track D: Cloud and Data Security

Track E: Threats and Threats Actors

Track F: Cyber Investigation & Recovery

 

Day 1 –Benefit from our exceptional panel of speakers

At the beginning of the 2016 Cyber Security Summit, you will have the opportunity to be part of an exceptional and leading-edge panel of speakers with presentations from Lars Hilse (CEO of Lars Hilse) who will provide an overview of the threat landscape in the cyber context, Torben Jorgensen (Vice President, Information Security & Risk Management of Vestas) on risk management and governance and case studies and discussions from Robert Duncan (Chief Information Security Officer of Euronext) on how to design a clear security posture. Graham Thomson (CISO of The Hut Group) will talk about making cyber threat intelligence work for your company and Aftab Afzal (Senior Director of Sales of Akamai Technologies) about the recent web threats and bot trends of 2015.

If you feel like rolling up your sleeves after all these inspiring presentations, you’re in luck! You can look forward to the afternoon workshops and choose between 10 workshops that are specifically formed in order to answer your questions on industry-specific challenges and trends.

Day 2 – Plan your own agenda

On the second day of the 2016 Cyber Security Summit, you can benefit from our unique group of speakers and advisors such as Ivan Sanchez (Information Security Director of Sanitas/Bupa Group), Joey Hernandez (Cyber Security, Threat Intelligence Management & Analysis EMEA of United States Africa Command) to learn more about security infrastructure architecture.

If you are interested in “Cyber Crisis and Law Enforcement”, attend our panel discussions and case studies from Jakub Boratynski (Head of the Trust and Security Unit of the European Commission DG Connect, Trust and Security Connect) who will talk about the European policy on cybersecurity, Louis Marinos (Senior Expert Risk Management for ENISA) on the ENISA threat landscape and the current developments, Vittorio Tronci (ICT Manager of Terna) on crisis management or Kristof Lamont (Air Traffic Management /Cyber Security Senior Expert of Eurocontrol) who will present the security trends in the safety driven aviation environment.

Claus Cramon Houmann (Consultant on Cyber Security & Strategic IT of ImproveIT) will begin the Track C “Internet of Things” agenda followed by Karl O. Feger (CISO for Saxon State Government) who will help you learn how to use the attack chain model in order to plan security monitoring.

Track D is focused on “Cloud and Security Data” with presentations from Tarun Samtani (Cyber Security & Information Security Architect, and vCISO of eBuyer), Mustafa Komut (Business Continuity Senior Manager of Vodafone) and Dejan Stankovic (Head of Cyber Security & IT Infrastructure Department, Ministry of Defense of Montenegro).

Meanwhile, “Threats and Threats Actors” will be the main subject of the Track E agenda. Feel free to associate with Jerome Saiz (Information Security Expert of EPITA Engineering School) who will discuss the gap between physical and IT security. Next, Milica Djekic (Cyber Security researcher, Journal of Computer Sciences and its Applications; Cyber Defense Magazine; Australian Security Magazine) is going to present the most challenging aspects of an online work environment and how to manage and protect the identities of home-based staff. If you want to engage cyber security with your business, make sure to attend the session Mauriche Kroos (Security Officer of Enexis), as he will demonstrate how to plan for cyber-costs, touching upon budget cycles, clean-up and legal aspects.

Last but not least, “Cyber investigation and recovery” is the subject of the Track F agenda with Mahmoud Yassin (Manager- Data Center of NBAD) on automation as the solution to a better-advanced incident response. Join the follow-up case studies and dig deeper into digital forensics and international incident handling.

Still not convinced? Visit the 6th Annual Cyber Security Summit page and learn more about this fascinating event and how you can be a part of it. Oh and don’t forget! Follow us on Facebook, Twitter and LinkedIn. We’ll keep you posted!