Conference Chair: Jan Patera, Partner, Blue Events

  • 09:00 – 10:00
    A: Security by Desing – what is not safely designed cannot be safely operated

    We have to help each other

    Vladimír Rohel, Safety Division Director, NAKIT

    Penetration tests and Bug Bounty program

    Jindřich Šlisík, Security Manager, Productboard

    Preventive care for your application portfolio

    Martin Diviš, Datacenter Solution Architect, Cisco Systems, Central Europe

  • 10:00 – 10:15

  • 10:15 – 11:45
    B: How to survive with as few losses as possible/ A trouble is the only thing that will teach us

    No Paskvil Agile - How to develop software without throwing money out the window

    Radek Petr, Head of Delivery, MoroSystems

    Meaningful safety of end stations

    Jan Marek, Ethical Hacker

    Modern wireless architecture for corporate networks

    Petr Pavlů, Sales Technical Support Director CEE, CISCO

    CIO under fire for taking evidence

    Radek Beneš, Expert in IT and Cybercrime

  • 11:45 – 12:30
    Lunch break

  • 12:30 – 14:00
    C: When Hacker, Lawyer, Security, and Forensic Expert sit at the same table...

    It's not a joke, it's a chance to understand cybersecurity issues from all angles. What do you want to protect? WHY do you want to protect it and what are the threats if you don't do it? To complete this puzzle with HOW to protect yourself, you need to know what to protect yourself from. An open debate within this discussion panel will help you get into more detail understanding how to do it right.

    Moderated by: Michal Horáček, Cloud Solution Specialist,  Microsoft 

    • Radek Beneš, Expert in IT and Cybercrime
    • Petr Černohorský, SecureXpert: Hunting & Integrations, CISCO
    • Vladimír Jeřábek, Head of Cyber and Information Security, NAKIT 
    • Jindřich Kalíšek, Lawyer and Mediator
    • Jan Marek, Ethical Hacker, Cyber Rangers 
    • Jindřich Šlisík, Security Manager, Productboard
  • 14:00
    Conference end