9 – 10 / 2 / 2026 O2 universum, Prague
The Digital Decade brings not only new requirements but also a unique opportunity for growth:
- for organizations in the areas of cybersecurity, the ethical use of artificial intelligence, and disruptive technologies,
- for your people in developing digital competencies,
- for CIOs and CISOs stepping into indispensable roles that address strategic questions about how the organization and its processes function.
Digital compliance demands new capabilities — the ability to respond with foresight to an increasingly complex cybersecurity reality, a more sophisticated technological environment, and the need for continuous innovation. Managers will be expected to combine technical, legal and business perspectives and prepare the organization for various technological challenges and security threats.
We will demonstrate how digital compliance firmly positions technical and security specialists among key leadership roles and creates demand for higher competencies across other managerial positions. At the same time, we will show how compliance can transform into growth and innovation opportunities and enhance organizational value.
Many companies see compliance as a necessary evil that no one truly understands. The most successful ones, however, view it as a practical framework for managing risks, data, and innovation. This session will explain the working approach needed to translate new legislative requirements into internal processes and to make compliance a natural part of company management rather than an incomprehensible puzzle.
Where is the role of people, and where is the role of technology? We will outline, in practical terms, what can help bring legal requirements, human factors, and technology together. The key lies in clarity and simplicity—both in the law itself and in its application.
"If you can't explain it simply, you don't understand it well enough."
Due diligence, which precedes almost every business acquisition in our market, now focuses largely on areas covered by digital compliance—from IP rights and personal data protection to cybersecurity. Experienced buyers know that these areas often reveal deficiencies that can reduce or delay the payment of the purchase price. How should digital compliance be structured, and what should you prioritize to ensure your company stands up to a curious auditor? And what should you watch out for when you are the one pursuing an acquisition?
We will take the audience directly into the real-life practice of one of the most prominent industrial groups in the Czech Republic. The session will show how Czechoslovak Group approached the setup and implementation of selected compliance activities, which internal processes it transformed, and how it works with data, technology, and management culture. Participants will learn which steps proved effective, what challenges were encountered, and what concrete benefits this journey delivered—from more reliable risk management to strengthened trust among investors and partners.
The final panel discussion will bring together perspectives from experts in law and regulation, technology, and investment to explore how companies can thrive, innovate, and strengthen their competitiveness in an era of rapidly evolving regulation. The panelists will also focus on how to build corporate compliance as an integral part of strategic management and how increasingly demanding regulatory requirements can be transformed into real business opportunities and a foundation for growth and trust.
The debate will outline how progressive companies use reg-tech tools to meet new obligations, how they build efficient and cost-effective compliance programs, how they manage risks, and how investors evaluate a company’s readiness for new requirements. The panel will offer practical insights into how organizations that approach compliance proactively can gain measurable advantages in an increasingly complex environment of (not only) digital regulation.
Modern attacks leveraging artificial intelligence are the focus of our talk. We tested these tools ourselves, which allows us to show how powerful they can be in the hands of attackers. During the session, we will introduce several of these freely available tools, and we will also cover real cases where AI has been used in actual attacks.
We will introduce ESET’s newly formed research team, shed light on the inner workings of today’s cybercriminal groups, and highlight one of the most widespread techniques used to disable security products. Drawing on its own analyses and incident investigations, the team will also point out the most common security weaknesses found in organizations.
Interested in AI security and building resilient applications? This talk will delve into securing language models against prompt injection threats. Explore deployment strategies in AWS and Azure, NLP input validation, prompt tracking, threat modeling, and effective countermeasures.
Logs are no longer just dead data for archiving. In an era where minutes determine success, log management is becoming the central brain of both IT operations and cybersecurity. This talk explores the key trends reshaping the field — from centralization to automated analysis. But we won’t stay in theory. We will walk you through an investigation of a real incident, showing how a properly configured environment can reveal the root cause of an outage or attack in moments, helping prevent critical damage. Discover how to turn terabytes of logs into clear, actionable answers.
What happens once quantum computers break today’s encryption? What will a world look like where trust in data is no longer a given and every archive may become a ticking time bomb?
Radek Šichtanc from O2 will offer a perspective from an operator already working with quantum-secured technologies and will show how organizations can start preparing for the post-quantum era today.
He will build on last year’s topic of the O2 Quantum Shield and expand it towards real-world experience, limitations, and upcoming challenges—from “harvest now, decrypt later” threats to new strategies for protecting long-lived data.