Registration Become a partner

Program - Autumn ITAPA 2024


00:00
ITAPA CYBERSEC
ITAPA CYBERSEC
The third day of the Autumn ITAPA 2024 conference will focus on cyber security.
08:00
Registration, morning coffee
09:00
3.deň - úsek 1
9:00 - 10:10 Technological Trends in Cyber Security (hall LONDON I+II) INTERPRETED
The panel discussion will focus on the latest innovations and challenges of modern technologies, which also shape the field of cyber security. Recognized foreign experts will discuss technologies such as artificial intelligence (AI), machine learning (ML), automation of security processes and quantum computing, which have a fundamental impact on cyber resilience. Topics such as cloud security and data protection in cyberspace will be complemented by insights into how AI and ML help predict and respond to threats in real time, while quantum computing brings the potential for a paradigm shift in encryption and data protection. The discussion will also focus on what measures the European Union should take to strengthen its competitiveness in cybersecurity. The panel will thus offer a comprehensive view of the future of technological solutions with an emphasis on their practical application and strategic importance for ensuring digital resilience in the EU.
09:00
Vera Wisterová,
Moderator
09:15
Ramsés Gallego, Quantum World Association
Quantum Computing: Re-Evolution
09:35
Ramsés Gallego, Quantum World Association
Vassiliki Gogou, ENISA
Uros Zust, ISACA
DISCUSSION "Technological Trends in Cyber Security"
10:10
3.deň - úsek 1.1
10:10 - 10:35 Geneva Manual on Cyber Intelligence (hall LONDON I+II) INTERPRETED
Dr. Paul de Souza will discuss the Geneva Manual, which is an important source of information to improve global cyber threat intelligence (CTI) practices at the policy level. The handbook is a non-binding tactical guide for improving information sharing critical to national and international security. This panel will provide an overview of how the Geneva Manual supports policymakers, strategists and legislators in developing and revising cyber security policies that are actionable and relevant.
10:10
Rastislav Janota,
Moderator
10:10
Dr. Paul de Souza, Cyber Security Forum Initiative
1on1 interview
09:50
3.deň - úsek 1.2
10:35 - 11:00 Cyber Security Challenges (hall LONDON I+II) INTERPRETED
10:35
Vera Wisterová,
Moderator
10:35
Vladimír Frčo, Alanata
Effective cybersecurity and cost savings
11:00
NETWORKING BREAK
10:10
3.deň úsek 1.2
11:20 - 12:00 Trust, but Verify: Principles of Secure Software Delivery in Public Administration (hall LONDON I+II) INTERPRETED
Security threats in IT are constantly evolving, and companies must adapt their security measures accordingly. Many are already managing software security within their systems. But how can you prevent malicious code from entering through software from partner companies? What if your supplier is unaware of vulnerabilities they are unknowingly delivering to you? In this lecture, we will focus on comprehensive management of software lifecycle security—from development, through deployment, to actual operation, including your suppliers, who are also exposed to software vulnerabilities.
11:20
Vera Wisterová,
Moderator
11:27
Anton Giertli, RED HAT
Martin Hrachala, Ministry of Interior of the Slovak Republic
Erik Minarovič, Ministry of Finance of the Slovak Republic
Discussion "Trust, but Verify: Principles of Secure Software Delivery in Public Administration"
12:00
BREAK
10:40
3.deň - úsek 1.3
12:05 - 12:45 Technologies for Cybersecurity I (hall LONDON I+II) INTERPRETED
12:05
Vera Wisterová,
Moderator
12:27
11:20
3. deň - úsek 2.0
12:45 - 13:40 Tools to Support Incident Handling Processes (hall LONDON I+II) INTERPRETED
The panel will focus on modern solutions and technologies that facilitate security teams' work identifying, analyzing, and resolving security incidents. In today's dynamic environment, where cyber threats are evolving at breakneck speed, effective incident handling is critical to minimizing risk and protecting organizations' sensitive data. The competency of cyber security incident investigation specialists and forensic analysts will always be important, but without the tools to monitor and analyze data in real-time, as well as automate incident response steps and rapidly detect threats, it is impossible to keep up with attackers. Experts will focus on practical experiences using these tools, including their benefits, limitations, and costs. The importance of artificial intelligence and machine learning in improving the incident handling process will also be mentioned, especially in the areas of predictive analytics and anomaly detection. 
12:45
Ivan Makatura,
Moderator
12:52
Juraj Belko, FORTINET
Use of generative AI in SOC tools
12:59
Karol Drgoň, DXC Technology Slovakia
Vladimír Frčo, Alanata
Zsolt Géczi, Palo Alto Networks
Michal Srnec, Aliter Technologies
DISCUSSION "Tools to Support Incident Handling Processes"
13:40
LUNCH
13:40
3.deň úsek 3.0
14:30 - 15:20 Security in the Cloud (hall LONDON I+II) INTERPRETED
Cloud solutions are becoming increasingly popular across industries ranging from financial services to the public sector and offer several benefits, including flexibility, scalability, and availability. However, with the increase in the use of cloud technologies comes new security challenges that need to be addressed. The discussion will cover various aspects of security in the cloud, including protection of data transmission and storage in hybrid and public clouds, access control, user identification and authentication in the cloud, monitoring, and incident detection in cloud environments, and options for securing virtual networks and data centers of cloud service providers. Experts will share their experiences and views on effectively minimizing risks and ensuring the trustworthiness of cloud solutions and their compliance with international standards and regulations. Panelists will gain insight into the latest technologies and best practices that enable effective protection of sensitive data in a cloud environment and how to ensure compliance with international standards and regulations.
14:30
Vera Wisterová,
Moderator
14:30
Andrej Časný, Oracle Slovakia
Zuzana Holý Omelková, GAMO
Juraj Nemeček, Alanata
Ján Paulech, National Agency for Network and Electronic Services
Juraj Rumanovský, Fortinet
DISUSSION “Security in the Cloud“
14:30 - 15:15 NIS 2 and Cyber Security Strategy in Slovakia (hall BERLIN) INTERPRETED
Discussion on the implications of Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures to ensure a high common level of cyber security in the Union (NIS2). Obligations for the Slovak Republic resulting from the Directive, the legal force of the EU Directives in comparison with the EU Regulations. Transposition of Act No. 69/2018 Coll. on cyber security, new industries, new method of identification of obliged persons. 
14:30
Ivan Makatura,
Moderator
14:30
René Baran, National Security Authority
Jaroslav Ďurovka, SK-CERT
František Hajduk, Ministry of the Interior of the Slovak Republic
Miriama Podskubová, HAVEL & PARTNERS
Discussion "NIS 2 and cyber security strategy in Slovakia"
14:20
3.deň - úsek 4
15:15 - 15:30 Attack before the Attack: Use Penetration Testing as a Proactive Strategy (hall BERLIN) INTERPRETED
15:15
Ivan Makatura,
Moderator
15:15
Peter Dekýš, ESET
1on1 interview
14:50
3. deň - úsek 4.1
15:20 - 15:30 Security of Electronic Communications Services (hall LONDON I+II) INTERPRETED
15:20
Vera Wisterová,
Moderator
15:30 - 16:05 Can the Level of Cyber Security be Measured? (hall BERLIN) INTERPRETED
In this block, the presenters will present various frameworks for measuring the level of cyber security. A presentation by a representative of the European Cyber Security Agency (ENISA) exclusively for ITAPA participants will present the methodology for creating the European Cyber ​​Security Index (EU-CSI).
15:30
Rastislav Janota,
Moderator
15:30
Matej Šalmík, National Security Authority
How did Slovakia do in ITU GCI 2024?
15:50
Ivan Makatura, Cyber Security Competence and Certification Center
The future Slovak cyber security index
15:30
3 deň - úsek 4.2
15:30 - 15:50 Technologies for Cybersecurity II. (hall LONDON I+II) INTERPRETED
15:30
Vera Wisterová,
Moderator
15:30
Patrik Porubčan, PRESMONT - CSS
Modern and accessible backup for everyone
15:37
15:20
3.deň - úsek 5
15:50 - 16:15 What are they talking about in Brussels Cafes? (hall LONDON I+II) INTERPRETED
European legislation is a robust process in which orientation is only possible if you live it. It should be added that the European Parliament, the European Council and the European Commission have been conducting very intensive legislative activities regarding cyber security for the past two years. In addition, there is also a wealth of information, the knowledge of which can indicate to non-participants what has changed and what will change in the European regulation of cyber security and data protection.
15:50
Ivan Makatura,
Moderator
15:50
Radoslav Repa, Deputy National Security Office for Cybersecurity and Cyber Diplomacy in Brussels
1on1 interview
16:05 - 16:45 WORKSHOP GREYCORTEX: Detection and Evaluation of Cyber Security Incidents (hall BERLIN)

Visibility into what is actually happening in the network, what assets are in the infrastructure, which assets truly need protection, as well as the detection and evaluation of cyber security incidents, has a crucial impact on the operational and cyber security of IT and OT networks. Take a look at GREYCORTEX Mendel and find out how it can help and why it should be a fundamental part of your XDR platform or comprehensive cyber security ecosystem.

16:05
Ondřej Hubálek, GREYCORTEX
Radim Kraut, GreyCortex
How to detect and evaluate cyber security events (including live demo)
16:15
NETWORKING BREAK
15:40
3.deň - úsek 6
16:35 - 17:00 Future Cyber Security Projects and Initiatives in Slovakia (hall LONDON I+II) INTERPRETED
A brief introduction to the methods of financing the requirements of European and national cybersecurity and the resulting projects. Upcoming calls, financial resources, and methods of grant funding from public sources.
16:35
Vera Wisterová,
Moderator
16:35
Michal Ohrablo, Cyber Security Competence and Certification Center
Funding from directly managed EU programms
16:45
Ervín Šimko, Ministry of Investments, Regional Development and Informatization of the Slovak Republic
Current and future cybersecurity projects and initiatives in Slovakia
16:35
3 deň. úsek 7
17:00 - 17:45 ITAPA OPEN TALK: Defense by Attack (hall LONDON I+II) INTERPRETED

The discussion will cover Offensive Cyberspace Operations (OCO). We will examine how preventive cyber strategies shape national security. This session will discuss the US Department of Defense's "Defend Forward" and "Hunt Forward" initiatives, which illustrate how offensive cyber actions can disrupt an adversary's capabilities before they strike.

17:00
Rastislav Janota,
Moderator
17:00
Dr. Paul de Souza, Cyber Security Forum Initiative
Rani Goli, IT advisor at the Dutch Ministry of Defence
Discussion
17:45
Cup of wine / Conclusion of the 3rd day of the conference


Nastavenie súborov cookies