Bjorn R.Watne

Workshop: People-Centric Security, and how to make Security everybody's problem

Ninety percent of all cyber-attacks start with an email targeting your end-users. In this workshop you'll discuss with your peers how to reduce phishing attacks and malware infections by changing risky behavior within your organisation.

In this workshop, we’ll explore:

  • Who is being targeted, and who is falling victim
  • What attackers are sending, and which lures are working
  • When threats arrive, and when people are most likely to click

Key takeaways:

  • Top common challenges facing the group, and potential solutions to overcome them.

Ausra Gustainiene

Keynote: Is Lack of Women In Cyber Security Making Us Less Secure?

Did you know that women represent only 14-20 percent of the cybersecurity workforce – and that there has been no real progress in increasing that percentage over the last few years? Did you know that by 2021, the number of cyber security job opening will grow to 3.5 million? Are Women an answer? Presentation will discuss how Women are making a difference in cyber-security and what should we do to attract and retain them.


Bruno Horta Soares

Keynote: The Seven Cybersecurity Habits of Digital Native Enterprises

Determining the level of risk related with digital transformation is one of the most challenging activities but also one of the critical success factors to get the right level of security. Digital Natives demonstrate seven habits that help them to contain and control security risks and to help them to thrive in the digital business era.

Workshop: Using COBIT 2019 Design Factors to tailor Enterprise Governance of IT

For more than two decades, the COBIT governance framework for enterprise information and technology (I&T) has been helping enterprises derive more value from I&T assets. COBIT 2019, the latest iteration of this world-renowned framework, builds on this legacy. COBIT 2019 not only updates and adds new information, but also offers more practical guidance for tailoring and implementing a right-sized governance program suited to the unique needs of your enterprise.

The workshop goal is to will do quick introduction of the breakthrough publication for the COBIT framework COBIT 2019 Design Guide, allowing participants to understand how to explore the implications of various design factors and their impacts on the design of a governance solution and how to ensure that enterprises create a customized governance system that fits their unique needs.


Sanja Kekic

Keynote: Cybersecurity workforce - yesterday, today and tomorrow

With ubiquitous digital transformation and web applications, as well as cloud services and other IT services currently offered, businesses are facing problems in completing a large number of essential IT positions, let alone those requiring expertise in the field of cybersecurity. This workforce shortage in cybersecurity environment has left CISOs and cybersecurity teams shorthanded while the cyber-attacks are intensifying. So, it makes sense for us to work to reduce the gap and women cannot be left behind. We need women to be a part of our industry if we are going to meet demand. The ISACA's SheLeadsTech program is established with mission to increase the representation of women in technology as well as in cybersecurity leadership roles and the tech and the cybersecurity workforce.


Petr Hujňák

Keynote: Důvěryhodnost IT systémů (Trustworthiness of IT systems)

Zvládání důvěryhodnosti systémů je úkolem, který vyvstává do pozornosti před moderní informatikou postavenou na systémech ze systémů (SoS). Dá se IT systémům důvěřovat, že dělají, co uživatelé a administrátoři očekávají a ne něco jiného? Fungují „správně“ při narušení jejich okolního prostředí, kybernetickým útokům a chybám, které vznikly při jejich vývoji, implementaci nebo servisu? Jaká kritéria mají splňovat důvěryhodné systémy? Budou představeny principy Trustworthy Software Initiative (TSI) a jejich "five facets": SAFE, RELIABLE, AVAILABLE, RESILIENT, SECURE a návody a zkušenosti, jak postavit audit důvěryhodnosti systému.


Ivan Makatura

Keynote: How can security be drowned in deep dirty water of enterprise

Management’s commitment to support security throughout the organization is the one of main conditions for successful implementation of information security management system. Success depends also on real opportunities of security staff to affect security architecture, security baselines and security rules in production. In case that security department is fragmented or placed at the bottom of organizational structure, possibly in the reporting line of IT, there's no chance to achieve any security objectives.