CONTENTS OF LECTURES 2022

 

 

Create Onion Layers of Security around your data

My area of expertise is securing data in an Oracle database but the same ideas can transcend any database or type of data store. In my world we are securing Oracle BUT actually we are securing data held inside Oracle. We do not secure Oracle; we secure data. I will cover all the main areas to focus on in this talk; where is the data we want to protect, user access controls, data access controls, database access controls, patching, hardening and also context based security and adaptive security and audit trails. These ideas can be used on any data store; a file, a database, Oracle, SQL Server, ...

Pete Finnigan
Pete Finnigan Ltd.
Wednesday, 09.03.2022
09:00 - 09:30
About Lecturer

Demystifying Zero Trust

"Never trust, always verify" is the core principle of the Zero Trust Model, a rising trend in the world of IT security. With more and more people working remotely, there's a growing need to adapt to the complexity of the new hybrid workplace and to protect the people, devices, and apps, wherever they're located. However, not all people and organizations are ready for the digital transformation and management complexity that "perimeterless" security might require.
Verifying everything explicitly (users, apps, devices), using a least-privilege access model, defining the proper context for policy compliance and device health, and applying an assume breach approach are all essential parts of the process. Join this session to find out everything about how Zero Trust architectures are designed to work, and how implementing (or not implementing) ZT might impact you and your organization.

Tudor Damian
Microsoft Cloud & Datacenter Management MVP, Certified Ethical Hacker
Wednesday, 09.03.2022
14:00 - 14:30
About Lecturer

Dobre prakse korporativnega upravljanja z informacijsko varnostjo

ECM|BPM platforma naslednje generacije za varno digitalno transformacijo vašega biznisa

Na primeru ECM|BPM platforme ARIGAMIX bomo obravnavali možnosti izgradnje varne in fleksibilne arhitekture za upravljanje digitalnih procesov in dokumentov v podjetju. Pogovorili se bomo o sodobnih funkcionalnih možnostih za integrirano upravljanje vsebin podjetja (IDM), modeliranje, avtomatizacijo in spremljanje poslovnih procesov, interakcijo z drugimi korporacijskimi IT sistemi podjetja z uporabo Low-code orodij. Razpravljali bomo o pomembnosti uvedbe tovrstnih platform pri uporabi geografsko porazdeljenih informacijskih sistemov.

Sergei Voroncov
ARIGAMIX d.o.o.
Thursday, 26.05.2022
12:15 - 12:30
About Lecturer

How to detect and prevent hackers in your network?

Alan Osmanagić
INFIGO IS d.o.o.
Thursday, 26.05.2022
10:15 - 10:30
About Lecturer

Latest cyber attack trends in Hungary

The accelerated digitalization of the organizations and the rise of remote working created new targets for cyber attacks. In addition to the security awareness of the users, it is extremely important to shield up the organizations as well, they must be prepared to respond to a destructive cyber attack. As an expert from the National Cyber Security Center of Hungary, Vivien will introduce the daily work of the Computer Security Incident Response Team and highlight the latest trends and challenges regarding cyber attacks in Hungary.

Wednesday, 09.03.2022
13:30 - 14:00
About Lecturer

Power Platform Security and Governance

We will walk through Security and Governance strategies that can be used to secure your Power Platform environments.
The topics in this presentation include:

  • Environments
  • Data Loss Prevention policies
    - Environment vs Tenant-wide DLP policies
    - Dealing with exceptions
    - HTTP Triggers and Actions
    - Custom Connectors
  • Using Azure AD Groups to simplify environment access, deployments, licensing.
Božidar Radosavljević
ComTrade System Integration
Wednesday, 09.03.2022
13:00 - 13:30
About Lecturer

Router Vulnerabilities in the Past, Present and Future

Routers are considered easy to hack, and that's kind of true. But is that much harder to hack a home router than a very expensive enterprise firewall? Think twice before answering!
The purpose of this talk is to demonstrate the similarities in inner workings, technology, hardware and vulnerability density between every piece of network equipment, be it for home or enterprise.
We will walk through specific examples of vulnerabilities found in these equipments in the past and present. Vulnerability patterns will be identified, and we will discuss why they keep occuring and what circumstances led to them appearing in the first place.
Finally, we will discuss future trends for vulnerabilities in network equipment. And because it can't all be negative, we will also discuss how the constant hardening of these devices will make exploitation much harder (but far from impossible :) in the future.

Pedro Ribeiro
Agile Information Security
About Lecturer

Securing your GitHub Org

GitHub holds one of the main assets for many tech companies out there: The source code to their main products and, in the time of GitOps, also potentially their infrastructure. We will present a threat model for GitHub-based organizations which we used to determine relevant hardening steps and processes. To stay true to the subject, we will also start to outline how you can use GitHub functionality to ensure a continuously high security level of your GitHub org.

Matthias Luft
Salesforce
Wednesday, 09.03.2022
12:30 - 13:00
About Lecturer
Guillaume Winter
Salesforce
About Lecturer

The Power of Phishing Attack 2.0

During the presentation Luka will talk about the constant problems of phishing attacks, and how trivial and ridiculous a phishing attack is sometimes, and sometimes powerful when used in the right way, and there is no advanced protection in the company. We will see what current phishing campaigns are and go through some examples from practice. We will also highlight some measures and steps, which are very important for successfully avoiding phishing attacks or early detection.

Luka Milinković
NLB Bank Belgrade
Wednesday, 09.03.2022
09:30 - 10:00
About Lecturer

 

CIO FORUM

 

7.-9.9.2022
Nova Gorica

Take advantage of a 3% discount, only valid until 25.5.2022

1 day
424€
411€
2 days
600€
582€
3 days
900€
873€

Take advantage of a 3% discount, only valid until 25.5.2022

1 conference day
424€
411€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

2 conference days
600€
582€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

3 conference days
900€
873€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

Platinum sponsors

Golden partner

Golden sponsors

Bronze sponsors

Technology sponsors

Media sponsors

Sponzorji sekcije ZAUH

Srebrni sponzorji

Bronasti sponzorji

Sponzor tehnologije

Medijski sponzorji

Obveščamo vas, da so bili naši pogoji poslovanja posodobljeni.
Sprememba se nanaša na člen »Odpoved ali sprememba dogodka s strani organizatorja«. Zaradi nepredvidenih dogodkov, kot je tudi trenutna epidemija koronavirusa, si pridržujemo pravico, da posamezna izobraževanja odpovemo ali spremenimo termin oz. način izvedbe (online izvedba).

Odpoved ali sprememba dogodka s strani organizatorja
Organizator si pridržuje pravico do odpovedi posameznega izobraževanja, delavnice, dogodka, seminarja ali spremembe terminov oz. načina izvedbe (namesto osebne izvedbe dogodka, izvedba dogodka preko spleta ali na drug način, pri čemer se ključna vsebina in obseg dogodka ne spreminjata oziroma se prilagodita glede na spremembo, npr. zamenjava predavatelja, prilagoditev urnika ipd., vendar se ohrani enakovredna kakovost izvedenega dogodka). Zavezuje se k obvestilu prijavljenim najkasneje en delovni dan pred predvidenim pričetkom izobraževanja oz. takoj, ko prejme novico o morebitnih izrednih dogodkih, ki so razlog za spremembo/odpoved. V primeru odpovedi izobraževanja s strani organizatorja, organizator, morebitno že vplačano kotizacijo, brezobrestno povrne v roku štirinajstih dni od obvestila o odpovedi ali pa omogoči stranki, da kotizacijo porabi za druge izdelke ali storitve. V primeru spremembe načina izvedbe ostanejo plačila v veljavi, v primeru spremembe termina pa ima udeleženec možnost odpovedati udeležbo iz utemeljenih razlogov po določbi Odpoved s strani udeleženca ali pa se odjaviti na način v rokih, ki jih predvideva določba Odjava udeleženca. 

Celotni pogoji poslovanja so dostopni tukaj: https://poslovanje.pogoji.si/tos/29xyi0o

Ta spletna stran uporablja piškotke. Z obiskom in uporabo spletne strani soglašate s piškotki.  DOVOLIM Več informacij o piškotkih najdete in nastavitve tukaj.