CONTENTS OF LECTURES 2021

 

 

Applications of blockchain technology in financial institutions

During the presentation Luka will talk about some real and potential use cases of blockchain technology. Special emphasis will be placed on where and how we can use blockchain technology in financial institutions. He will talk about how we can use blockchain technology for better protection of customer data and controls to reduce fraudulent activities.

Luka Milinković
NLB Bank Belgrade
Wednesday, 08.09.2021
14:00 - 14:30
About Lecturer

Can we fight the next war completely in the cyberspace?

In 2016, at the Warsaw Summit, NATO recognized cyberspace as an operational domain together with land, sea, air, and space. Heraclitus more than 2000 years ago said that “War is the father of all and king of all”. War seems to be “curse” following humanity since its early beginning and will probably follow until the bitter end. Based on that observation it is safe to say, that war is constantly evolves, as humanity evolves and sometimes drives the technological advances. Today, cyberspace is a reality. While most of the people have a vague and mostly mistaken idea of what the cyberspace is, we have already shifted most of our activities into cyberspace, and this will not stop. Of course, in such global environment, military operations could not be the exception, and already we have clear examples were cyberattacks were used alongside conventional operations, or as “a weapon of choice”. NATO has already identified that “Cyber attacks present a clear challenge to the security of the Alliance and could be as harmful to modern societies as a conventional attack”.
War has a sole purpose; one entity will force another entity to accept certain terms, which normally the latter would not. Furthermore, every military operation has some distinct characteristics, which have remained the same throughout the ages. For example, you need clear, certain, and achievable goals, or you need to “discover” the focal point of the opponent, which – if taken out the equation – could lead to victory. Since the basic principles will remain the same, the weapons that an opponent will use to achieve them are not that important.

Sozon A. Leventopoulos
Intrasoft International S.A.
Friday, 10.09.2021
12:45 - 13:15
About Lecturer

Cloud security: containers and microservices

In part 1 of Cloud security basics we barely scratched the surface talking about challenges IaaS and PaaS bring altogether. Common idea is that microservices architecture helps enterprises release software faster, update software more frequently, onboard new features more quickly, utilize and scale to insane amounts. However, many things don't end as advertised, so in part 2 we'll see what we are facing with.

Tomislav Gotovac
CARNET – Croatian Academic and Research Network
Wednesday, 08.09.2021
17:00 - 17:30
About Lecturer

Common cyber-security misconceptions

Nowadays, business is intrinsically linked to the Internet, thus it is crucial to understand threats in the online environment. Every few months we read about a major hack, which most of the time leads to data breaches affecting millions of people. Those attacks are growing in number and sophistication and preparedness are some of the major obstacles we are all facing.
In order to better protect ourselves and consequently the companies we work for or own, we need to be clear on some pre-existing common cyber-security misconceptions. Debunking those misconceptions held by far too many end-users, shall unravel our view and increase our awareness of this confusing topic.

Nikolaos Benias
Hellenic Ministry of Defence - Cyber Defence Directorate
Wednesday, 08.09.2021
15:00 - 15:30
About Lecturer

Enable your productivity cloud for secure external sharing

Information protection consists of 3 main area: data discovery and identification (Know Your Data), taking protective measures based on classification and labeling (Protect Your Data) and data loss prevention (Prevent Data Loss). In his presentation Zsolt Bátorfi will share best practices on how to set up and deploy Microsoft Teams and SharePoint Online infrastructures for secure external sharing and collaboration.

Zsolt Bátorfi
SOFTLINE
Thursday, 03.06.2021
15:30 - 16:00
About Lecturer

Entry into SCADA penetration testing

Mane Piperevski
Piperevski & Associates
Friday, 10.09.2021
12:15 - 12:45
About Lecturer

European Data Protection & the EDPB

During the presentation, Mr Karadjov will address how the EDPB works and how it contributes to the consistent application of data protection rules across the EEA. Special emphasis will be placed on how the EDPB strategy and work programme will help guide the EDPB’s work in the years to come and how it will help create a more consistent understanding of the key concepts and processes in the GDPR and the cooperation and consistency mechanism in particular.

Ventsislav Karadjov
European Data Protection Board
Friday, 10.09.2021
09:15 - 09:45
About Lecturer

Following information flow

Aleksandar prepared a walkthrough on how to use Classificaton tool, DLP tool, DB Security, Rights management and SIEM in conjungtion to be able to follow an information (electronic form) from the moment it enters the company till the moment it goes out. All logs from the flow could be used with SIEM to produce alerts and reports for moniyoring.

Friday, 10.09.2021
11:45 - 12:15
About Lecturer

Implementation of SAST (Static Application Security Testing) and DAST (Dynamic Application Security testing) in SDLC

Businesses are affected on a daily basis because of growing cybersecurity threats. Application security has to be taken into account in SDLC (Software development life cycle). In this session we will talk about how we implemented DAST and SAST security testing in our application development process.

Blaž Gvajc
Danfoss Trata d.o.o.
Friday, 10.09.2021
12:15 - 12:45
About Lecturer

Improve security with M365 in a small business environment

Small business companies are the most common form of business. In such companies, the tools of the Microsoft 365 platform are very often used for collaboration and LOB. These kinds of companies, don't have enabled all security features, what platform offers, and can be targets for various security breaches. With a few simple configurations, we can raise the level of security to an acceptable level of risk. 2FA, polices, disable mail forwarding and control of sharing data are key configurations that are easy to set up and
drastically increase security.

Božidar Radosavljević
MCT and CEH trainer, MK IT Business Solutions
Wednesday, 08.09.2021
16:30 - 17:00
About Lecturer

Infinity SOC

For many Security Operations Center (SOC) teams, finding malicious activity inside the network is like finding a needle in a haystack. They are often forced to piece together information from multiple monitoring solutions and navigate through tens of thousands of daily alerts. SOC analysts are usually required to search for indicators of compromise (IoCs) within network, cloud, and endpoint environments. They then need to drill-down into findings to validate the breach and plan their response. The results in many cases, and also in the sunburst hack case, are that critical attacks are missed until it’s too late. In the sunburst case, organizations found out about this internal threat when it was too late, a few months after the attack started and they were already seriously damaged…

Thursday, 03.06.2021
15:00 - 15:30
About Lecturer

Key things to consider when designing and planning server rooms/data centers

There is a saying “The cloud is just someone else's computer”. And that computer is, most of the times, in a data center. We want that computer to be always available, secure and stable. To achieve that, there are certain requirements and considerations that need to be met when designing and building data centers.
In Luka’s presentation, he will give you a high-level overview and some guidelines on how to achieve this requirements and how this facilities are designed from a critical infrastructure standpoint. He will also try to bring closer to you what critical infrastructure systems there are in a data center and raise awareness of all the other systems behind the curtain that are enabling smooth and carefree operation of your services in the data center (electrical systems for uninterruptible power, mechanical and cooling systems for cooling the servers, monitoring systems, energy efficiency, etc.)
Main emphasys of this presentation is to introduce cybersecurity professionals to concepts of critical infrastructure on which all of their services rely heavily on.

Luka Pap
VERTIV Croatia d.o.o.
Thursday, 09.09.2021
13:00 - 13:30
About Lecturer

Live response, forensics and breach analysis of an Oracle database

Pete will explore all of the high level issues and process involved in responding to a breach or possible breach of an Oracle database. This involves building a team and performing incident response. A formal process must exist and be followed. Live analysis of the database can be complex and Pete covers this with guidance. Forensic analysis of the gathered artefacts is next. The responder must build a time line of events and evidence and checksum these to prove in court. Pete will cover all aspects of a breach response and also will show some data and examples.

Pete Finnigan
Pete Finnigan Ltd.
Friday, 10.09.2021
11:15 - 11:45
About Lecturer

Optimum Security with automated processes

Assume that endpoint protection is satisfactory. What is the reason for investing in additional solutions in addition?
The vast majority of threats need to be automatically identified at the earliest point in the counter-attack chain and the necessary countermeasures taken, and the smaller the overall impact of the threats on resources and the extent of the damage to our wallets. The majority of security incidents (approximately 90%) are immediately addressed by a good EPP solution and do not occupy either the EDR solution or security personnel who can focus on more advanced and therefore more dangerous threats.
What about the remaining, much more dangerous 10% of pests?
These are called evasive, targeted, complex, advanced attacks (ATP). These can also be defended at the network level (yes), but more effectively and above all at cheaper endpoints !!
Much more information is already needed here for effective defense.
Such as
• What is the alarm environment?
• What measures have already been taken in relation to the alert?
• Is the detected threat still active?
• Have other hosts been attacked?
• What route did the attack take?
• What is the actual root cause of the threat? At what endpoints did it start?
Oh, and it would be nice to react to the incident as soon as possible: (Response). Pld:
• Automatically quarantine files that can be associated with a complex threat at each endpoint
• Automatic disconnection of infected hosts from the network for the purpose of examining damage alert data related to a rapidly spreading threat
• Prevent the malware file from running and spreading on the network for the duration of the scan
Achieve your optimum level of cybersecurity with managed protection and cloud-enabled endpoint detection and response

Srdjan Radosavljević
KASPERSKY LAB
Friday, 10.09.2021
09:15 - 09:45
About Lecturer

The Future of Transport: Exploring the security risks

Transportation is a critical factor that influences economic growth all around the world. With the help of innovative technologies and IoT (Internet of Things), the transportation sector is transforming into a more connected and more autonomous system. As a matter of fact, projections indicate that the transportation industry will experience more changes in the next 30 years than we have seen in the last 100 years.
However, these advancements and the increasing dependence on IT present a broader attack surface for bad actors.

Rachel Okoji
Wednesday, 08.09.2021
14:30 - 15:00
About Lecturer
Dominique C. Brack
T-Systems Schweiz
About Lecturer

The World’s First Autonomous Breach Protection Platform

Get End-to-End Breach Protection, Regardless of Your Security Team Size and Skill. Cynet XDR natively unifies NGAV, EDR, NDR, UEBA and Deception technologies with completely automated attack investigation and remediation on a single, intuitive platform. Backed by a 24/7 Managed Detection and Response service. Cynet provides comprehensive protection of the environment for even the smallest security teams.

Miri Varbitzky
Cynet Security Ltd.
Thursday, 09.09.2021
16:30 - 17:00
About Lecturer

To patch, or not to patch, this is the question

Supply chain attacks represent an extremely significant threat to organizations. Everyone is in danger as they affect every link in the chain and any type of business indiscriminately. Supply chain attacks are usually a consequence of the information a company shares with suppliers. As this is necessary, it is easy to imagine how compromising a link in the chain can lead to the leak of confidential information and to the compromise of other actors in the same chain.
In this talk we will explore how supply chain management and cyber security are strictly connected, what is the role of the humans and what are the best practices for improving security.

Matteo Cuscusa
Cuscusa Web & Security
Wednesday, 08.09.2021
14:00 - 14:30
About Lecturer

Vendor Risk Assessment using AI and Machine learning

"Data is a new oil”. In today’s era, the companies use Business Process Outsourcing more than ever. They share their most precious assets, their crown jewels, their data. How to be sure, that data will remain secure and not misused to an unwanted party.
In the presentation, Nebojsa will depict the concept of Vendor Risk Assessment using AI and Machine learning. This concept can radically increase speed of the assessment and to be more affordable than manual assessment managed by risk assessment experts.
In the presentation, it will be explained some of Google AI services like Cloud Vision and how they can help document recognition and classification using natural language processing using APIs to classify, extract, and enrich documents.

Nebojša Cvijetić
Friday, 10.09.2021
09:15 - 09:45
About Lecturer

Vuln Hunting Using Python AST

Application security engineers and vulnerability hunters often search code for specific strings or patterns as a starting point for vulnerability discovery. In this talk I aim to show how searching raw code can be improved upon by searching Python abstract syntax trees. We used such techniques at Bitstamp security team to help us discover codebase specific patterns which are otherwise hard to search for. These patterns can be used to improve SAST automation which you might already use in your CI/CD pipeline. I will opensource a simple proof of concept AST scanner for searching custom AST patterns with some code structure awareness.

David Petek
BITSTAMP d.o.o.
Friday, 10.09.2021
09:45 - 10:15
About Lecturer

What is your cyber risk appetite?

In this presentation Jurica will present options on how the companies and organisations are treating risks they are facing and how this correlates with their risk appetite.

Jurica Čular
Infobip
Wednesday, 08.09.2021
16:00 - 16:30
About Lecturer

 

CIO FORUM

 

ROUND TABLE: Kako lahko CIO in ponudniki IT storitev še izboljšajo sodelovanje?

09.09.2021
16:00 - 17:00
About Lecturer

ROUND TABLE: Kako reševati trenutne izzive pri vodenju informatike?

09.09.2021
12:30 - 13:30
About Lecturer
8.-10.9.2021
Nova Gorica
1 day
424€
2 days
600€
3 days
900€
1 conference day
424€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

2 conference days
600€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

3 conference days
900€

The price applies to INFOSEK, GDPR (ZVOP-2) and CIO FORUM. The prices for NLP conference and workshops are fixed.

Platinum sponsors

Golden partner

Golden sponsors

Bronze sponsors

In cooperation with

Technology sponsors

Media sponsors

Obveščamo vas, da so bili naši pogoji poslovanja posodobljeni.
Sprememba se nanaša na člen »Odpoved ali sprememba dogodka s strani organizatorja«. Zaradi nepredvidenih dogodkov, kot je tudi trenutna epidemija koronavirusa, si pridržujemo pravico, da posamezna izobraževanja odpovemo ali spremenimo termin oz. način izvedbe (online izvedba).

Odpoved ali sprememba dogodka s strani organizatorja
Organizator si pridržuje pravico do odpovedi posameznega izobraževanja, delavnice, dogodka, seminarja ali spremembe terminov oz. načina izvedbe (namesto osebne izvedbe dogodka, izvedba dogodka preko spleta ali na drug način, pri čemer se ključna vsebina in obseg dogodka ne spreminjata oziroma se prilagodita glede na spremembo, npr. zamenjava predavatelja, prilagoditev urnika ipd., vendar se ohrani enakovredna kakovost izvedenega dogodka). Zavezuje se k obvestilu prijavljenim najkasneje en delovni dan pred predvidenim pričetkom izobraževanja oz. takoj, ko prejme novico o morebitnih izrednih dogodkih, ki so razlog za spremembo/odpoved. V primeru odpovedi izobraževanja s strani organizatorja, organizator, morebitno že vplačano kotizacijo, brezobrestno povrne v roku štirinajstih dni od obvestila o odpovedi ali pa omogoči stranki, da kotizacijo porabi za druge izdelke ali storitve. V primeru spremembe načina izvedbe ostanejo plačila v veljavi, v primeru spremembe termina pa ima udeleženec možnost odpovedati udeležbo iz utemeljenih razlogov po določbi Odpoved s strani udeleženca ali pa se odjaviti na način v rokih, ki jih predvideva določba Odjava udeleženca. 

Celotni pogoji poslovanja so dostopni tukaj: https://poslovanje.pogoji.si/tos/29xyi0o

Ta spletna stran uporablja piškotke. Z obiskom in uporabo spletne strani soglašate s piškotki.  DOVOLIM Več informacij o piškotkih najdete in nastavitve tukaj.