9:00
9:30
|
Registration & morning coffee
|
|
RESPONSE
|
9:31
9:46
|
Event opening & IDC Presentation
Wiktor Markiewicz
Senior Research Analyst, Poland and Baltics, IDC Poland
In-Person
Ewa Lis-Jezak
Regional Director, & MD - Poland & The Baltic States, IDC CEMA
In-Person
|
9:46
10:08
|
Ukraine Keynote Guest
Victor Zhora
Deputy Chairman and Chief Digital Transformation Officer State Service of Special Communications and Information Protection of Ukraine
Digital
|
Since the annexation of Crimea, Ukraine has been under constant attack by Russian hackers. Attacks on critical infrastructure cyber espionage, destruction of databases and servers, disruption of electricity and communications, and disinformation are just some of the activities. What can we learn about new threats straight from the battlefield?
|
10:08
10:40
|
Debate Critical Infrastructure - how to do a proper risk analysis?
Nikola Bochyńska
Editor-in-Chief, CyberDefence24.pl
In-Person
Robert Kanigowski
Head of Information Security & Business Continuity, Provident Polska SA
In-Person
Artur Barankiewicz
Head of Security Business Development, B2B Europe T-Mobile
In-Person
Jarosław Sordyl
CISO, Cyber Security Expert, SECONS - IT/OT Consulting
|
Cyber security today requires a new approach to risk management, based on understanding the strengths and weaknesses of one's own organization, and building on that to develop effective defenses. Conscious management of the security area, taking into account limited and hardly available resources, requires risk analysis and prioritization of threats.
|
10:40
10:51
|
Using zero trust architecture to defend against cyber threats
Tomasz Jedynak
Cybersecurity Sales Manager, Cisco Systems
In-Person
|
With the growing threat, adopting a security strategy based on a zero-trust model has taken on a new urgency. According to this model, you need to think about how to prepare for an attack, because the fact that it will happen is certain. Zero Trust Security is a must for the challenges of digital transformation.
|
10:51
11:02
|
Threat Map: Is your company on target?
Robert Grabowski
Head of CERT, Orange Polska
In-Person
|
Can we expect in the near future massive blockades of government sites, large enterprises, or even streaming services that will stop functioning under the onslaught of attacks. We will present the characteristics of serious threats that have emerged recently.
|
11:02
11:11
|
Sophos MTR – the simplest way to cover the cybersecurity gap
Grzegorz Nocoń
System Engineer, Sophos CEE
In-Person
|
IT resilience is essential for any organization to fulfill its critical missions, maintain its technical edge and guarantee its viability. Cyber resilience must continually adapt and exhibit innovative approaches to ensure its ability to defend against new emerging threats. While this comes at a cost, defending your organization's nervous system is not an option, but a necessity.
|
11:11
11:45
|
Coffee break
|
|
RESILIENCE
|
11:46
12:10
|
CHARLIE-CRP - third alert level
gen. dyw. Karol Molenda
Dowódca Wojsk Obrony Cyberprzestrzeni
Digital
|
The very nature of today's cyber threats is that they cross national borders. The war in cyberspace is already in Poland. The scale of the threat is large. The third alert level on a four-step scale has been declared in Poland for the first time. In times of cyber uncertainty, effective steps must be taken to increase the security of critical infrastructure
|
12:10
12:15
|
IDC study: How does a CISO respond to crises?
Wiktor Markiewicz
Senior Research Analyst, Poland and Baltics, IDC Poland
In-Person
|
Resilient business is rather a way to take advantage of changed conditions and respond effectively to unpredictable events. IDC conducted a survey to gather information on how the war in Ukraine is changing the CISO priority list.
|
12:15
12:26
|
Distributed data security
Piotr Tkaczyk
Senior Systems Engineer, F5 Networks
In-Person
|
12:26
12:36
|
Data Embassy: How did Estonia deal with the Russian enemy?
Karoliina Ainge
Independent Diplomat, Cybersecurity and Technology Lead
Digital
Wiktor Markiewicz
Senior Research Analyst, Poland and Baltics, IDC Poland
Digital
|
Data Embassy is an approach that enables you to store data assets in a secure data center outside your physical territorial boundaries and support those assets in times of crisis, from large-scale cyberattacks to enemy military invasions.
|
12:36
12:47
|
Cloud in the fog of war
Krzysztof Szczepański
Dyrektor Departamentu Bezpieczeństwa i Ryzyka, Krajowa Izba Rozliczeniowa SA
In-Person
Wiktor Markiewicz
Senior Research Analyst, Poland and Baltics, IDC Poland
In-Person
|
12:47
12:59
|
Demand for specialists from the East
Kinga Marczak
General Manager, HRS-IT
Digital
Wiktor Markiewicz
Senior Research Analyst, Poland and Baltics, IDC Poland
Digital
|
The shortage of cybersecurity professionals has particularly troubling implications for business continuity and business resilience. There is a shortage of about 50,000 IT professionals in Poland. This staffing gap could be filled, for example, by professionals from Ukraine. The Ukrainian IT sector has developed rapidly in recent years, among other things, by educating specialists. As a consequence of the war, some qualified Ukrainian IT specialists may start looking for work in other countries.
|
12:59
13:24
|
Interview: A soldier's short answer
ppłk. Krzysztof Przepiórka
Security expert and co-founder of GROM
In-Person
|
GROM co-founder answers questions posed by conference attendees.
|
13:24
13:30
|
Event Summary
Wiktor Markiewicz
Senior Research Analyst, Poland and Baltics, IDC Poland
In-Person
|
13:30
14:30
|
Luch & Networking
|