9. 11. 2017 Add to Calendar
I solemnly confirm my attendance at the conference:
Yes No

TEMPEST has the right to refuse participation in the event for reasons of capacity or other organizational constraints.

for more e-mails separate by commas

DO NOT MISS THE START

Time till conference’s start

0

days

0

hours

0

min.

0

sec.

We are looking forward to your participation.

THEMES OF LAST YEAR'S CONFERENCE (2016)

  • Ransomware – new risks, the evolution of attacks aimed at preventing access to your own data
  • Web security – the latest forms of attacks, threats, examples of abuse
  • SCADA architecture and the protection of industrial networks, the possibility of abuse of IoT
  • Personal data protection – the implications regulation of the European Parliament and of the Council (EU), which enters into force in 2018
  • Attacks through known software vulnerabilities (zero-day attack)
  • Scenarios of current cyber wars
JONATHAN SHAW KEYNOTE SPEAKER OF LAST YEAR'S CONFERENCE 2016

KEYNOTE SPEAKER: JONATHAN SHAW

Major-General Jonathan Shaw is a global authority on the impact of developments in cyberspace and how to respond. He commanded the Multi-National Brigade (Centre) in Kosovo (1998-99), and was head of Counter Terrorism at the Ministry of Defense over 9/11. Jonathan Shaw was appointed Director Special Forces in 2003, which saw him operating in and being responsible for policy towards the Islamic world. Through this he developed a strong understanding of Islamic developments, and the dynamics of the region. In January 2007 he became General Officer Commanding Multi-National Division (South East), Iraq, and went on to become Chief of Staff at HQ Land Forces in September that year. Between 2009 and 2012 he was based at the Ministry of Defense in Whitehall as Assistant Chief of Defense Staff. His responsibilities included developing UK policy on cyber security, a role which gave Jonathan a unique global perspective on the risks posed to governments and businesses by cyber-attacks, and strong opinions on how to manage them.

Jonathan is the author of “Britain in a Perilous World: The Strategic Defense and Security Review We Need” (Haus Publishing, 2014).

SCHEDULE OF LAST YEAR'S CONFERENCE

REGISTRATION

08:00 - 08:45 h

OPENING

08:45 - 08:55 h

CYBERSPACE - THE EVOLVING TECHNICAL MEANS TO ENDURING HUMAN GOALS Major General Jonathan Shaw, keynote speaker

08:55 - 09:35 h

Jonathan Shaw intends to talk about the strategic nature of cyberspace, its corporate, military and criminal applications and likely responses, elevating the conversation from the tactical to the strategic. He will speak on its effects on military operations in Estonia, Ukraine or Georgia. Its effect on commerce, the potential and weaknesses of the technology underpinning Bitcoin, the political and cultural challenges of the deep web incl the dark web. Leading to recommendations how should companies structure to cope with the threat and opportunities, what type of leadership style is required to cope. There is no such thing as cyber security, most of this is about managing human behaviors, for which technology just provides an ever developing opportunity to express enduring human motives, both good and bad.

Slideshow - Jonathan Shaw, key speaker (pdf, 74 KiB)

EVOLUTION OF ZERO-DAY THREATS TOWARDS CRYPTOGRAPHIC ATTACKS Peter Kovalčík, Check Point Software Technologies

09:40 - 10:10 h

Ransomware today presents a major threat affecting customers and end-users worldwide. Data has a huge value for everyone, for which we are willing to pay and the attackers know it very well. You will get information on how Ransomware attacks are performed, how they circumvent existing data security and which trend can be expected from Ransomware in the future. Is Anti-Virus an effective technology protection? You will learn what are the strategies of defense, the latest and most advanced technologies for preventing Ransomware, including the practical experience of implementing new technologies.

Slideshow - Peter Kovalčík, Check Point (pdf, 6 MiB)

STOP BEING REACTIVE WITH NETWORK SECURITY Ondřej Šťáhlavský, Fortinet

10:15 - 10:45 h

Dealing with ongoing security issues is like driving from Lisbon to Vladivostok without a map or GPS. You can probably get from one to the other, eventually, but wouldn't it be better to know where you're going before you even start? It’s the same with network security, dealing with the problems of the past while trying to counter the issues of today. Without a clear vision and the capabilities to execute that vision, a lot of time and money will be spent without achieving your goals. This session will focus on how Fortinet provides a clear vision of how to bridge the gap between yesterday and tomorrow whatever the challenge.

Slideshow - Ondřej Šťáhlavský, Fortinet (pdf, 4 MiB)

Cofee Break

10:45 - 11:05 h

WHY SHOULD YOU CARE ABOUT THE GENERAL DATA PROTECTION REGULATION? Branislav Makyta, HPE

11:05 - 11:35 h

Europe's General Data Protection Regulation (GDPR) takes effect in 2018. The GDPR includes provisions for data retention as well as privacy. A business will also have to have an in-house data protection officer. Businesses that fail to meet these requirements could be fined as much as 20 million Euros, or 4 percent of their global turnover. New data protection laws are making it difficult to do business around the world. Can your enterprise keep up?

Slideshow - Branislav Makyta, HPE (pdf, 1 MiB)

RANSOMWARE: EVOLUTION, COUNTERMEASURES, EXPECTATIONS Peter Stančík, Eset

11:40 - 12:10 h

Requiring a ransom for the return of access to data, or other assets. A widespread threat “authenticated” through the years has remained essentially unchanged, but has undergone considerable development in the attempt of cybercriminals to maximize their profits. Even though there is a relatively efficient way of minimizing the impact of ransomware, prevention requires a comprehensive approach and in case of its failure, the victim often finds themselves almost stymied. Therefore, it is important to have an overview of the current status of the “ransomware scene” on possible solutions and to reflect on possible developments. All this from the perspective of ESET experts.

Slideshow - Peter Stančík, ESET (pdf, 6 MiB)

ADVANCED MALWARE AND PROTECTION - WHAT IS CISO SUPPOSED TO KNOW FOR THE YEAR 2017 Karel Šimek and Michal Svoboda, Cisco

12:15 - 12:45 h

Preventive technologies are nowadays not enough for malware protection and it needs to be dealt with situations where the attacker is already inside the network. In this way, according to experts, 2/3 of a security organization’s budget should be directed to it.
In this paper, therefore, we will look at the current trends of advanced malware and at the application of methods such as sandboxing, NBA, UBA, serving to detect threats in your network. Next, we will discuss how to set a proper balance between these advanced methods and traditional approaches such as IPS and AV based on signatures.

Slideshow - Karel Šimek a Michal Svoboda, Cisco (pdf, 2 MiB)

WICKED GAMES IN A BROWSER AND WHY SSL EVERYWHERE Ľuboš Klokner, F5

12:50 - 13:20 h

Can you really trust your browser? Do you know what are the JavaScript capabilities? Does your web application use all current protections to avoid injections, XSS, SSL attacks? Come to F5 presentation to learn why is Web Application Security and SSL everywhere so important.

Slideshow - Luboš Klokner, F5 (pdf, 8 MiB)

LUNCH

13:20 - 14:15 h

SPEAKERS OF LAST YEAR'S CONFERENCE

Jonathan Shaw

Peter Stančík

Karel Šimek

Michal Svoboda

Peter Kovalčík

Branislav Makyta

Ľuboš Klokner

Ondřej Šťáhlavský

Jonathan Shaw

Expert on cyber security and global conflict, Director of UK Special Forces ,Commander of British forces in Iraq.

Major-General Jonathan Shaw is a global authority on the impact of developments in cyberspace and how to respond. He commanded the Multi-National Brigade (Centre) in Kosovo (1998-99), and was head of Counter Terrorism at the Ministry of Defense over 9/11. Jonathan Shaw was appointed Director Special Forces in 2003, which saw him operating in and being responsible for policy towards the Islamic world. Through this he developed a strong understanding of Islamic developments, and the dynamics of the region. In January 2007 he became General Officer Commanding Multi-National Division (South East), Iraq, and went on to become Chief of Staff at HQ Land Forces in September that year. Between 2009 and 2012 he was based at the Ministry of Defense in Whitehall as Assistant Chief of Defense Staff. His responsibilities included developing UK policy on cyber security, a role which gave Jonathan a unique global perspective on the risks posed to governments and businesses by cyber-attacks, and strong opinions on how to manage them.

Jonathan is the author of “Britain in a Perilous World: The Strategic Defense and Security Review We Need” (Haus Publishing, 2014).

Peter Stančík

Security Evangelist, Malware Research Team, ESET s.r.o.

Peter Stančík has been a part of ESET since 2010, working as a Security Evangelist. He graduated from the Technical University in Brno with a specialization in telecommunications, in which he also devoted himself to research in the field of cryptology. In ESET, he is involved in processes related to the education of the public and experts in the sphere of security threats.

Karel Šimek

Technical Marketing Engineer, CISCO Česká republika

Karel Šimek works in technical marketing. His main task is thought leadership, sales enablement and technical advising in advanced security. The advanced security includes AMP, ThreatGrid, Cognitive Threat Analytics and OpenDNS from a Cisco’s portfolio and their application in Cisco’s core technologies. You can meet him at RSA, BlackHat, Defcon, Cisco Live, Cybersecurity conferences and others. In Prague, he works in a research and development center, which was created after the acquisition of Cognitive Security in 2012.

Michal Svoboda

Technical Lead, CISCO Česká republika

Michal is a technical expert in the field of data analysis. He works for the Cognitive Threat Analytics group that is a part of the Security and Business Group under Cisco Systems.
Our mission is to work with the record of the network traffic of our customers and build self-learning solutions that reveal active safety penetrations. These solutions do not invoke recognition methods using the signatures nor the methods of checking the content of network traffic.
Michal’s role covers data analytics, programming, but also the management and improvement of methodologies and tools used by the team.

Peter Kovalčík

SE Manager, Check Point Software Technologies

Peter Kovalčík works as SE Manager at Check Point Software Technologies, in which he covers important security projects, primarily in the verticals of Enterprise, Government and Finance. Peter is responsible for the technical team of consultants within the CZR region (Czech Republic, Slovakia, Hungary and the Adriatic). He has been professionally in the field of information technology for 10 years. Previously, he worked as a Check Point Security Engineer, where he worked on international security projects for big customers within the region. Peter is a graduate of the Czech Technical University in Prague (ČVUT), the Department of Technical Cybernetics. One of Peter’s favorite quotes is: “Choose a job you love and you will never have to work a day in your life.” Confucius.

Branislav Makyta

Channel Manager, HPE Software, CEE

 

Ľuboš Klokner

Field System Engineer pre strednú a východnú Európu, F5

Luboš Klokner currently works in company F5 Networks in a position of a Field System Engineer for Central and East Europe. Formerly he used to work as a Team Lead in a team of network security specialists for a leading system integrator. He has been dealing with and working in the field of pc security on a long-term basis. Lately, he has been interested and has been applying his experience in the area of security and availability of applications and services in enterprise environment, ISP, data centres and e-cloud.

Ondřej Šťáhlavský

Regional Director CEE ve společnosti Fortinet

 

Partners