We have selected the most common steps that an attacker will perform in your organization before encrypting your entire environment. This will help you discover how to detect them before it's too late.
Presentation of the current threats in the area of fraudulent activities in cyberspace, considering the investigation of this type of crime. What is the expected development, prevention, and other possible solutions from the perspective of the Police of the Czech Republic.
AI is a tool and it depends on its user whether it will be used for doing good or evil. Through examples, I will demonstrate how far criminals have gone in adopting it. For effective defense, it is necessary to know the tactics and possibilities of the enemy.
We will focus on the issue of DDoS attacks, which represent a serious threat to companies and organizations of all sizes and sectors. We will show how DDoS attacks are evolving and increasing in intensity and sophistication, and what their impacts are on our business and customers. We will present our experience and solutions for detecting and mitigating DDoS attacks with the aim of supporting the discussion on how to face and prevent these attacks in the future.
Since the emergence of the RaaS (Ransomware-as-a-Service) model, the world of ransomware has changed dynamically. The fact that one ransomware can be spread by hundreds of different gangs makes it difficult to keep up. In the lecture, we will share years of experience in investigating attacks and researching in the field of ransomware. We will show how modern attacks proceed, how attackers access their targets, and that security can be simpler than you think.
A raw and unvarnished description of our company's nightmare – a cyber attack that forced us to shut down all IT systems for a grueling three months. It's not just a story; it's a testimony of resilience and learning during our battle to emerge stronger (more resilient).
The development and operation of modern applications in containers, in the cloud environment 'at home' on-premise, or anywhere in public clouds, brings new types of cyber risks and new approaches to their resolution. What is the spectrum of threats, from the application development phase to its operation?
Xeek, a leader in managed security services, presents a case study on its successful partnership with P3Parks. Emphasizing the innovative role of virtual CISOs (vCISOs), it demonstrates P3Parks' journey in utilizing managed security services, highlighting the obstacles encountered and their solutions.
Are you really safe? We will demonstrate how systems like M-Files can raise the quality of your security to a higher level. We will focus on two areas: information security management (ISMS) and corporate content management. Through the example of a security incident, you will see how to proactively manage processes associated with information security within an organization and comply with guidelines such as ISO/IEC 27001/27002. Let's make it more complicated for potential attackers!
We will introduce RICOH RansomCare - a solution to prevent the spread of ransomware, which serves as the last line of defense against cyber attacks, supplementing an organization's existing security solutions. Within seconds of the initiation of illegal file encryption, it triggers an alarm, isolates the affected devices, and denies user access to the network or cloud. This stops ransomware at its inception and prevents disruption of the entire network.
From today's perspective, the unsolicited training of the IT team and the entire company for 2.4 BTC really paid off. It showed us where we had weaknesses in security measures and what to focus on more in the future in terms of IT security.
In the panel discussion, leading cybersecurity experts will focus on several key topics. The main discussion point will be the role of artificial intelligence in cyber security and the question whether AI can become a key tool in the fight against cyber threats. We will take a look at our suppliers' security measures and how they affect the protection of our business. We will discuss whether it is safe to buy anything as a service. And finally, we'll talk about NIS2 and how it will change the way we look at security.
Jan Marek, ethical hacker, Cyber Rangers
Daniel Hejda, ethical hacker, Cyber Rangers
Jiří Sedlák, Manager of the Security Monitoring Center, O2
Adam Škarka, lawyer
Reflection of the conference day in good company and with something tasty to eat and drink.