Program of CIO Agenda 2025

4. 3. 2025 O2 Universum, Prague

Tuesday - 4 / 3 / 2025

08:00-09:00

Registration, breakfast, networking

09:00-10:45

Part A

Moderation:
Daniel Stach , Science Popularizer and Moderator, Česká televize
We have access to your company and we don't want anything in return... yet
Daniel Hejda
Daniel Hejda Ethical Hacker, Cyber Rangers
09:00-10:45

We have access to your company and we don't want anything in return... yet

What will it be about?

In this session we will talk about why attackers don't need to use brute force attacks and why bring your own device (BYOD) can be a real problem. You will learn where attackers gain access to organisations and why it is really easy for them to breach your perimeter. We will show you selected stores with credentials and you will learn how devices can be  infected, how attackers gain access and much more. 

Daniel Hejda

Daniel Hejda

Ethical Hacker, Cyber Rangers
NDR! Not a Paradise for Trabants, but Network Detection & Response 😊
Michal Trtil
Michal Trtil Head of Security and Network Operations Center, ANECT
Ondřej Hubálek
Ondřej Hubálek Network Security Presales Engineer, GreyCortex
09:00-10:45

NDR! Not a Paradise for Trabants, but Network Detection & Response 😊

What will it be about?

Do you know what's happening on your network? Who are your users talking to, what applications are running and what devices are connected? And do you have a recovery network in place? Visualising network communications isn't a rocket science when you use the latest detection platform powered by artificial intelligence and machine learning. Using real examples, we'll show you how NDR can help resolve a variety of incidents and uncover vulnerabilities that traditional tools can't. 

Michal Trtil

Michal Trtil

Head of Security and Network Operations Center, ANECT
Ondřej Hubálek

Ondřej Hubálek

Network Security Presales Engineer, GreyCortex
Resistance as a Service
Václav Zubr
Václav Zubr Pre-Sales Engineer, Eset
09:00-10:45

Resistance as a Service

What will it be about?

Modern cyberattacks are becoming increasingly sophisticated. Cybersecurity budgets are limited, and on the top of it  there’s a shortage of qualified specialists. If you’re facing these challenges, to outsource the security specialists could be the solution. This presentation will showcase a real attack on an ESET client and demonstrate how a combination of cutting-edge security technologies and experienced specialists ensures uncompromising protection, including the defense against ransomware.

Václav Zubr

Václav Zubr

Pre-Sales Engineer, Eset
Harnessing quantum security
Radek Šichtanc
Radek Šichtanc Security Director, O2
09:00-10:45

Harnessing quantum security

What will it be about?

With growing cyber security threats, data protection has become a critical priority for organisations worldwide. This presentation focuses on the practical use of quantum key distribution (QKD) to secure data centre connections. The key advantage of quantum security is its ability to detect any attempt to eavesdrop on communications, thanks to the fundamental principles of quantum physics. It offers an unprecedented level of protection for data communications and is a vital investment in securing data against tomorrow's threats.

Radek Šichtanc

Radek Šichtanc

Security Director, O2
10:45-11:15

Coffee and tea break

11:15-13:30

Blok B

Moderation:
Daniel Stach , Science Popularizer and Moderator, Česká televize
Ransomware attacks in the public sector
Peter Čepák
Peter Čepák Security Analyst, Governmental Unit CSIRT SK
Jakub Pažitný
Jakub Pažitný Head of Department, Governmental Unit CSIRT SK
11:15-13:30

Ransomware attacks in the public sector

What will it be about?

An overview of ransomware attacks, including their solutions, prevention strategies, procedures and objectives.

Peter Čepák

Peter Čepák

Security Analyst, Governmental Unit CSIRT SK
Jakub Pažitný

Jakub Pažitný

Head of Department, Governmental Unit CSIRT SK
Backup security as a key strategy in the age of cyber threats
Barbora Zedníčková
Barbora Zedníčková Information Security Specialist, Ixperta
11:15-13:30

Backup security as a key strategy in the age of cyber threats

What will it be about?

Data backups are a cornerstone not only of cybersecurity, but also of ensuring business continuity. In an era of increasing threats such as ransomware, targeted attacks and insider threats, backups can mean the difference between rapid recovery and catastrophic loss. This presentation will focus on current risks, backup best practices (including the 3-2-1 rule), and practical examples of how a well-designed backup strategy can protect businesses. We will also discuss techniques for securing backups against modern attacks and why backup security should be an integral part of every organisation.

Barbora Zedníčková

Barbora Zedníčková

Information Security Specialist, Ixperta
OT Safety: Ensuring industrial security beyond the buzzwords
Renáta Pešinová
Renáta Pešinová ICS Cyber Security Engineer, ABB
11:15-13:30

OT Safety: Ensuring industrial security beyond the buzzwords

What will it be about?

As IT security continues to evolve, becoming more sophisticated and agile, what about OT (Operational Technology) security? It is just as critical and plays a pivotal role in securing the future. In this presentation, we'll take you beyond the factory gates to explore how to protect industrial systems from digital vandals. We'll present practical and applicable security controls and show that even control systems need to be protected. OT security is what really matters!

Renáta Pešinová

Renáta Pešinová

ICS Cyber Security Engineer, ABB
Cybersecurity and legislation
Adam Felix
Adam Felix advokát, AK Felix
11:15-13:30

Cybersecurity and legislation

What will it be about?

What legislative changes can we expect in 2025 and how can we prepare for them? What is in store for the Digital Decade 2030? This presentation will explore the implications of NIS 2 and the Data Act, explaining why there's no need to fear new regulations and how to navigate them calmly and effectively.

Adam Felix

Adam Felix

advokát, AK Felix
Cybersecurity regulations in practice
Viktor Nagy
Viktor Nagy Lead Compliance Consultant, Xeek
Jakub Žalio
Jakub Žalio CTO, CreditInfo Group
11:15-13:30

Cybersecurity regulations in practice

What will it be about?

Using a replicable case study from Creditinfo, this presentation offers insights from both a CTO and consultant perspective. You'll learn how to translate "legalese" into business terms and understand how this process influences business decisions and long-term strategy. Gain practical tips and proven experience that you can apply immediately in your own organisation.

Viktor Nagy

Viktor Nagy

Lead Compliance Consultant, Xeek
Jakub Žalio

Jakub Žalio

CTO, CreditInfo Group
13:30-14:30

Work lunch

14:30-16:00

Blok C:Panel discussion

Moderation:
Daniel Stach , Science Popularizer and Moderator, Česká televize
"Wake up and do something finally!“
Panelists:
14:30-16:00

"Wake up and do something finally!“

What will it be about?

Cyberattacks today? Not sci-fi, but an everyday nuisance. Hackers no longer crawl through air ducts with laser-eyed precision – all they need is a phone call or a few emails, and you might willingly hand over the keys to your company’s vault. 

Phishing, ransomware, fake invoices, spoofed voices, forged signatures, and forged everything. While you believe you have it all under control, attackers know they can exploit a gap – whether in your technology or in your people. There are always people who click where they shouldn’t or answer a call they shouldn’t. 

So, what can you do about it? 
Don’t expect it "just sorts itself out." In this discussion, we’ll uncover the most common tricks attackers use and explain why your company might be a bigger target than you think. We’ll not only discuss preventative measures but also explain  what to do when an attack happens, and you’re facing a full-blown crisis. 

There are two certainties in life: taxes and cyberattacks. We can’t help you with the former, but we’ll try with the latter. 

16:00-17:30

Cocktail