Topics of the conference

Preparation of the programme is overseen by the Programme Council, which includes representatives from ISACA, ISSA, the editorial board of Computerworld. We present sample topics in the programme:

Information security management

  • Managing change in on-premise, cloud and hybrid environments
  • Cloud Security
  • Business resilience
  • Business continuity, Backup, and Disaster Recovery
  • Asset management
  • Consolidation of solution and security providers
  • Big security projects and how to manage them/li>
  • Zero trust – technology, methodology, or a mindset? Mesh VPN, and Secure Access
  • Service Edge solutions
  • Prevention of Insider Threats
  • Securing remote employees
  • Protecting mobile devices
  • How to manage cybersecurity in social networks
  • Regulatory changes in NIS2/KSC/DORA
  • Digital Services Act and Digital Markets Act – what the new legal changes will bring
  • Managing digital identity
  • Cybersecurity awareness in and out of work

IT Audit

  • Audit of new frameworks of risk management (e.g. DORA)
  • Audit of cloud and hybrid solutions
  • Audit of cybersecurity, business continuity
  • Audit – different aspects versus layers of architectural model – organization, people, processes, technologies – how to obtain evidence and combine data with results
  • Audit of cryptographic solutions
  • Audit of KSC from the regulator’s point of view
  • Audit of OSC / DevOps / Develop / RedTeam-BlueTeam efficiency
  • Audit of OSC / DevOps / Develop / RedTeam-BlueTeam efficiency
  • Audits in new sectors (autonomous systems, blockchain, Fintech, etc.)

Cybersecurity, Hacking, and Forensicc

  • Threat intelligence
  • Threat Hunting
  • Securing evidence of cybercrimes
  • Phishing automation – using bots, machines, etc.
  • How to keep up with the volatility of cyberattacks – interesting cases
  • Opensource Intelligence and presentation of its tools
  • Securing distributed data – how to deal with a new model of its processing
  • Cyberattacks – a case study of a penetration tester
  • End-to-end encryption – challenges and risks
  • Multifactor authentication
  • Hardware backdoors – how to detect and manage risk
  • Ensuring security in the CI/CD process
  • New trends in cybersecurity
  • The role of human factor in IT security
  • Darknet as a cybercrime underworld
  • Autonomous devices and their security
  • Supply chain security

Technologies and Innovations

  • AI – dynamic growth of adaptation in cybersecurity aspect
  • Toolbox 5G
  • Dark side of automation with the use of machine learning
  • Deepfake – how cybercriminals can use it
  • Automation of cloud services (security and threats response services)
  • Encrypting – innovations, which can change the algorithms currently in use
  • Autonomous business – companies managed by machines – security aspects
  • Neuromorphic computing, DNA storage, quantum computing
  • Technological biohacking – how technologies of the future will influence our lives and security