Preparation of the programme is overseen by the Programme Council, which includes representatives from
ISACA, ISSA, the editorial board of Computerworld. We present sample topics in the programme:
Information security management
Managing change in on-premise, cloud and hybrid environments
Cloud Security
Business resilience
Business continuity, Backup, and Disaster Recovery
Asset management
Consolidation of solution and security providers
Big security projects and how to manage them/li>
Zero trust – technology, methodology, or a mindset? Mesh VPN, and Secure Access
Service Edge solutions
Prevention of Insider Threats
Securing remote employees
Protecting mobile devices
How to manage cybersecurity in social networks
Regulatory changes in NIS2/KSC/DORA
Digital Services Act and Digital Markets Act – what the new legal changes will bring
Managing digital identity
Cybersecurity awareness in and out of work
IT Audit
Audit of new frameworks of risk management (e.g. DORA)
Audit of cloud and hybrid solutions
Audit of cybersecurity, business continuity
Audit – different aspects versus layers of architectural model – organization, people, processes, technologies – how to obtain evidence and combine data with results
Audit of cryptographic solutions
Audit of KSC from the regulator’s point of view
Audit of OSC / DevOps / Develop / RedTeam-BlueTeam efficiency
Audit of OSC / DevOps / Develop / RedTeam-BlueTeam efficiency
Audits in new sectors (autonomous systems, blockchain, Fintech, etc.)
Cybersecurity, Hacking, and Forensicc
Threat intelligence
Threat Hunting
Securing evidence of cybercrimes
Phishing automation – using bots, machines, etc.
How to keep up with the volatility of cyberattacks – interesting cases
Opensource Intelligence and presentation of its tools
Securing distributed data – how to deal with a new model of its processing
Cyberattacks – a case study of a penetration tester
End-to-end encryption – challenges and risks
Multifactor authentication
Hardware backdoors – how to detect and manage risk
Ensuring security in the CI/CD process
New trends in cybersecurity
The role of human factor in IT security
Darknet as a cybercrime underworld
Autonomous devices and their security
Supply chain security
Technologies and Innovations
AI – dynamic growth of adaptation in cybersecurity aspect
Toolbox 5G
Dark side of automation with the use of machine learning
Deepfake – how cybercriminals can use it
Automation of cloud services (security and threats response services)
Encrypting – innovations, which can change the algorithms currently in use
Autonomous business – companies managed by machines – security aspects
Neuromorphic computing, DNA storage, quantum computing
Technological biohacking – how technologies of the future will influence our lives and security