pl / en

pl / en


Registration & Coffee break



Damian Kwiek,

IDC Keynote Presentation: A Multi-Faceted Approach to Information Security

Wiktor Markiewicz,
Senior Research Analyst, Poland and Baltics, IDC Poland

By addressing the endpoint defense, data-centric approach security and identity as perimeter, you can significantly improve the security of your organization while transitioning processes to 3rd Platform architectures. Mobility and cloud do not have to be security problem multipliers. Data and analytics can uncover Opportunity. Employees can be productive and secure, not a headache.


IoT, Cloud, AI … where are the data?

Antonio Ieranò,
Security Manager, Cyber Security and Data Privacy architect and advisor

Digital transformation does not mean to introduce new technology upon a business or social tissue but to change the way we do and manage our business and our life. This has direct security, privacy implication and also ethical consideration should be considered. The very first point in this trip is to understand what data are, how they flow, how can be used and what is needed to protect them.


Identity-Centric Security for the Modern Cloud Era

Subbu Iyer,
Senior Director, Product Management, Identity Cloud Services, Oracle USA, HQ

IT professionals say their top concerns for adopting cloud are related to security: security of the cloud platform itself, the ability to secure applications deployed in the cloud, and complying with data privacy laws. As organizations transition from on premises to the cloud, they are additionally challenged with maintaining a consistent security posture and transform their Security Operational Center. Oracle aligns people, process, and technology to provide integrated defense in depth at every layer of the computing stack, including SaaS, PaaS and IaaS and provide modern Cloud Security Services in order to protect users and applications and drive digital transformations more securely and quickly.


Access 4.0: Requirements and solutions for modern and highly secure connectivity

Joachim Gietl,
Head of Sales Central and Eastern Europe, HOB GmbH & Co. KG

Security Market Challenges - How to make 30 minutes out of 200 days?

Leszek Tasiemski,
Vice President, Rapid Detection Center, R&D Radar & RDS, F-Secure

F-Secure’s The State of Cyber Security 2017 Report tells that on average time between being breached by cybercriminals and getting knowledge of it by organizations is 200 days. That’s a lot. Is there a chance to reduce that time to just 30 minutes?


Coffee break


Do your employees securely exchange confidential data?

Dawid Kościelny,
Specjalista w dziedzinie bezpieczeństwa komputerowego, Integrity Partners


The most significant risk for many organizations is the uncontrolled exchange of sensitive information by employees and contractors. The additional problem is the need to ensure mobility and constant access to up to date company documents. We will present you a data sharing platform allowing highest level of security for existing sharing methods, in particular: Microsoft Office 365, Microsoft SharePoint, SharePoint Online, Google Drive for Work, Drop Box



Insider Threats - Are users the weakest security link?

Ziemowit Buczyński,
Architekt rozwiązań, Micro Focus

Many organizations recognize and implement processes to counter insider threat, including least-privilege-access policies, separation of duties, and passwords. However, many notable security breaches of large organizations occurred because of abuse of insider privileges. Whether its malicious employees or attackers who hijack employee credentials, insider threat presents significant risk. To mitigate this risk, organizations need to do more than rely on automated policies and processes. During our session you will learn how to proactively manage security and identity risk in a centralized, structured way, and why we need a risk-based approach if we want to provide appropriate governing access to critical systems and data.

You will also learn how to avoid the common mistakes:

- Over-reliance on IT.  Assume IT is responsible for knowing an employees lifecycle.

- Being reactive  vs. proactive.  Compliance  efforts focus non-compliance and correcting  after the fact.

- Lack of context.  Missing approval history and risk scoring makes it hard to focus on the high-risk areas.

- Systems that are in silos. Limited visibility/control in silo IAM tools can lead to risk gaps.


Importance of Incidence Response: plan, exercises, communication

Adam Marczyński,
Dyrektor Departamentu Departament Bezpieczeństwa, Biuro Informacji Kredytowej

The Enterprise Immune System: Self-learning Cyber Defence through machine-learning

Mateusz Flak,
Cyber Security Manager EMEA, Darktrace

In this session, learn:

·         How new machine learning and mathematics are automating advanced cyber defense

·         Why 100% network visibility allows you to detect threats as they happen, or before they happen

·         How smart prioritization and visualization of threats allows for better resource allocation and lower risk

·         Real-world examples of unknown threats detected by ‘immune system’ technology



Panel Discussion: A new IT Security philosophy – what it means for your business

New technologies are compelling for businesses but place extra demands on security operations by eroding traditional security approaches. Therefore new philosophy is required, focusing on how enterprises can be more proactive in addressing security. Business should focus on facilitating a shift in security mindset deserving the full engagement of senior level executives.

Wiktor Markiewicz,
Senior Research Analyst, Poland and Baltics, IDC Poland
Radoslaw Stepien,
Business Development Manager, IDC Poland
Leszek Tasiemski,
Vice President, Rapid Detection Center, R&D Radar & RDS, F-Secure
Grzegorz Czaplińśki,
Presales Engineer, Integrity Partners
Krzysztof Grabczak,
Security Specialist, Oracle



Panel Discussion - Reality Check Overview. EU Cyber Security.

Edyta Kosowska,
Program Manager, Software, Poland
Xawery Konarski,
Lawyer, Partner, Traple Konarski Podrecki Wspólnicy
Usamah Afifi,
Partner, DE Consulting
Jacek Bajorek,
Pełnomocnik Zarządu ds. Ochrony Danych Osobowych, Operator Gazociągów Przesyłowych GAZ-SYSTEM S.A.
Krzysztof Grabczak,
Security Specialist, Oracle
Rafał Szulejewski,
Kierownik ds. Bezpieczeństwa Informacji, Departament Bezpieczeństwa Informacji i Systemów Informatycznych, Raiffeisen Polbank

Doświadczenia firmy z projektu usługi centralnego uwierzytelniania na podstawie wdrożenia platformy serwerów katalogowych SDA (Service Data Architecture)

Sławomir Polański,
Główny Specjalista Rozwoju Sieci i Usług, Orange

Why is it worth to get hacked? An organization in hacker's eyes

During our speach we will be talking about benefits of planned APT attacks on organization. We will show how a standard organization looks like in hacker's eyes, what kind of techniques he is using, on what is he focusing on, and how such an attack looks like step by step. On that base we will point a key moments in such an attack on both hackers side and defensive side.

Karol Celiński,
Prezes Zarządu, Architekt bezpieczeństwa IT, Immunity Systems
Andrzej Nowodworski,
Współwłaściciel, Architekt bezpieczeństwa IT, Immunity Systems

End of the conference


magdalena brandt

senior conference manager

+48 22 548 40 74


marcin kniec

senior account manager

+48 883 342 879