Qubit Conference Prague 2021
Is security transformation part of your digital transformation plan?
September 8-9, 2021
Day 1 - September 8
Conference Opening & Opening Keynote:
Conference Opening – Maria Krahulecova & Ondrej Krehel
Rik Ferguson: The New Digital Normal – Agile, Continuous, Contextual
Keynotes:
Mateusz Olszewski: How good is the fuel powering your SOC
Vijay Chauhan: Learning Session: Network Security as-a-service
Case Study & Lightning Talks
Zuzana Duracinska: Do’s and Don’t’s managing penetration testing with clients
Lightning talks
Breakout Sessions:
František Nonnemann: Outsourced personal data breach management and the Twitter case
Daniel Chromek: DIY risk management
Panel Discussion & Breakout Session:
Panel discussion: #1 business priority: Cybersecurity
Dave Lewis: I Was Promised A Jetpack
Breakout Sessions:
Michal Merta: What the hack?
Tarmo Kellomäki: Challenges of Space Security
Closing Keynote:
Howard Williamson: “Mind the Gap” or Common Incident Response Challenges
Technical Track
Breakout Sessions:
Petr Hnevkovski: Red Team attacks, GDPR fines and COVID lay-offs?
Roman Cupka: What is going on in the network before ransomware occures?
Breakout Sessions:
Tomas Zatko: Your New Hire Turned to be a Hacker
Sarit Yerushalmi & Ofir Shaty: The resident evil inside your database
Breakout Sessions:
Roman Zhukov: How to build Secure Development Lifecycle if you don’t have a budget like Google’s
Peter Kosinar: Leaving no stone unturned
Day 2 - September 9
Keynote & Breakout Session:
Eddie Doyle: Cyber Chains are Forever
Shyam Sundar Ramaswami: The Postman Always Rings Twice
Breakout Sessions:
Tino Sokic: Which legacy is good legacy?
Alex Holden: Ransom-wave Aware
Breakout Sessions:
Jan Barta: US Services and GDPR – Compliance Nightmare
Jan Rynes: DNS – core service and attackers
Breakout Sessions & Panel Discussion:
Mani Keerthi Nagothu: Decoding Cyber – Supply Chain Risk Management through NIST
Panel Discussion: Zero trust “beyond the buzzword”
Breakout Sessions & Closing Keynote:
Ronald Woerner: Implementing NIST Cybersecurity and Risk Frameworks
Etay Maor: Stop predicting the past: how to identify unknown threats