The New Rules of Security

The world is changing and so is the way you keep it secure. As your business innovates, your security needs to be more integrated, collaborative and unified. It's not just about buying more tools.

As security leaders face extreme complexity, we think it's time to challenge conventional thinking and turn the old rules of security upside down: What if being hacked could be turned into an advantage? Or if failure becomes a goal? Or if you could guard less to secure more?

As a special highlight, our brand new X-Force Command Cyber ​​Tactical Operations Center (C-TOC) will be in town. The C-TOC is an unprecedented training, simulation and safety center on wheels - integrated into an impressive black 23-tonne truck. This truly unique experience will be exclusively accessible to you in Warsaw.

Join us on June 10th to hear cybersecurity leaders share insights from their recent experiences in a fully immersive cyber range, understand how AI is helping to fight attacks, and learn how you can challenge conventional thinking.

Key Takeaways

audience at a presentation

Learn how to prepare your organisation for a “boom” moment and how to embrace resiliency as a practice.

the x-force truck

Experience IBM X-Force Command Cyber Tactical Operations Center (C-TOC), a fully operational Security Operations Center on wheels,
housed in a truck trailer, coming to Warsaw.

a crowd amidst networking

Network with peers and experts in the security industry to learn what works, and what doesn't.

Agenda

09:00 – 10:00     Registration and welcome coffee

Watch Live Streaming of Keynote Session

10:00 – 10:15     Opening speech 
Wolfgang Wendt, General manager, IBM CEE and Dusan Milidrag, Security BU Executive, IBM CEE

10:15 – 11:00     The New Rules of Security
– Kevin Skapinetz, VP of Strategy and Design, IBM Security

11:00 – 11:30     Better then Mr Robot
– Charles Henderson, Global Managing Partner and Head of X-Force Red

11:30 – 12:00      C-TOC – the first security operations center on wheels
– Erno Doorenspleet, Global Executive Security Advisor, X-Force Command

12:00 – 13:30     Lunch and EXPO zone

13:30 – 15:45      Breakout session 1: Threat Management

Watch Live Streaming of Threat Management Breakout Session

  • IBM Security Connect: Evolve Your Security with an Open, Simple and Connected Platform 
    -James Murphy, Offering Manager, IBM Security Connect, IBM EU
  • Micro attacks patterns, threat hunting – how to address via Security Operations Center
    – Kirti Kumar, Associate Partner – Europe SIOC COC Lead
  • Client panel: Don’t do it alone. Build, manage, and monitor cybersecurity with partner
    – Daniel Donhefner, CEE Security Services Executive, 
    IBM CEE &  clients
  • Augmented Intelligence Vs human
    – Andrea Carmignani, Associate Partner – Managed Security Services – Europe
  • BP Speaking slot / Asseco IBM QRadar SIEM implementation in the Eurofins Group
    Andrea Carmignani, Associate Partner – Managed Security Services – Europe

Breakout session 2: Digital Trust

Watch Live Streaming of Digital Trust Breakout Session

  • Quantum Safe Cryptography
    – Piotr Biskupski, I2 Technical Specialist, IBM CEE
  • Analyzing the Attack Surface: Most Relevant Threats
    – Domenico Raguseo,  CTO, IBM CEE
  • “I trust you protect my interest” – how customer expectations are protected by proper application of Digital Trust concept
    – Jacek Skorupka, IT Security Director, Idea ban

     
  • IBM Security for Hybrid Multicloud – Privacy and security in Hybrid cloud. Threat Hunting in hybrid world
    – Katarzyna Szymielewicz
  • IBM Security for Hybrid Multicloud
    – Tomasz Zalewski, IT Security specialist, IBM Poland
  • Privacy and security in Hybrid cloud. Threat Hunting in hybrid world
    – Marcin Spychała, Senior Security Architect & client, IBM CEE
  • BP presentation / Cloudware: New approach to database activity monitoring
    – Wojciech Fritz, IT Security Architect 

     

15:45 – 16:00     Coffee break

Watch Live Streaming of Closing Session

16:00 – 16:45     Security and Survival in a Hyper-connected World
– Bruce Schneier CTO IBM Resilient & Special Advisor

16:45 – 17:00     Closing remarks

17:00 – 20:00    Networking reception at Panorama Sky Bar of Marriott hotel & Bruce Scheneier books signing & **C-TOC Client Open door sessions
                           **Clients will be able to sign up for C-TOC session on site of the event.

 

 

 

Deep Dive Tech Zone Cafe

Opportunity to hear and see from IBM technology in action, brought to you by IBM Experts

How detect and react to security incidents

Andrzej Wojtkowiak, CEE Technical Sales Professional
Timing: 12.50-13.30

Abstract: This is mostly demo session during which will be presenting different security incidents. Demo focus on presentation how we can detect and correlate information that has been identified during attack and how we should proceed to resolve incident through it whole life-cycle. Demo is concentrated on IBM QRadar SIEM and IBM Resilient Incident Response Platform.
 

Mobile platform for Multi Factor Authentication and Transaction Authorization in PSD2 environment

Tibor Bosze, CEE Lead Security Architect
Timing: 14.30-15.10

Abstract :This session is based on a recent real-life project and takes you through the design decisions and main features of a modern multi-channel e-banking authentication and authorization solution, as mandated by trending business needs, recognised security standards and harmonised with PSD2 requirements. It demonstrates how a flexible and extensible software platform can provide a solid foundation for pioneering new frontiers in technology and innovation.

Data Protection in the era of GDPR

Zbigniew Szmigiero, CEE Technical Sales  Professional
Timing: 13.40-14.20

Abstract: presentation reviews the common GDPR use cases, and the related IBM Security technology coverage, and shows a real data protection scenario/ demo.  

Advanced Investigations in Security Operation Center

Zsolt Kocsis, CEE Technical Executive
Timing: 15.20-16.00

Abstract: The presentation gives an overview of investigation methodologies, its application as Integrated Threat Intelligence, Investigation and  Response platform to understand the goal and motivations of the attackers. It shows a demo about a real attack scenario and related investigation to understand the rebuild the attack history.
 

Warsaw Marriott Hotel

Address
al. Jerozolimskie 65/79
Warsaw 00-697 Poland

Business Partners

Gold Sponsors

Silver sponsors

Software trials