During this track, international experts will share practical insights on how to protect internet-connected systems, networks and your business data.
powered by ING Bank Romania
See the stageThe agenda is built around the concept of “effective cybersecurity” with a focus on how to minimize the risk of cyberattacks and how to protect your business and your customers from the unauthorized exploitation of systems, networks and technologies.
Here's what we'll be exploring on the Security Stage
During this track, international experts will share practical insights on how to protect internet-connected systems, networks and your business data.
The top three cybersecurity fears are related to human factors and employee behavior. You’ll find how to combat employee or human error to impact your company’s security.
Data Privacy is essential for your employees, your customers, and ultimately your business. Learn how to keep the data secured and how to mitigate the risk of losing it.
The exploitation of systems vulnerabilities that are responsible for cyberattacks can be avoided. The tools to predict attacks are known and our speakers will focus on them during this track.
Get knowledge from the brightest digital minds.
Head of Technology
Airbus CyberSecurity
Assessment Practice Manager
NuTech Logix
CEO
th4ts3cur1ty.company
Founder & CEO
Yoroi
Cyber-secret futurist, founder of ITBN, Executive Producer of SIGHT: Extended
ITBN
CEO
Hakdefnet
Chief Information Security Officer
Yandex
CTO Data Protection
Gemalto
Security Product Manager
Orange Business Services
CISSP, Principal Security Consultant, Chief Architect Cyber Defense EMEA
NTT Security
Head Of Information Security
ING Bank Romania
IT Manager
Kandia Dulce
Director of Fixed Telephony and Mobile Communications Division
Digi | RCS & RDS
Head of Local Market at NTT DATA Romania
NTT DATA Romania
Director, Strategic Sales and Customer Development
IT Smart Systems
Executive Partner, Innovation and Technology Services
IT Smart Systems
Senior Consultant for Mobile Technologies
certSIGN
Head of B2B IM Division
Samsung
Regional A&C Head for SEE and Turkey
Qualys
Cyber Risk & Insurance Consultant
Marsh
To get access on the Security Stage, you need to purchase a Security PRO Pass.
Share this with your collegues.
Steve Rymell joined Airbus (then known as EADS) in 2000, having held many roles within the IT & Security organisations of several well-known UK companies from the Automobile sector to Fast Moving Consumer Goods.
He started at Airbus as IT & Security strategist within the satellites division and was appointed as Chief Information Officer in 2003, at which time he made the move from the UK to Germany.
In Jan 2007, he took a Director post within the UK Foreign and Commonwealth Office (FCO), ensuring cyber defence and security solutions to protect all overseas based parts of the UK government.
He returned to Airbus, and Germany, in April 2011 and made the logical move to the CyberSecurity organisation. Since then Steven has been part of the executive team, shaping the development of the organisation through 8 years of constant growth.
Today, his 38 years of experience are focused on leading our Cyber Technology Strategy, choosing cyber technologies, and developing cyber capabilities for the future.
The session would focus on:
• Context and principles
• A look at the threats
• How to address supply chain security
• A look at personal data sharing
• Attacker approach and the dangers of using standard tools
• A look at the vulnerabilities and approaches for detection of attacks
Key takeaways:
• Security adds value, even without known threats
• The hidden consequences of using industry standard security tools
• Is OT harder to attack than IT
Gregory Pickett CISSP, GCIA, GPEN has a background in intrusion analysis for Fortune 100 companies but now works with NuTech Logix’s Assessment Practice. As a security professional, his primary area of focus and occasional research is networks with an interest in using network traffic to better understand, to better defend, and sometimes to better exploit the systems that live on them.
The network is constantly changing. With each new change, we are promised the answer to all of our problems. First, it was Software Defined Networking (SDN). Now, it is 5G. While there is much to be gained, it is not all sunshine and rainbows. In this session, we will learn what improved for companies who moved to SDN, what risks they introduced in doing so, and what they did about it. We will also take a look at what we expect to gain from 5G and what risks we will need to mitigate as we transition to it.
Takeaways:
Eliza is the CEO and Co-Founder of th4ts3cur1ty.company, who specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers. Eliza is also the Founder and Director of Ladies of London Hacking Society (LLHS). LLHS is one of the largest technical cyber-security groups in Europe, and the only one of its kind in the world.
Eliza originally trained in Digital Forensics at university but fell in love with purple teaming after exploring both penetration testing and incident response. She is an advocate for accessible education, a driver of the women in cyber-security movement, she champions neurodiversity and is an international technical speaker.
All too often containerization is seen as a dev issue. Security professionals don’t have much, if any hands-on contact with docker in particular. By default, containers are pretty insecure and we’re going to walk you through an easy security audit and mitigation implementation.
Takeaways:
Marco has been working with US Government and collaborating closely with the University of California, Davis on new security paradigms. During 2009 he has been working at NIST, Maryland where he improved the Voluntary Voting System Guidelines (VVSG) standard.
He collaborates with different national and international public and private agencies. Marco co-founded Yoroi believing in a human-centric cyber defense approach which took him to build Yoroi Cyber Security Defence Center.
During this session we will go through how machine learning (ML) is helping on cybersecurity. We will provide practical examples on how ML “weaponize” modern cybersecurity solutions and we will check their current limitations by exploring the most common ML Attacks.
The continuously raising up of complexity in the digital era makes cybersecurity harder and harder, we will provide real examples on attack scenarios and how machine learning would help a human analyst to empower detection.
Three Takeaways:
Arthur Keleti, cyber-secret futurist, is widely respected around the world as an expert on cybersecurity, and a visionary in his field. He is the founder of the long-running East-European cybersecurity grand conf-expo ITBN. Arthur is also the President and founder of the Voluntary Cyber Defence Collaboration, and he works for T-Systems Hungary as IT Security Strategist since 1999. He is the author of “The Imperfect Secret” a book on cyber-secrets, and the future of AI-based privacy. He is also an Executive Producer of the movie SIGHT: Extended a stunning, Augmented Reality themed Sci-Fi thriller in the making.
Logic tells us that contradictory propositions cannot both be right. This law has new principles in cyberspace, where true might be false, where what you see is not always what you get and where the person you are talking to could be a group of people or even a robot.
Facebook now tries to guess how much of the news you are reading is not faked, and cybersecurity companies talk about “zero trust” technologies suggesting that even the traffic of an internal network and the identity of its users cannot be trusted anymore, not even a tiny bit.
In this presentation, we will touch the haunting questions of
• how sensitive information put into a context bubble become cyber-secrets,
• why our “digital immune system” does not work, or even exists,
• will there be any sense left for humans to trust in “data land,”
• what role of AI will play in keeping our secrets in cyberspace,
• what the future of the complicated Menage a Troi with humans, privacy, and technology will look like.
Bonus track: a brief introduction to how ITBN.global is planning to change the future of cybersecurity events in CEE
Michael’s company (HakDefNet) currently does Cyber Intelligence research and projects focused on Global Cyber Risks, International Business and Security Leadership and are aimed at making security products, processes, solutions and defense against cyber threats as easy to understand and implement as possible.
Michael is also the author of the chapter “Cyber Security: Future IT-Security Challenges for Tomorrow’s Leaders and Businesses”, with IGI Global elaborating on elevating issues in cyber security and cyber espionage, as well as the challenges that leaders and businesses face in confronting such issues. He also has written for various IT, Channel and Business publications and newspapers internationally. Publishing Trainings and Reports about Cyber Risks.
This talk focus on some of the Bot Types we encounter and how they are used to disrupt various parts of our lives as we buy, do research and interact on social media via the Internet and our modern Cyber Realm. What types of attacks Bots actually do, how they are used and how to stop them using Cyber Risk Intelligence.
Anton has worked in the information security industry since the beginning of the century. He began his career as a penetration tester and ISO 27002 auditor in security consultancy. He later became one of the first certified PCI DSS auditors in Russia. In 2009 Anton stepped away from security consultancy business and joined the Global Information Security team at Barclays Bank, where he was a member of the Security Assessment and Penetration Testing teams.
Anton joined Yandex in 2011 as Chief Security Officer, where he builds and manage Security department. Yandex is one of the largest internet companies in Europe, operating Russia’s most popular search engine and its most visited website. Anton is responsible for developing and leading information security strategy and risk management plans, designing security controls and processes across the company.
Being a practitioner in Information Security for over 15 years, Anton feels there is a certain gap between theory and practice. Quite often CISOs should just stop following common practice and ask themselves why are they doing something this certain way or another. In his talk Anton will cover such things as Information Security strategy, people management and human resources, positioning InfoSec department in organization. With each topic, he will touch on what is commonly wrong with it and how to fix it.
A further look into:
Double awarding-winning globally recognized expert and visionary in the World of Cyber Security, Forbes Tech Council Member, and technology leader with 20 years of experience executing team leadership in designing effective cyber and information security solutions. Jason continues to raise and educate the profile of Information Security risks and was instrumental in the introduction of the role CSO (Chief Security Officer) globally.
Jason has devoted his time to reducing and researching Cyber Risks and in-turn been the visionary in a number of the world-leading cybersecurity services and the founder of the world’s leading Cloud-Based Authentication Platform CRYPTOCard. As a former ethical hacker, Jason has used his knowledge and expertise to create technologies that ensure organizations stay one step ahead of the risks presented by ongoing advances in Cyber threats and risks.
Talented leader and collaborator with the ability and knowledge to start new businesses, maximize resources, execute strategic plans, and build or transform teams to drive innovative Cyber Security product development and delivery. With the professional experience of driving technology performance on a global scale.
Jason continues to published articles and white papers Globally and continually appears on BBC, ITV, CNN, Fox News and CNBC as well as Radio 5, Sky News and BBC World News as an expert advisor on Cyber and Information Security matters and issues. His expertise has been cited in global publications including Time, SC Magazine, InfoSec, Computing and Computer Weekly magazines and in the FT, Guardian, Times and Evening Standard and is recognized as a lead figure within the global information security industry.
Jason has held senior positions within a number of organizations, including Ernst & Young’s Information Security Assurance and Advisory Services practice, CEO of WhiteHat and Cryptocard. Clients have included NHS, Governments, as well as a large number of FTSE 100 organizations, for whom Jason has created and developed entire security frameworks as well as Information Security Assessment Methodologies. In addition, Jason regularly provides advice and guidance to Governments, Law Enforcement and Military agencies on Information Security matters globally.
Digital Disruption is not a new subject but the speed of its adoption is increasing dramatically. In order to develop more efficient ways of interacting with customers and producing new services, businesses will need to build security into their digital strategies because trust will be fundamental to the success of the digital transformation revolution.
As organizations transform, security must be an integral and transparent part of the process. So what does this mean for Information Security Controls. Are we going to see disruption in the Cyber Security world?
Laurentiu Popescu has over 18 years of work experience in the IT&C industry with background in marketing strategy, market research, competitive analysis, business consulting, lead generation and go-to-market services.
In his capacity of Security Product Management Lead at Orange, Laurențiu oversees the product portfolio, contributing to the roadmap development and go-to-market strategy. Prior to joining Orange România, Laurențiu Popescu held positions with Bitdefender as Global Marketing Manager, Research & Insights and Country Manager for IDC România.
Orange Business Services’ strategic direction to become a leader in the “Internet of Enterprises” requires a shift to data-driven processes and deep data analytics capabilities. Data stays at the forefront of the IT/OT (IT with Operational Technology) convergence and therefore leveraging ethical principles to build trust, securing Orange assets and its trusted brand will be the foundation for data business.
Security is a major component of this data journey process and this approach will enable Orange Business Services to move beyond a network-centric approach to a strategy based on what, Orange Group CEO , Mr. Reisinger called “co-innovating ecosystems.” This keynote will focus on the current Orange strengths in the network security space, but also an insight into its journey to become a fully, end-to-end integrated security provider.
Uwe Maurer practices Cyber Security for more than 25 years. He worked in the fields of security operating processes, application and database security, intrusion detection, SIEM and log analysis. Our team in NTT has more than 20 years’ experience in Cyber Defense. Uwe Maurer is responsible for the Cyber Defense architecture in EMEA and still, emphases to work in key customer projects.
Bogdan Costea is Head of Information Security at ING Bank Romania. He previously spent 11 years auditing both business and IT processes, including cybersecurity.
Having extensive knowledge on business and security processes allows Bogdan to identify, assess and drive implementation of security controls without impeding too much business processes.
Bogdan is highly aware of the current need to adopt security as a mindset and to make it the core business of any company, as it is not an IT issue alone. In his current role as Head of Information Security, he is preaching this on every occasion.
A true professional with both business and tech skills and over 15 years of expertise in tracking inventory of hardware and software, negotiating with vendors and suppliers, project management and analyzing the cost for the upgrades and maintenance in technology.
How can we talk about a 100% digital company, if the business processes still involve being tied to a computer desk and working with a spectacular amount of paper documents? Of course, we do have access to an even more spectacular amount of mobile solutions that promise us increased productivity and ease of use. Maybe too many, too scattered and somehow still not enough, taking into account the main aspect that (should) interest us – cybersecurity.
We do witness an era in which, if we want our business to successfully “complete” the digital transformation imperative, we must #gomobile BUT also be secure! Wouldn’t it be great if there was one solution capable of meeting all our “desires” on this subject – 100% digital, mobile, secure, easy, paperless, integrated, customizable etc. ? Yes, it would be sweet!
So, come and discover:
He graduated from the Faculty of Informatics ( Romanian-American University in Bucharest) and holds a Master’s degree in Business Management at the same university. He joined RCS & RDS team 17 years ago.
Within the Digi Group | RCS & RDS, his responsibilities are related to the development and operation of the fixed and mobile telephony networks in Romania, as well as the MVNO (mobile virtual network operator) DIGI networks in Italy and Spain. Cătălin Neagoe coordinates the division that operates, plans and implements the Group’s mobile networks and decides their development, launches of new services and functionalities, following and maintaining the quality parameters.
One of the key moments in Cătălin’s career, but also for the company, was winning the tender for 3G mobile license, in 2006, followed by the commercial launch of the mobile services, in 2007. Other important moments were marked by the launch of the network in Spain, in 2008, and in Italy, in 2010. In 2018, he was appointed Director of the Fixed Telephony and Mobile Communications Division.
Andrei Cepoi is an experienced IT&C professional, with more than 15 years proven expertise in Business and IT&C consultancy, IT&C audit, Enterprise Digital Transformation and Project Management. Throughout the years, Andrei held different sales and management roles, currently being responsible of managing and developing NTT DATA business on Local Market. Andrei Cepoi graduated from the Academy of Economic Studies in Bucharest; he is passionate of IT & C and loves to travel.
At NTT DATA, we walk the talk: our portfolio covers the whole range of digital consulting services as well as the implementation and operation phases – in an agile, secured and cooperative way. The true differentiator is the expertise in all areas: strategy, business consulting, service design, technology – combined with strong industry expertise, which leads to a distinction in our approach: business and technology aligned strategies and solutions, for maximizing customer benefits.
Vlad is a highly skilled business consultant, experienced in Digital Business Transformations, Strategy and Process Administration and Sales Leadership, working intensively with both Telecom and Financial Industries.
He is an experienced Business Leader and Senior Program Manager with a proven track records of more than 19 years in IT&C industry.
Identify the most common threats in OpenBanking and potential mitigation paths and solutions in the API Security perimeter. Describe OAuth2/OIDC best practices related and emerging standards in Microservices Security.
Takeaways:
Andrei is a highly skilled and experienced consultant in Digital Customer Experience, IT Security and Business Transformation domains.
Over the last 12 years, he helped large international customers from Telecom and Banking industries steer their IT strategies to ride the latest technological trends.
Lately, he focused on R&D around Open Banking, particularly the security challenges, in close cooperation with leading software vendors and initiative groups. One of his early achievement in this domain was winning the Open Banking Institute Hackathon in 2018.
He is the lead contributor in launching Smart Fintech, an Open Banking accelerator platform powered by IT Smart Systems.
Identify the most common threats in OpenBanking and potential mitigation paths and solutions in the API Security perimeter. Describe OAuth2/OIDC best practices related and emerging standards in Microservices Security.
Takeaways:
Alexandru Luca is an experienced Senior Consultant for Mobile Technologies with over 15 years experience in IT & C field. Over the years, Mr. Luca has gained valuable experience in this field both by taking key roles in the companies in which he has worked and by acquiring important certifications in this field such as Certified Enterprise Mobility Management, Certified Solution Design & Deployment and Certified System Architecture.
Mr. Luca is a member of the certSIGN team for more than 4 years during which, his activity was an important part of certSIGN’s work and business in this field. The company, with its own mobile security department, has developed and now owns its proprietary mobile products, such as Trust4Mobile – Voice and Messages Encryption application, Fides – Electronic Signature application, and, at this moment, is giving increased interest in continuously improving products and maintaining them at a constantly up-to-date technological level.”
How can we talk about a 100% digital company, if the business processes still involve being tied to a computer desk and working with a spectacular amount of paper documents? Of course, we do have access to an even more spectacular amount of mobile solutions that promise us increased productivity and ease of use. Maybe too many, too scattered and somehow still not enough, taking into account the main aspect that (should) interest us – cybersecurity.
We do witness an era in which, if we want our business to successfully “complete” the digital transformation imperative, we must #gomobile BUT also be secure! Wouldn’t it be great if there was one solution capable of meeting all our “desires” on this subject – 100% digital, mobile, secure, easy, paperless, integrated, customizable etc. ? Yes, it would be sweet!
So, come and discover:
With over 20 years experience in the field of IT solutions for infrastructure and security, Ovidiu Seceleanu manages the B2B solutions team of the Samsung Romania IM division. The mission is to promote Samsung mobility solutions for companies, to develop the partners ecosystem and to make Samsung Knox the market leader in the field of mobile device management solutions.
How can we talk about a 100% digital company, if the business processes still involve being tied to a computer desk and working with a spectacular amount of paper documents? Of course, we do have access to an even more spectacular amount of mobile solutions that promise us increased productivity and ease of use. Maybe too many, too scattered and somehow still not enough, taking into account the main aspect that (should) interest us – cybersecurity.
We do witness an era in which, if we want our business to successfully “complete” the digital transformation imperative, we must #gomobile BUT also be secure! Wouldn’t it be great if there was one solution capable of meeting all our “desires” on this subject – 100% digital, mobile, secure, easy, paperless, integrated, customizable etc. ? Yes, it would be sweet!
So, come and discover:
Emir’s 25 years of work has been balanced between engineering, consulting and account management, and travel. During that time, he did business in over 20 countries. At the beginning, engineering work was focused on protecting at that time second-biggest Internet Backbone, AS 3561, while an advisory board member at multiple startups he helped define and formalize engineering requirements for different security solutions.
Middle part of his career was focused on providing technical solution for complex ICT projects in CEE working for T-Systems.
Last 4+ years Emir is working for Qualys where his passion is to develop strategies which help CIOs and CISO.s of large enterprises and Government agencies to bring security to the new level. He has worked with hundreds of clients across government, retail, banking, insurance, and others to improve their IT visibility, security and compliance posture.
Unifying IT, Security and Compliance data in a single-pane-of-glass-view with 2-second visibility across on-premises, endpoints, cloud(s), containers, web apps, API, mobile and OT/IoT environments it is fundamental need of any business interested in secure and uninterrupted growth and long prosperity.
People who achieved visibility Across Enterprise reports following side effects:
Elena is Cyber Security enthusiast with more than 10 years background in coordinating projects in cybersecurity, developing digital subscriptions products, digital media and data privacy.
Elena joined Marsh Cyber Business Development team as Cyber Risks and Insurance Consultant focused in providing advanced cyber protection tools to major companies in Romania within an approach based on comprehensive response cover for cyber risks, backed by industry-leading cyber insurers.