Risk 2022 Agenda
The full RISK 2022 agenda will feature over 50 sessions, addressing IT topics such as secure service edge, endpoint, network and extended detection and response, denial of service protection, data protection, attack surface management, fraud prevention, privilege management, user behaviour, application security, analytics and incident response, security operations, critical infrastructure protection and more.
Day One - 1st of June 2022
8:00 WELCOME RECEPTION
10:00 - 11:45 PLENARY SECTION
time | main hall |
---|---|
10:00 | Opening |
10:15 | Trellix and Living Security - it’s good to be different by Ed Baker - VP Channel Director, Trellix |
10:45 | Don’t make it easy for hackers: Thwart ransomware and identity-based attacks! by Rosario Bonanno - Solutions Engineer, EMEA, Netwrix |
11:15 | Take back the cyber advantage - Network Intelligence for Advanced Defense by Richard Wieneke - Regional Manager, ExtraHop |
11:45 BREAK
12:15 - 13:15 BREAKOUT SECTION
time | gala | BLUE I | orange | green | red |
---|---|---|---|---|---|
12:15 | Presentation: Remote Access Risk Factors – Why Zero Trust is essential by Damien Brown - Director, Solutions Engineering, BeyondTrust | Presentation: Razsvetlimo temo! - Kaj najdemo o vas na darknetu? by Jure Pečar - Technical advisor for information security, S&T Slovenija | Workshop: A Race against Time - CyberRes ArcSight by Arun George - SecOps Sales Lead, Emerging Markets, CyberRes | Workshop: See how ExtraHop detects the Early Stages of an Attack by Erik Van Der Noordt, Sales Engineer , ExtraHop | Workshop: eXtended Detection & Response Workshop - What we should expect from XDR technology and what not? by Damian Hoffman - Senior System Engineer, Trellix |
12:45 | Mandiant Advantage for all by Lucian Barnea Regional Sales Manager EE Mandiant | When malware becomes an ethical hacker's best friend. by Matjaž Kosem - CEO, Grega Prešeren - CTO, Andrej Gornik - Senior Penetration Tester, Carbonsec | Data Breach Simulation in Public Cloud Service by Eran Danino - Regional Sales Manager, CEE, Radware | Auditing and reporting for compliance with Netwrix Auditor by Rosario Bonanno - Solutions Engineer, EMEA, Netwrix | Mission: proactive hunting - How to find an insider attacker using different technology? by Damian Hoffman - Senior System Engineer, Trellix |
13:15 LUNCH
14:15 - 15:15 BREAKOUT SECTION
time | gala | BLUE I | orange | green | red |
---|---|---|---|---|---|
14:15 | Presentation: Two faces of DNS - From attacker side and from defender side by Jan Rynes - Solutions Architect, Infoblox | Presentation: Cloud Data, Cloud Apps, Cloud Networking .. what about Cloud Security? - Provide pervasive user, data and application security by leveraging the SASE approach by Stojan Rančić - IT Architect, Security, NIL | Workshop: Enabling DevSecOps in Your Organization Based on Fortify by Yaroslav Popov - Application Security Presales Portfolio Leader, International, CyberRes | Workshop: What would you do if you knew you left your home door wide opened? - How your company is seen by hackers? by Michal Borowiecki - Regional Sales Director EE, Group-IB | Workshop: Critical Capabilities for Security Service Edge by Boubker El Mouttahid - Global Cloud Security Architect & Strategist, SkyHigh Security |
14:45 | Cyber warfare never ends by Michael Belda - Channel Sales Manager, Petr Todorov - Presales Manager, Novicom | How to Create a Secure Code Pipeline in Modern App Development by Leon Maister - Senior Application Security Expert, Checkmarx | Forcepoint ONE – The data-centric SSE solution by Amir Eran - Solution Architect, Forcepoint | Detecting Live Attacks with ExtraHop - live demo by Erik Van Der Noordt, Sales Engineer, ExtraHop | Next-Gen SIEM - Defending against a Live Ransomware Attack by Himanshu Tonk - Enterprise Sales Engineer, LogRhythm |
15:15 BREAK
15:45 - 17:15 PLENARY SECTION
time | main hall |
---|---|
15:45 | Christmas Hancitor - Preventing Cuba's Threat by Camill Cebulla - Head of European Business, Group-IB |
16:15 | XDR – Why it’s a must for Enterprises by Damian Hoffman - Senior System Engineer Trellix |
16:45 | Rethinking cybersecurity in the digital transformation age - Secure Service Edge by Boubker El Mouttahid - Global Cloud Security Architect & Strategist, Skyhigh Security |
17:15 - ∞ FUN SECTION
time | |
---|---|
17:15 | Cocktail Party at SoftNET booth |
20:00 | Great Gatsby Gala Dinner at the Main Hall |
23:30 | After Party at the hotel terrace |
Day Two - 2nd of June 2022
9:00 MORNING RECEPTION
10:00 - 12:30 PLENARY SECTION
time | MAIN hall |
---|---|
10:00 | Identities. Data. Applications. The driving forces of cyberresiliency by Petr Hněvkovský - Chief Cyber Security Strategist, Micro Focus |
10:30 | Block-chain Principles for Defensive and Offensive Application Security Approach by David Aviv - CTO & VP Advanced Solutions, Radware |
11:00 | BREAK |
11:30 | One Cloud to rule them all by Eran Amir - Solution Architect, EMEA, Forcepoint |
12:00 | How to Leverage Threat Data for Automated Incident Response - Learn How Data Normalization and LogRhythm’s Smart response feature can Protect your Organization by Matthew Platten - Channel Presales Engineer Europe, LogRhythm |
12:30 BRUNCH
13:00 - 14:30 BREAKOUT SECTION
time | gala | blue I | orange | green | red |
---|---|---|---|---|---|
13:00 | Presentation: Road to passwordless by Bojan Radulović - Technical presales engineer Cisco | Presentation: Teorija je eno, praksa drugo? Primeri reakcij na varnostne incidente iz prakse. by Boštjan Kavčič - System Engineer, Erik Veršec -Network System Engineer UnistarPRO | Workshop: Use of DNS as attacker tool by Jan Rynes - Solutions Architect Infoblox | Workshop: Achieve and maintain Active Directory Security with StealthAUDIT and StealthDEFEND by Rosario Bonanno - Solutions Engineer, EMEA Netwrix | Workshop: Mission: proactive hunting - How to find an insider attacker using different technology? by Damian Hoffman - Senior System Engineer Trellix |
13:30 | Presentation: Risk & Context Based Vulnerability Management by M. Alper Koç - Regional Technical Manager, SEE & Turkey Qualys | Presentation: 360° upravljanje končnih naprav kot storitev by Luka Bijelič, Gregor Zebec, Telekom | Workshop: Risk-Adaptive Data Protection by Amir Eran - Solution Architect, Forcepoint | Workshop: Digital Risk Protection solution: overview and use cases by Dmitrii Tiunkin - Head of Digital Risk Protection, Europe, Group-IB | Workshop: eXtended Detection & Response Workshop - What we should expect from XDR technology and what not? by Damian Hoffman - Senior System Engineer Trellix |
14:00 | Presentation: EuroSPI Certified Cybersecurity Engineer and Manager – Challenges in Cyber security in Automotive Sector by Alen Šalamun, CTO, REAL security | Presentation: Boost your M365 protection with Barracuda SaaS by Michal Zalewski, Sales Engineer, Barracuda | Workshop: Bot Manager Account Take Over Attack Demo by Eran Danino - Regional Sales Manager, CEE Radware | Workshop: BeyondTrust Privileged Remote Access Intro and Live Demo by Damien Brown - Director, Solutions Engineering, BeyondTrust | Workshop: Collaboration - the main security feature by Lucian Barnea Regional Sales Manager EE Mandiant |
14:30 BREAK
15:00 - 16:30 PLENARY SECTION
time | MAIN hall |
---|---|
15:00 | Smart cities in the age of vulnerabilities by Gorazd Božič, Team Manager, SI-CERT |
15:20 | Roundtable discussion hosted by Alen Šalamun, CTO, Real security featuring representatives of SI-CERT, Trellix, CyberRes, Forcepoint, Radware and ExtraHop |
16:00 | Humanitarian auction, raffle and closing |