Risk 2022 Agenda

The full RISK 2022 agenda will feature over 50 sessions, addressing IT topics such as secure service edge, endpoint, network and extended detection and response, denial of service protection, data protection, attack surface management, fraud prevention, privilege management, user behaviour, application security, analytics and incident response, security operations, critical infrastructure protection and more.

Day One - 1st of June 2022

8:00 WELCOME RECEPTION

10:00 - 11:45 PLENARY SECTION

time

main hall

10:00

Opening

10:15

Trellix and Living Security - it’s good to be different

by Ed Baker - VP Channel Director,

Trellix

10:45

Don’t make it easy for hackers: Thwart ransomware and identity-based attacks!

by Rosario Bonanno - Solutions Engineer, EMEA,

Netwrix

11:15

Take back the cyber advantage - Network Intelligence for Advanced Defense

by Richard Wieneke - Regional Manager,

ExtraHop

11:45 BREAK

12:15 - 14:40 BREAKOUT SECTION

time

gala

blue

orange

green

red

12:15

Presentation:

Remote Access Risk Factors – Why Zero Trust is essential

by Damien Brown - Director, Solutions Engineering,

BeyondTrust

Presentation:

Razsvetlimo temo! - Kaj najdemo o vas na darknetu?

by Jure Pečar - Technical advisor for information security,

S&T Slovenija

Workshop:

Shields Up - Defend yourself

by Michael Rohsé - Sr. Sales Engineer,

ExtraHop

Workshop:

A Race against Time - CyberRes ArcSight

by Arun George - SecOps Sales Lead,

Emerging Markets,

CyberRes

Workshop:

eXtended Detection & Response Workshop - What we should expect from XDR technology and what not?

by Damian Hoffman - Senior System Engineer,

Trellix

12:50

Presentation:

Mandiant Advantage for all

Mandiant

Presentation:

When malware becomes a hacker’s best friend 

by Matjaž Kosem - CEO, Grega Prešeren - CTO, Andrej Gornik - Senior Penetration Tester,

Carbonsec

Workshop:

Data Breach Simulation in Public Cloud Service

by Eran Danino - Regional Sales Manager, CEE,

Radware

Workshop:

Auditing and reporting for compliance with Netwrix Auditor

by Rosario Bonanno - Solutions Engineer, EMEA,

Netwrix

Workshop:

Critical Capabilities for Security Service Edge

by Boubker El Mouttahid - Global Cloud Security Architect & Strategist,

SkyHigh Security

13:20

Short refreshment

Short refreshment

Short refreshment

Short refreshment

Short refreshment

13:35

Presentation:

Two faces of DNS - From attacker side and from defender side

by Jan Rynes - Solutions Architect,

Infoblox

Presentation:

Cloud Data, Cloud Apps, Cloud Networking .. what about Cloud Security? - Provide pervasive user, data and application security by leveraging the SASE approach

by Stojan Rančić - IT Architect, Security,

NIL

Workshop:

What would you do if you knew you left your home door wide opened? - How your company is seen by hackers?

by Michal Borowiecki - Regional Sales Director EE,

Group-IB

Workshop:

Enabling DevSecOps in Your Organization Based on Fortify

by Yaroslav Popov - Application Security Presales Portfolio Leader, International,

CyberRes

Workshop:

Mission: proactive hunting - How to find an insider attacker using different technology?

by Damian Hoffman - Senior System Engineer,

Trellix

14:10

Presentation:

Cyber warfare never ends

by Michael Belda - Channel Sales Manager, Petr Todorov - Presales Manager,

Novicom


Presentation:

How to Create a Secure Code Pipeline in Modern App Development

by Leon Maister - Senior Application Security Expert,

Checkmarx

Workshop:

ExtraHop´s catch of the day: Ransomware

by Michael Rohsé - Sr. Sales Engineer,

ExtraHop

Workshop:

Forcepoint ONE – The data-centric SSE solution

by Amir Eran - Solution Architect,

Forcepoint

Workshop:

Next-Gen SIEM - Defending against a Live Ransomware Attack

by Himanshu Tonk - Enterprise Sales Engineer,

LogRhythm

14:40 LUNCH

15:40 - 17:10 PLENARY SECTION

time

main hall

15:40

Christmas Hancitor - Preventing Cuba's Threat

by Camill Cebulla - Head of European Business,

Group-IB

16:10

XDR – Why it’s a must for Enterprises

by Michal Ostrowski - Director for EMEA East,

Trellix

16:40

Rethinking cybersecurity in the digital transformation age - Secure Service Edge

by Boubker El Mouttahid - Global Cloud Security Architect & Strategist,

Skyhigh Security

17:10 - ∞ FUN SECTION

time


17:10

Cocktail Party at SoftNET booth

20:00

Great Gatsby Gala Dinner at the Main Hall

23:30

After Party at the hotel terrace

Day Two - 2nd of June 2022

9:00 MORNING RECEPTION

9:30 - 12:30 PLENARY SECTION

time

MAIN hall

09:30

T.B.D.

10:00

Identities. Data. Applications. The driving forces of cyberresiliency

by Ramsés Gallego - International Chief Technology Officer,

CyberRes, a Micro Focus line of business

10:30

Block-chain Principles for Defensive and Offensive Application Security Approach

by David Aviv - CTO & VP Advanced Solutions,

Radware

11:00

Break

11:30

One Cloud to rule them all

by Eran Amir - Solution Architect, EMEA,

Forcepoint

12:00

How to Leverage Threat Data for Automated Incident Response - Learn How Data Normalization and LogRhythm’s Smart response feature can Protect your Organization

by Matthew Platten - Channel Presales Engineer Europe,

LogRhythm

12:30 BREAK

13:00 - 14:40 BREAKOUT SECTION

time

gala

blue

orange

green

red

13:00

Presentation:

Road to passwordless

by Bojan Radulović - Technical presales engineer

Cisco

Presentation:

Teorija je eno, praksa drugo? Primeri reakcij na varnostne incidente iz prakse.

by Boštjan Kavčič - System Engineer, Erik Veršec -Network System Engineer UnistarPRO

Workshop:

Use of DNS as attacker tool

by Jan Rynes - Solutions Architect

Infoblox

Workshop:

Achieve and maintain Active Directory Security with StealthAUDIT and StealthDEFEND

by Rosario Bonanno - Solutions Engineer, EMEA

Netwrix

Workshop:

Collaboration - the main security feature

Mandiant

13:35

Presentation:

Risk & Context Based Vulnerability Management

by M. Alper Koç - Regional Technical Manager, SEE & Turkey Qualys

Presentation:

360° upravljanje končnih naprav kot storitev

by Luka Bijelič, Gregor Zebec,

Telekom

Workshop:

Digital Risk Protection solution: overview and use cases

by Dmitrii Tiunkin - Head of Digital Risk Protection, Europe Group-IB

Workshop:

Risk-Adaptive Data Protection

by Amir Eran - Solution Architect Forcepoint

Workshop:

eXtended Detection & Response Workshop - What we should expect from XDR technology and what not?

by Damian Hoffman - Senior System Engineer

Trellix

14:10

Presentation:

T.B.D.

Presentation:

Boost your M365 protection with Barracuda SaaS

by Michal Zalewski, Sales Engineer, 

Barracuda

Workshop:

Bot Manager Account Take Over Attack Demo

by Eran Danino - Regional Sales Manager, CEE

Radware


Workshop:

T.B.D.

Workshop:

Mission: proactive hunting - How to find an insider attacker using different technology? 

by Damian Hoffman - Senior System Engineer

Trellix

14:50 - 16:00 PLENARY SECTION

time

MAIN hall

14:50

Smart cities in the age of vulnerabilities

by Gorazd Božič, Team Manager,

SI-CERT

15:10

Roundtable discussion

hosted by Alen Šalamun, CTO, Real security

featuring representatives of SI-CERT, Trellix, CyberRes, Forcepoint, Radware and ExtraHop

15:50

Humanitarian auction, raffle and closing

16:20 - ∞ BBQ PICNIC