Risk 2022 Agenda

The full RISK 2022 agenda will feature over 50 sessions, addressing IT topics such as secure service edge, endpoint, network and extended detection and response, denial of service protection, data protection, attack surface management, fraud prevention, privilege management, user behaviour, application security, analytics and incident response, security operations, critical infrastructure protection and more.

Day One - 1st of June 2022

8:00 WELCOME RECEPTION

10:00 - 11:45 PLENARY SECTION

time

main hall

10:00

Opening

10:15

Trellix and Living Security - it’s good to be different

by Ed Baker - VP Channel Director,

Trellix

10:45

Don’t make it easy for hackers: Thwart ransomware and identity-based attacks!

by Rosario Bonanno - Solutions Engineer, EMEA,

Netwrix

11:15

Take back the cyber advantage - Network Intelligence for Advanced Defense

by Richard Wieneke - Regional Manager,

ExtraHop

11:45 BREAK

12:15 - 13:15 BREAKOUT SECTION

time

gala

BLUE I

orange

green

red

12:15

Presentation:

Remote Access Risk Factors – Why Zero Trust is essential

by Damien Brown - Director, Solutions Engineering,

BeyondTrust

Presentation:

Razsvetlimo temo! - Kaj najdemo o vas na darknetu?

by Jure Pečar - Technical advisor for information security,

S&T Slovenija

Workshop:

A Race against Time - CyberRes ArcSight

by Arun George - SecOps Sales Lead,

Emerging Markets,

CyberRes


Workshop:

See how ExtraHop detects the Early Stages of an Attack

by Erik Van Der Noordt, Sales Engineer ,

ExtraHop


Workshop:

eXtended Detection & Response Workshop - What we should expect from XDR technology and what not?

by Damian Hoffman - Senior System Engineer,

Trellix

12:45

Mandiant Advantage for all

by Lucian Barnea

Regional Sales Manager EE

Mandiant

When malware becomes an ethical hacker's best friend. 

by Matjaž Kosem - CEO, Grega Prešeren - CTO, Andrej Gornik - Senior Penetration Tester,

Carbonsec

Data Breach Simulation in Public Cloud Service

by Eran Danino - Regional Sales Manager, CEE,

Radware

Auditing and reporting for compliance with Netwrix Auditor

by Rosario Bonanno - Solutions Engineer, EMEA,

Netwrix

Mission: proactive hunting - How to find an insider attacker using different technology?

by Damian Hoffman - Senior System Engineer,

Trellix

13:15 LUNCH

14:15 - 15:15 BREAKOUT SECTION

time

gala

BLUE I

orange

green

red

14:15

Presentation:

Two faces of DNS - From attacker side and from defender side

by Jan Rynes - Solutions Architect,

Infoblox

Presentation:

Cloud Data, Cloud Apps, Cloud Networking .. what about Cloud Security? - Provide pervasive user, data and application security by leveraging the SASE approach

by Stojan Rančić - IT Architect, Security,

NIL

Workshop:

Enabling DevSecOps in Your Organization Based on Fortify

by Yaroslav Popov - Application Security Presales Portfolio Leader, International,

CyberRes


Workshop:

What would you do if you knew you left your home door wide opened? - How your company is seen by hackers?

by Michal Borowiecki - Regional Sales Director EE,

Group-IB


Workshop:

Critical Capabilities for Security Service Edge

by Boubker El Mouttahid - Global Cloud Security Architect & Strategist,

SkyHigh Security

14:45

Cyber warfare never ends

by Michael Belda - Channel Sales Manager, Petr Todorov - Presales Manager,

Novicom

How to Create a Secure Code Pipeline in Modern App Development

by Leon Maister - Senior Application Security Expert,

Checkmarx

Forcepoint ONE – The data-centric SSE solution

by Amir Eran - Solution Architect,

Forcepoint

Detecting Live Attacks with ExtraHop - live demo

by Erik Van Der Noordt, Sales Engineer,

ExtraHop

Next-Gen SIEM - Defending against a Live Ransomware Attack

by Himanshu Tonk - Enterprise Sales Engineer,

LogRhythm

15:15 BREAK

15:45 - 17:15 PLENARY SECTION

time

main hall

15:45

Christmas Hancitor - Preventing Cuba's Threat

by Camill Cebulla - Head of European Business,

Group-IB

16:15

XDR – Why it’s a must for Enterprises

by Damian Hoffman - Senior System Engineer 

Trellix

16:45

Rethinking cybersecurity in the digital transformation age - Secure Service Edge

by Boubker El Mouttahid - Global Cloud Security Architect & Strategist,

Skyhigh Security

17:15 - ∞ FUN SECTION

time


17:15

Cocktail Party at SoftNET booth

20:00

Great Gatsby Gala Dinner at the Main Hall

23:30

After Party at the hotel terrace

Day Two - 2nd of June 2022

9:00 MORNING RECEPTION

10:00 - 12:30 PLENARY SECTION

time

MAIN hall

10:00

Identities. Data. Applications. The driving forces of cyberresiliency

by Petr Hněvkovský - Chief Cyber Security Strategist,

Micro Focus

10:30

Block-chain Principles for Defensive and Offensive Application Security Approach

by David Aviv - CTO & VP Advanced Solutions,

Radware

11:00

BREAK

11:30

One Cloud to rule them all

by Eran Amir - Solution Architect, EMEA,

Forcepoint

12:00

How to Leverage Threat Data for Automated Incident Response - Learn How Data Normalization and LogRhythm’s Smart response feature can Protect your Organization

by Matthew Platten - Channel Presales Engineer Europe,

LogRhythm

12:30 BRUNCH

13:00 - 14:30 BREAKOUT SECTION

time

gala

blue I

orange

green

red

13:00

Presentation:

Road to passwordless

by Bojan Radulović - Technical presales engineer

Cisco

Presentation:

Teorija je eno, praksa drugo? Primeri reakcij na varnostne incidente iz prakse.

by Boštjan Kavčič - System Engineer, Erik Veršec -Network System Engineer UnistarPRO

Workshop:

Use of DNS as attacker tool

by Jan Rynes - Solutions Architect

Infoblox

Workshop:

Achieve and maintain Active Directory Security with StealthAUDIT and StealthDEFEND

by Rosario Bonanno - Solutions Engineer, EMEA

Netwrix

Workshop:

Mission: proactive hunting - How to find an insider attacker using different technology? 

by Damian Hoffman - Senior System Engineer

Trellix

13:30

Presentation:

Risk & Context Based Vulnerability Management

by M. Alper Koç - Regional Technical Manager, SEE & Turkey Qualys

Presentation:

360° upravljanje končnih naprav kot storitev

by Luka Bijelič, Gregor Zebec,

Telekom

Workshop:

Risk-Adaptive Data Protection

by Amir Eran - Solution Architect,

Forcepoint

Workshop:

Digital Risk Protection solution: overview and use cases

by Dmitrii Tiunkin - Head of Digital Risk Protection, Europe,

Group-IB

Workshop:

eXtended Detection & Response Workshop - What we should expect from XDR technology and what not?

by Damian Hoffman - Senior System Engineer

Trellix

14:00

Presentation:

EuroSPI Certified Cybersecurity Engineer and Manager – Challenges in Cyber security in Automotive Sector

by Alen Šalamun, CTO,

REAL security

Presentation:

Boost your M365 protection with Barracuda SaaS

by Michal Zalewski, Sales Engineer, 

Barracuda

Workshop:

Bot Manager Account Take Over Attack Demo

by Eran Danino - Regional Sales Manager, CEE

Radware


Workshop:

BeyondTrust Privileged Remote Access Intro and Live Demo

by Damien Brown - Director, Solutions Engineering,

BeyondTrust

Workshop:

Collaboration - the main security feature

by Lucian Barnea

Regional Sales Manager EE

Mandiant

14:30 BREAK

15:00 - 16:30 PLENARY SECTION

time

MAIN hall

15:00

Smart cities in the age of vulnerabilities

by Gorazd Božič, Team Manager,

SI-CERT

15:20

Roundtable discussion

hosted by Alen Šalamun, CTO, Real security

featuring representatives of SI-CERT, Trellix, CyberRes, Forcepoint, Radware and ExtraHop

16:00

Humanitarian auction, raffle and closing

16:30 - ∞ BBQ PICNIC