DSS ITSEC HISTORY       ------{     DSS ITSEC 2012   |   DSS ITSEC 2013   |   DSS ITSEC 2014  }--

Sessions

 

 

Note: Now you can watch videos and related presentations of DSS ITSEC 2015 sessions! Just click on desired session title in agenda table below

AGENDA
Registration and welcome coffee. Andris Soroka & Team DSS 8.30-8.55
Venue1: Cybersecurity General Trends & Digital Fortress of 2016
moderator: Reinis Zitmanis
Opening of the event, Jānis Garisons, State Secretary of the Ministry of Defence of the Republic of Latvia, 8.55-9.10
The global cybersecurity agenda: privacy and trust. Prof, Tim Unwin, UNESCO Chair in ICT4D, Emeritus Professor of Geography at Royal Holloway, University of London, Honorary Professor at Lanzhou University, China 9.10-10.00
National Security and International Policy challenges in a Pos Stuxnet World Vytautas Butrimas, Current Adviser, Cybersecurity and IT Department, Ministry of National Defence of the Republic of Lithuania 10.10-10.40
From Cyber-Security to Cyber-Resilience Zoltán Précsényi, , Senior Manager Government Affairs EMEA, Symantec 10.40-11.10
Coffee break and session split 11.10-11.30

Venue1:
Cybersecurity General Trends & Digital Fortress of 2016
moderator:
Reinis Zitmanis

Venue2:

Welcome to the future. The future is now
moderator:
Gints Turlajs
Venue3:
Malware analysis and hackers in action
moderator:
Kirils Solovjovs
Venue4:
Security of applications and mobility
moderator:
Arturs Filatovs
Venue5:

Cloud & Risk Management
moderator:
Brigitta Gulya Pari
Venue6:

Data & Privacy
moderator:
Veronika Harčenoka
Venue7:

Various Network Security Challenges
moderato:
Arturs Cers
Venue8:

Hot cyber security topic
moderator:
Aleksei Goldbergs
 
Is my fridge spying on me? Vladan Nikolić , Security Consultant in IBM Global Cyber Security Intelligence and Incident Response EMEA Team IoT security – what is at stake? Tomasz Słoniewski, Senior Research Manager Software, IDC Polska Zero Day Defence: Break zero days by denying resources from attacker Jarno Niemelä, Senior Researcher, F-Secure Labs Web Application Security : navigating between FUD and ignorance Aurelijus Stanislovaitis, Leader of the OWASP Lithuania chapter ISO 27001 implementation – challenges and practical solutions, Intars Garbovskis, Accenture Latvia, Information Security Lead Next Generation Security Solutions from Sophos, Per Söderqvist, Sales Engineer Sophos Cisco Security Solutions Technical Update, Redžinalds Knipšis, Systems Engineer, CISCO Social engineering – Mitigating Human Risk in Banking Transactions, Raf Van Ermengem, VASCO 11.30-12.00
How to Secure the Digital (cloud, mobile, big data) Landscape, Patrick Mclaughlin, Oracle Fellow Security Expert Security and the Internet of Things, Sandra Liepkalns, CRISC CISO, Netrus Inc. Lecturer, University of Toronto Satellite Turla: APT Command and Control in the Sky How the Turla operators hijack satellite Internet links Stefan Tanase , Senior Security Researcher, Global Research & Analysis Team, Kaspersky Lab How would I spy on your smartphone Teemu Uolevi Väisänen, Researcher, NATO CCDCOE IT risk management in a real life, Toms Pecis , Lattelecom, Security Risk Management EU Data protection, Zoltán Précsényi, Senior Manager Government Affairs EMEA, Symantec Risk Analytics for Cyber Security, Thomas Wendrich, Director CEUR, SkyBoxSec Discovering Anatomy of the Attack using System Log Management Solution, Vladimirs Orehovs, Leading IT Security Engineer at OptiCom 12.00-12.30
Internal information security threats and targeted attacks: building corporate digital fortress. Natalya Kaspersky, CEO at InfoWatch Group of Companies, Kaspersky Lab co-founder/ Alexey Kalgin, Head of Product Management, EgoSecure Secure IoT in an Identity-Centric World, Patryk Krolikowski, Technology Expert & Sales Engineer, Forgerock Dark side of " I will do it later", Mārtiņš Saulītis, Security and Privacy Consultant, Global Cyber Security Intelligence and Response Team, IBM What every CIO should know about Enterprise Mobility Management, Leszek Twardowski, Sr. System Engineer, Mobileiron Cloud Computing - Risks and Reality? Sandra Liepkalns, CRISC CISO, Netrus Inc. Lecturer, University of Toronto Forthcoming EU Data Protection Law and how Oracle can help, Patrick Mclaughlin, Oracle Fellow Security Expert Contextual Security Intelligence. Viktor Varga, Pre-Sales Engineer, BalaBit-Europe Ltd. SDS - Software Defined Storage, Holger Weilke, Senior Solutions Architect, DataCore 12.30-13.00
Lunch, expo area, business networking 13.00-14.00
Risk Management: Where is the Information? Sandra Liepkalns, CRISC CISO, Netrus Inc. Lecturer, University of Toronto

Quantum Computing and Information Security, Andris Ambainis, Professor, University of Latvia

Advanced Persistent Trolls, Karlis Podins, Threat Analyst, CERT.LV Transforming Cyber Security. Antti Ropponen, Accenture Nordic, Cyber Defence Lead ENISA and Cloud Security, Rossen Naydenov, Expert on Network and Information Security, ENISA Data protection aspects of video surveillance in civilian context, Ilze Bukaldere, Associate Attorney, Borenius Using Data Analytics to Predict and Identify Insider Threats, Paul Down, VP EMEA and APAC, Spectorsoft Expand the power of your e-mail! Matthias Kess, Technical Director, CryptShare 14.00-14.30
Why endpoint security, perimeter security & data protection fails Again & Again & Again, Janne Tägtström, Chief Technologist - Finland & Baltics, Cisco Securing Safety-Critical Systems Against Quantum- and Cryptanalysis-Attacks, Wulf Harder, Managing Director, QuBalt The Global Threat Landscape Report for H1 2015. Bogdan Botezatu, Senior e-threat analyst , BitDefender Most common security vulnerabilities by Latvian developers. Agris Krusts, Managing director, SIA IT Centrs How Red Teaming Helps Microsoft to Build Trusted Cloud, Sarunas Koncius, Account Technology Strategist, Microsoft Future trends of video surveillance, Šarūnas Pavilionis , FIMA Expert of video surveillance Making IT policies actually work with ongoing IT audit, Ilia Sotnikov, Director of Product Management, Netwrix Stop Data Leaks at the Source, Timour Gousseinov, Pre-Sales Engineer, DeviceLock 14.30-15.00
Monitor your privileged users and find the anomalies, Viktor Varga,Pre-Sales Engineer, BalaBit-Europe Ltd. How to Achieve Unconditional Integrity in an End-to-end Verifiable E-voting System. Dr Bingsheng Zhang, Lecturer at School of Computing and Communications, Lancaster University, UK Live-hacking demo. Matteo Tomaselli, Security consultant, Sec-Consult Web Apllication security testing: who tests the test? Ainārs Galvans, Application Penetration Tester, Exigen Service Latvia Protecting a modern datacenter – why focus on backup? Tomasz Turek, Sales Engineer, VEEAM Ironkey Workspace. Gatis Kaušs, Managing Director, Hermitage Solutions Neutralization of DDoS attacks for systems processing confidential information, Alexander Lyamin, CEO, owner Qrator Labs How to easy set up mobility ready enterprise? Didzis Šimis, CEO, Hortus Digital 15.00-15.30
Coffee break 15.30-15.50
Navigating Cyber Risk Exposure (tbc), Stephen Wares, Cyber Risk Practice Leader, EMEA, Marsh WiFi security and Big Data analytics – benefits and impact on privacy and security, Eižens Putniņš, CEO, Maksikoms How to hack a drone? Jānis Dzērve, SPH ENGINEERING, UGCS External attacks on IT: News and Real cases Michael Soukonnik, Regional Manager, Russia and Baltic States, Radware Improve your productivity with Cloud videoconferencing solutions, Zygmunt Łodziński, Veracomp Poland, Lifesize Product Manager Oracle 12c Security New Feature: Data Redaction, Juris Trošins, OCM, Expert, DBA Copetence Center Network Security Effectiveness - You Should Care! Mindaugas Kubilius , Systems Engineer, Baltics, Fortinet Enjoy Data Protection with EgoSecure, Alexey Kalgin, Head of Product Management, EgoSecure 15.50-16.20
iPAM - Next Generation Privilege Mangement? Torsten Wiedemeyer, Regional Director Central and Eastern Europe, BeyoundTrust Evolution of e-crime underground, Paulius Ceponis, Managing Director, Hermitage Solutions Ethical Hacker in Real Action, Peter Gubarevich, IT Training Expert, New Horizons Mobility will happen by you, with you, or to you, Arturs Filatovs, Business Development Executive, Data Security Solutions IBM Cloud solutions for Mobile Device Security and Management, Raivo Reigass, IBM Software Product Marketing Manager, ALSO Intelligent Key Management for Everything Encryption, Daniel Reppmann, Channel Manager, DACH, WinMagic GMBH Addressing Emerging Security Threats with WatchGuard, Peter Johansson, Regional Manager, Northern Europe, WatchGuard Brilliance and poverty modern SIEM solutions, Aleksei Goldbergs, Independent security expert 16.20-16.50
PANEL Discussion 16.50-17.50
DSS - Closing remarks, feedback forms & lottery 17.50-

 

 

The speaker and sponsor list for DSS ITSEC 2015 consists of high level executives from leading global organizations, covering many industries in both B2B and B2C sector. The full list of speakers will be revealed here shortly.

If you would like to participate as a keynote presenter, panelist, or roundtable moderator, please contact us at [email protected]

 

 

 

What topics are covered by the conference?

- Cloud Security
- Security of Mobility
- Application Development Security
- Security of Industrial Systems and Critical Infrastructure
- Encryption (including quantum encryption)
- Security Operations Centre
- Data Security
- Cybersecurity legislation
- Penetration testing, Social engineering, Hacking
- Training and other cybersecurity topics (such as security implications of IoT, Cybersecurity Insurance, or security of e-voting systems)