11.11.2021
JUDGMENT DAY 15

CONFERENCE ABOUT INFORMATION SECURITY

Registration

    I will attend the conference:

    I agree with the processing of data:


    It will be possible to attend the conference physically or via an online connection. The event will take place in accordance with the current regulations of ÚVZ SR.

    What is the Judgment Day conference about?

    Only a few days away from the 15th Judgment Day information security conference. This is a traditional event of TEMPEST and its partners, at which foreign and domestic cyber security experts regularly appear.

    The professional conference takes place in a hybrid form (onsite / online) and is intended mainly for IT managers, compliance managers, IT and information security specialists, computer law and data experts.

    What will the 15th year of the conference bring?

    On November 11, 2021, the 15th annual Judgment Day information security conference will take place at the Sheraton Bratislava Hotel. The key speaker of the evening will be Jamie WOODRUFF, who specializes in social engineering, human manipulation methods and cognitive bias. He is described as a European unit in ethical hacking. He pointed to security holes and vulnerabilities in websites and applications YouTube, Twitter, Apple or Google.

    The conference partners are the world’s leading manufacturers of information security technologies, Cisco, Eset, Check Point, F5 and Red Hat. Specialists from these companies present current topics and trends in the world of cyber security. Don’t forget to register as soon as possible.

    Jamie WOODRUFF

    An ethical hacker who has successfully hacked Facebook or Kim Kardashian's website.

    Conference topics

    • Current cyber attacks and ransomware
    • Use of artificial intelligence and machine learning in the field of cyber security
    • Security of remote access in connection with the increase of work from home remotely
    • Zero Trust Network Access
    • Security of cloud services
    • IoT / OT security and vulnerability, especially in the 5G environment
      Security orchestration and automation

    Program

    8:00 - 8:45

    Registration

    Conference registration.

    8:45 - 8:55

    Opening

    Introductory Foreword and Opening Judgment Day 15.

    8:55 - 9:35

    Cyber security is changing its face

    Jamie Woodruff, key speaker
    Leading European ethical hacker Jamie Woodruff will guide us in inspiring the development of cyber security, hacking and social engineering. It will examine frequently overlooked areas of weaknesses in many organizations and provide useful insights into cybersecurity, human behavior and technology policy frameworks. Jamie will share some of his incredible infiltrations into well-known corporate systems to show us the vulnerability of the approaches of critical systems in which companies store their data. In addition to these startling facts, Jamie will also provide tips on the corrective actions that individuals and businesses can take to ensure greater security and protection immediately.

    9:40 - 10:10

    Do not trust anyone!

    Tomáš Vobruba, Check Point
    The essence of the Zero Trust (ZT) approach is precisely that you do not trust anyone, even if they are an employee (not at all). We will show the practical aspects of the implementation of ZT architecture on specific cases from the last period.

    10:15 - 10:45

    Are legacy applications more secure than microservices?

    Luboš Klokner, F5
    Monolithic applications are seen as something to get rid of. On the other hand, we have been here with us for many decades and we have learned a lot from them. Let’s take a look at how to secure applications to a dynamic container and microservices environment so that we don’t have to restrict DevOps teams.

    10:45 - 11:05

    Break

    Short break for refreshments.

    11:05 - 11:35

    Advanced persistent threats in the corporate environment

    Robert Lipovský, ESET
    Over the past year, several major APT attacks have been uncovered, affecting countries across the European continent – from France to Eastern Europe and the Balkans – and across a wide range of organizations – from government or military institutions to private companies. In this presentation, we will shed light on a few examples, including one of the most dangerous APT groups in history – Sandworm. We will also look at the role of the so-called supply-chain attacks in the attackers’ repertoire, to MITER ATT & CK tests of EDR security solutions and we will talk about how to protect against modern advanced threats.

    11:40 - 12:10

    The new standard – working from the office or home?

    Milan Habrcetl, Cisco
    The Covid wave changed all the scenarios experienced. Companies and employees had to deal with a new situation from day to day – working from home, working from quarantine. How did the organizations deal with this? What should a security strategy for hybrid work from anywhere look like? We will focus on the concept of Zero Trust Network Access to eliminate the risks associated with security measures for work from offices, branches, home offices, but also, for example, from the airport or station.

    12:15 - 12:45

    Automated security in the world of hybrid cloud

    Jakub Veverka, Red Hat
    Today, the complexity and range of IT systems is growing. At the same time, however, attacks are being refined that seek to attack systems and cause damage that can lead to a loss of client confidence and the end of the attacked organization. Together we will talk about what defense strategies are emerging and how to use automation to interconnect systems for more effective and faster defense, which allows us to obtain as much relevant information about the attack, investigations and adequate responses.

    12:50 - 13:50

    Lunch

    Lunch in the form of buffet tables.

    Speakers

    Jakub Veverka

    Partners

    Previous Years

    Judgment Day 14

    On November 6, 2019, the 14th annual Judgment Day information security conference was held at DoubleTree by Hilton. Key speaker Tony SALES has described the life story of a criminal who has become a respected fraud expert.

    Menu