Modernize IT Security for a Secure Environment for your Hybrid Workforce
By Max Sulaiman, Enterprise Account Manager - DACH at Lookout, and Jasin Mehovic, Senior Channel Account Manager DACH & Eastern Europe at Lookout As apps and data move to the cloud to support hybrid work models, IT is struggling to protect data
Digital Sovereignty Solution / Keep Your Data under Your Control
by Petr Kunstat - Pre-Sales Consultant CEE When we process data, for example information about our customers, we must always keep in mind that the data must not be accessible to anyone unauthorised. After all, this is clearly defined in the
What Open XDR Delivers To Empower Security Teams
by Miri Varbitzky – VP Sales Central & South EMEA at Stellar Cyber What Open XDR Delivers To Empower Security Teams The cybersecurity market continues to evolve as new attack tactics challenge best practices. This talk will discuss a new idea called
The Transition from Fat to Lean Cyber Security
by Emir Arslanagic - Regional Account & Channel Head for SEE and Turkey at Qualys Eye-opening presentation on Cyber Security & Compliance System followed by a hands-on demo of Qualys Platform. After the presentation audience should have a better understanding of
The latest FTK Digital Forensic innovations
by Tomasz Rot - Director of Sales Central & Eastern Europe at Exterro An overview into the latest offerings of the FTK Product Suite and how they can assist you in your investigations. In this session, Tomasz Rot, VP International Channels &
Evolving Threats, how not to be blind and use your limited resources correctly
by Petr Hnevkovsky - CISM, CISA, CISSP, CEH, Chief Cyber Security Strategist - Micro Focus Researching security threats to your organisation is employing more and more experts and costs a lot of money. Many companies don't know where to start, while
Evolving Sec Ops for Business Resilience
by Mo Cashman - Trellix Enterprise Architect Building resilience in your digital enterprise requires a capability to quickly identify a threat and adapt your security posture. Today’s digital enterprise has a wide attack surface, and threats can enter through end-user