Lunch buffet. Informal communication. Chillout zone
Conference closing. Information security quiz game. Awarding of winners
Information security services: Data protection by someone else's hands. Instructions for use
Non-technical aspects of secure development (SSDLC)
Hacking in your pocket: The best cases of the pentest of mobile applications
Real security: From formality to sustainable protection. The role and value of expert consulting
Conference opening. Plenary session: "Cybersecurity: Between global trends and local challenges"
Registration of participants. Welcome Coffee