Lunch buffet. Informal communication. Chillout zone
Conference closing. Information security quiz game. Awarding of winners
Information security services: Data protection by third parties Instructions for use.
Exclusive presentation of proprietary product
Real security: From formality to sustainable protection. The role and value of expert consulting
Hacking in your pocket: The best cases of mobile app pentests.
OSINT: Everything will be found. Data analytics from open sources.
Plenary session: "Cybersecurity: Between global trends and local challenges"
Conference opening.
Welcome speech from the organizers.
Registration of participants. Welcome Coffee