We invite you to actively participate in the 11th edition of
the Advanced Threat Summit—the most significant cybersecurity conference in Poland for active cybersecurity managers!
As always, the conference will gather a large, several-hundred-person professional
audience of expert representatives from corporations, banks, financial and public institutions.
It is also the venue for numerous leading partners,
including well-known and trusted technology solution providers in the industry.
A true cybersecurity festival!
During the productive efforts of the Program Council, each year we select the current
challenges that the cybersecurity community in Poland faces. In the 11th edition of the AT Summit,
we will focus on understanding the consequences that the expansion of various security-related regulations has for the entire industry.
The conference will be held in a hybrid format—the first and second days will be hybrid, and the third day will feature online activities.
- 13 November - 1st hybrid day with a special jubilee evening meeting for the attendees
- 14 November - 2nd hybrid day [onsite & online conference + workshops onsite]
- 15 November - 3rd day online [additional workshops]
We invite you to actively participate in the 11th edition of
the Advanced Threat Summit—the most significant cybersecurity conference in Poland for active cybersecurity managers!
As always, the conference will gather a large, several-hundred-person professional
audience of expert representatives from corporations, banks, financial and public institutions.
It is also the venue for numerous leading partners,
including well-known and trusted technology solution providers in the industry.
A true cybersecurity festival!
During the productive efforts of the Program Council, each year we select the current
challenges that the cybersecurity community in Poland faces. In the 11th edition of the AT Summit,
we will focus on understanding the consequences that the expansion of various security-related regulations has for the entire industry.
The conference will be held in a hybrid format—the first and second days will be hybrid, and the third day will feature online activities.
- 13 November - 1st hybrid day with a special jubilee evening meeting for the attendees
- 14 November - 2nd hybrid day [onsite & online conference + workshops onsite]
- 15 November - 3rd day online [additional workshops]
WHY IS IT WORTH
BECOMING A PARTICIPANT
AT SUMMIT?
High-quality programme
The high quality of the conference programme is overseen by a Programme Board of experienced practitioners.
The hybrid formula
The hybrid formula of the conference gives you a choice - you attend the event as it suits you: online or on-site!
Experts
Top cybersecurity experts as speakers - during presentations and round-table discussions you will gain first-hand knowledge and exchange experiences.
19 CPE points
You can earn up to 19 CPE points by attending the conference
30-day access
If you don't manage to watch all the presentations, you'll do it later - you'll get 30-day access to the videos and presentations
WHY IS IT WORTH
BECOMING A PARTICIPANT
AT SUMMIT?
High-quality programme
The high quality of the conference programme is overseen by a Programme Board of experienced practitioners.
The hybrid formula
The hybrid formula of the conference gives you a choice - you attend the event as it suits you: online or on-site!
Experts
Top cybersecurity experts as speakers - during presentations and round-table discussions you will gain first-hand knowledge and exchange experiences.
19 CPE points
You can earn up to 19 CPE points by attending the conference
30-day access
If you don't manage to watch all the presentations, you'll do it later - you'll get 30-day access to the videos and presentations
Topics of AT Summit 2024:
-
1.
THE INDUSTRY IS INCREASINGLY REGULATED
Regulations are a double-edged sword – on one hand, they aid in attracting the attention of decision-makers and securing funding for implementations, projects, and teams; on the other, meeting compliance requirements becomes an end in itself, raising questions about the optimal direction for actions.
- To what extent does the increasing number of regulations limit the criterion of common sense?
- The shadow of NIS2 – how will the market cope with new regulations that will suddenly cover a huge number of entities at the same time?
- Will meeting the regulatory requirements in the cybersecurity industry deplete budgets and resources needed for other, "non-regulatory" security projects and initiatives?
- Due to regulations in the industry, a large group of entirely new people will emerge – what are the consequences, and how can we help them quickly overcome the learning curve?
- Does the specter of war change our approach to regulations and cyber resilience?
-
2.
CYBERSECURITY IN THE SPOTLIGHT
From a technological field, cybersecurity has evolved into a focus of business and corporate management
- What consequences does this carry – in terms of competencies, education, and accountability?
- How does it change business expectations – especially in the areas of accountability, demonstrating value, and delivering KPIs?
- Is cybersecurity currently better understood than it used to be?
- What attitude does this require from those involved in cybersecurity?
- How does cybersecurity change companies themselves, and can it build their value?
-
3.
ERA OF AI INTELLIGENCE - AI AS A HELPER… BUT ALSO A THREAT
The revolution of the cybersecurity industry through AI is happening before our eyes.
- Are we expecting miracles – limitations of currently available technologies?
- Tools that can change the way people and cybersecurity departments work.
- Improving (increasingly cheaper) social engineering and AI's role in creating 'artificial users' – what to do when CAPTCHA no longer works?
- AI regulations primarily concern ethics, but not the risks related to security – should this change?
-
4.
DATA AND ITS ANALYSIS IN CYBERSECURITY
A large part of cybersecurity involves... numbers, for example from SIEM-class systems.
- Are we devoting enough attention to data analysis in cybersecurity?
- Companies are increasingly establishing dedicated analytics centers – should the cyber area be part of them?
-
5.
CLOUD IN EVERY COMPANY
- Data processing is inevitably moving towards environments over which we do not have full control – what long-term consequences does this permanent change bring to the cybersecurity industry?
- Security in the Cloud – what are the pros and cons of the ongoing migration of cybersecurity tools from on-premises to the cloud?
-
6.
REVOLUTION IN THE WORLD OF SUPPLIERS – 3RD PARTY RISK
A new sector is emerging - the rating of resilience and reliability of supply chain elements.
- Practice versus regulatory requirements – a serious approach to supply chain security.
- External communication within IT systems with clients and suppliers – risk analysis, potential threats, costs, monitoring solutions.
- Certification and security of products connected to the network.
-
7.
THREATS AND ATTACKS - ANALYSIS AND MITIGATION
As always, the agenda will include the "classic" set of topics in the area of Advanced Threat.
- How to counteract threats and how to prepare for them.
- Best practices of cybersecurity departments – proprietary solutions and recognized methodologies.
- New tools and innovations in the area of cybersecurity solutions.
- Collaborating with service and solution providers versus in-house competencies.
- Building cyber resilience of organizations, ensuring operational continuity.
- Innovative awareness programs.
Considering attending the Advanced Threat Summit?
Watch our video recap of the 2023 edition and discover why it's a worthwhile experience:
AT SUMMIT 2024 IN NUMBERS
PARTICIPANTS
PRELEGENTS
WORKSHOPS
PARALLEL SESSIONS
If you have any questions
about participation
please contact us, we will be happy
to answer your questions!
Key industries: finance and banking, e-commerce, services, telecommunications, utilities, public sector.
Key positions: CSOs, CISOs, IT/ICT Directors, Directors of (Cyber) Security, and ICT Security Managers and Specialists.
Key industries: finance and banking, e-commerce, services, telecommunications, utilities, public sector
Key positions: CSOs, CISOs, IT/ICT Directors, Directors of (Cyber) Security, and ICT Security Managers and Specialists
BECOME A CONFERENCE PARTNER Advanced Threat Summit!
Show your solutions, share your knowledge and meet new customers
AS A PARTNER Advanced Threat Summit:
- give a lecture combined with a case study in the main panel or in parallel sessions
- run an online discussion table (roundtables sessions)
- establish direct contact with participants in the virtual stand
- lead one-2-one meetings with selected conference participants
- promote yourself as an expert in the technological knowledge zone
- and much more!