
An information technology and data protection specialist, and an experienced manager in innovation project management. He has over 15 years of experience in national and international projects related to building and managing modern information systems.
View morePenetration testing isnβt a one-size-fits-all practice. From applications and networks to people and processes, this session breaks down the different services behind pentesting and demonstrates how they strengthen an organizationβs overall cybersecurity.
View moreIT and cybersecurity are often rivals within companies, and sometimes, security is subordinated to IT managers. But is this a good thing or not? Do IT and cybersecurity representatives agree with this? What are their claims against each other? Do real-life situations show that these are two different camps? Let’s discuss it using the “Pros and Cons” format, but with a small pleasant addition: our game will take place in a bar.
View more