• info@praguecyber.com

Closing ceremony

Closing ceremony DAY 2 / 14:45 – 15:15 / MAIN HALL Speaker Czech Republic LukášKintr Director, National Cyber and Information Security Agency of Czech Republic Lukáš Kintr has served at NÚKIB since 2015 as a Cyber Security Auditor and later as Head of the Audit Unit. In September 2019, he assumed the role of Deputy Director at the National Cyber

The Legal Battlefield: Nations Interpreting International Law in Cyberspace

PANEL The Legal Battlefield: Nations Interpreting International Law in Cyberspace DAY 2 / 13:30 – 14:30 / CONFERENCE ROOM The rapid evolution of the digital age and the rise of new threats have challenged traditional mechanisms for enforcing international law, raising questions about its effectiveness and adaptability. As more states publish national positions on how existing rules apply, critical questions

Partner’s Stage (AWS&MSD): How companies are approaching AI security

Partner’s Stage (AWS&MSD): Safe AI for Critical Infrastructure: Engineering Trust into Generative AI DAY 2 / 11:00 – 12:15 / CONFERENCE ROOM Safe AI relies on a mix of technical controls and their integration into governance, decision-making, and the entire AI lifecycle. We propose to build this together: connecting AWS’s technical and cloud perspective with the process and organizational view

GNSS Jamming: A Growing Threat to National Critical Infrastructure

PANEL GNSS Jamming: A Growing Threat to National Critical Infrastructure DAY 2 / 9:45 – 10:45/ CONFERENCE ROOM Incidents of intentional and unintentional jamming and spoofing of Global Navigation Satellite Systems (GNSS), which underpin vital sectors such as transportation, energy, telecommunications, and emergency services, are on the rise. Experts on this panel will discuss real-world cases, technical vulnerabilities, and the

New Technologies: Potential Risk for Information Security

PANEL New Technologies: Potential Risk for Information Security DAY 2 / 13:30 – 14:30 / MAIN HALL As emerging technologies evolve, they introduce new challenges for information security. This panel will examine key risks associated with IoT devices, VTC systems, and air-gapped systems – including surveillance threats and cloud vulnerabilities. We will also explore how standards like SIGINT, TEMPEST, and

Beyond Firewalls: Is Cyber Resilience the Only Real Defence?

PANEL Beyond Firewalls: Is Cyber Resilience the Only Real Defence? DAY 2 / 11:15 – 12:15 / MAIN HALL Traditional perimeter defence cannot withstand geopolitical shocks, hybrid threats, or supply chain disruptions. In today’s complex world, resilience is the new baseline, but it must be part of a broader, layered defence strategy. This panel will convene experts from government, defence,

Beyond Human Speed: How AI Is Transforming Threat Intelligence and Response

PANEL Beyond Human Speed: How AI Is Transforming Threat Intelligence and Response DAY 2 / 9:45 – 10:45 / MAIN HALL The adversary is evolving – and so must our defences. This panel will examine how artificial intelligence is reshaping cyber threat intelligence, enabling faster detection, richer analysis, and more predictive defences. Experts will discuss both the promise and peril

Keynote day 2

Keynote DAY 2 / 9:00 – 9:45 / MAIN HALL Speaker European Union Hansde Vries COO, The European Union Agency for Cybersecurity Hans de Vries has been the Chief Cybersecurity and Operations Officer (COO) at the EU Agency for Cybersecurity (ENISA) since April 2024. He provides guidance and direction on the Agency’s operational activities and strategically advises the Executive Director. He represents ENISA in the

Quantum Dawn: Are We Sleepwalking into a Post-Encryption World?

PANEL Quantum Dawn: Are We Sleepwalking into a Post-Encryption World? DAY 1 / 16:15 – 17:15 / CONFERENCE ROOM Quantum computing is no longer a distant theory – it is rapidly becoming a practical reality with profound implications for cybersecurity. Current cryptographic systems, particularly those based on RSA and ECC, are vulnerable to quantum algorithms like Shor’s, which can break

From Breach to Action: Coordinating Incident Response in Real Time

FIRE – SIDE CHAT From Breach to Action: Coordinating Incident Response in Real Time DAY 1 / 15:00 – 16:00 / CONFERENCE ROOM Modern cyber incidents are complex, rapidly occurring and evolving, and occasionally cross-border. Effective response hinges on trust and collaboration across public and private sectors – not just technical readiness. This fire-side chat will explore how incident response