Keynotes
How to learn from hacking attacks
Is it really you? How technology helps to detect fraudsters
Information protection and management is the cornerstone of any digital organization
The most frequent methods of attacks and their investigation by the Police of the Czech Republic
Cybersecurity for SMEs - best practices
Legal challenges of cybersecurity - NIS 2 is coming
BEC - When your accountant sends several hundred thousand to the wrong account
The Ten Immutable Laws of Cyber Security