top of page

Cyber Security

Conference

Feb 14, 2019 : John Atanasoff Forum, Sofia Tech Park, Bulgaria
logoCircuit.png

Sofia CyberSec 2019 is aiming to be the first event to bring together business leaders, governmental officials, cyber security specialists, and software developers. The main stage is accompanied by hands-on experience  Tech Labs, brought by world-class leaders in cyber security solutions. 

Palo Alto Networks, Check Point Software Technologies, CyberArk, and F5 Networks are coming together to bring to you the hottest trends in cyber security.

Target Group

Does this sound like you? You might want to check us out!

BUSINESS LEADERS


BUSINESS MANAGERS


CEO, CIO


GOVERNMENTAL


INTERNET ATTORNEYS

SECURITY COMPANIES AND SERVICES


IT CONSULTANTS
 

BUSINESS INTELLIGENCE ANALYSTS
 

CYBER SECURITY SPECIALISTS
 

INTELLIGENT SYSTEMS ENGINEERS
 

DEVELOPERS

STARTUPS


ENTREPRENEURS


GRADUATES

IT ENTHUSIASTS

About the conference

Topics

  • Cyber security in the public domain

  • The new dimension of cybersecurity in the context of 5G, IoT, AI

 

  • Business best practices: safe flow of our money and data

 

  • Why cybersecurity should be on the top of the educational curriculum

 

  • Cybersecurity in the Western Balkans - Cooperation opportunities for information sharing, prevention and quick incident response

 

  • The new EU cybersecurity certification framework 

  • Tech Labs for specialists

Topics

Speakers

Speakers

ABOUT US

 

 

 

Digital National Alliance ( DNA) is part of the initiative of the European Commission - Digital Skills and Jobs Coalition. The initiative brings together Member States, companies, social partners, non-profit organisations and education providers, who take action to tackle the lack of digital skills in Europe.


DNA is organization with non-political body and members, established in 2013 by a strong team of proponents of the digital future of Bulgaria.

 

The main goal of the organization is to promote the digital technologies, to achieve more efficient implementation of the digital opportunities and to assist the development of the ICT sector in Bulgaria.


DNA channels the efforts of the business, the academia and the government of Bulgaria and works for the achievement of the priorities of the Digital Agenda of Europe.

 

The economic portal Economic.bg presents the most up-to-date economic, business, financial, market and political news from Bulgaria and the world, gathered together. The site is part of the Media Economics Bulgaria Group since June 2015 and by the beginning of 2017 there were over 30,000 daily average visits and more than 1,000,000 monthly. Our Facebook followers are over 210,000 people, and monthly news from Economic.bg reaches over 1,500,000 people on the social network.


Economic.bg has a loyal and active audience active in the 21-39 age group - active managers, professionals and independent entrepreneurs. The largest share of the readers are Bulgarian around 80% of the total audience. Among the rest of the audience are mainly readers from Great Britain, Germany, Spain, USA, Italy, France, the Netherlands, Austria and others.

DNA - transperant en.png
economicbg.jpg
Economymagazine_Blue (1).png

 

 

 

The “Economy” magazine has been one of the most authoritative editions in Bulgaria since 1990. It presents a comprehensive overview of the Bulgarian and the world economy, with analyzes and commentaries by leading experts, showing the best examples of successful business. The content of the magazine is available in Bulgarian and English languages.

“Economy” treats topics such as:

•History of Bulgarian and world renowned brands;

•New technologies;

•Automobile industry;

•Tourism;

•Cinema, fashion and lifestyle.

The target audience includes managers of private companies, government agencies and public organizations, banks and financial institutions, representatives of international companies, diplomats, experts, consultants and others.

About us

AGENDA

Main Stage (Hall B)

08:30-09:30

Registration

09:30-10:00

Opening Session

Mariya Gabriel

European Commissioner for Digital Economy and Society

 

Tomislav Donchev

Deputy Prime Minister

 

Gergana Passy

President, Digital National Alliance

10:00 - 11:00

Cyber Security is not a job for humans: AI solutions to cyber threats

AI is ideally suited to solve some of our most difficult problems, and cybersecurity certainly falls into that category. With today’s ever evolving cyber-attacks and proliferation of devices, Machine Learning and AI can be used to “keep up with the bad guys,” automating threat detection and respond more efficiently than traditional software-driven approaches.

Moderator: Teodor Panayotov

    CEO, Coursedot

 

Yianni Touliatos

Regional Director for Tech Sales, Microsoft

Peter Kirkov

Manager Cyber Security Business Development, Telelink

Márton Domokos

Senior Counsel, CMS Budapest

 

Aleksandar Ciric

Security technical sales, Southeast Europe, IBM

11:00 - 11:30

Networking coffee

11:30 - 12:30

Cybersecurity in the Public Sector: Navigating the Threat Landscape

The public sector faces a challenging new reality when implementing today’s “boundless” infrastructures: a spiraling threat to data security. Driving this growing threat are the evolving trends of mobility, cloud computing, and advanced targeted attacks, which combine to create challenges and insomnia for IT administrators. Today’s heterogeneous network environments demand flexible, integrated, open solutions that evolve as quickly as the threats themselves.  

Moderator: Krasimir Simonski 

    Deputy Chairperson to the State e-Government Agency (SEGA)

 

Steven Mehringer

Head of Communication Services, NATO

Krassimira Bogdanova

Deputy Head of IT Security Operations, DG DIGIT-S

Ph.D. Mariusz Stawowski 

Technical Director, Clico

Dr. Matthias Sachs

Director Corporate Affairs, Microsoft CEE

Aidan Ryan

Telecommunications Adviser, ENISA

 

Daniel Cohen

Senior Researcher, Blavatnik Interdisciplinary Cyber Research Center (ICRC) and Yuval Ne'eman Workshop for Science, Technology and Security, Tel Aviv University

12:45-13:30

Lunch break

13:30 - 14:30

The future of Money: Cyber Security and Crime in the Fin Tech Era

Securing the internet is now a worldwide priority – and financial institutions, who are among the most vulnerable to such attacks, are at the forefront of determining what steps must be taken to minimize this inevitable risk. But how can the FinTech industry design regulations without impeding innovation? Does the entrepreneurial mindset to “get to the market fast,” undermine security issues? Is blockchain the next line of defense in the quest for cybersecurity?

Moderator: Iliya Lingorski

                    Chief Economist, Bulgarian Development Bank

Svetlin Nakov

Co-founder, SoftUni

Yavor Kolev

Head of Cross-border Organized Crime Department at the General Directorate Organized Crime of the Ministry of Interior

Lyubomir Tulev

Chief Cyber Security Operations Lead,  AMATAS

Spas Ivanov

Security Consultant, Lead Auditor, Baseline

14:30 - 15:00

Networking coffee

15:00 - 16:00

Protecting citizens in the digital age or why cyber security should be in the curriculum

Current and emerging technologies present many opportunities for new ways of learning and engaging, but society must also meet the associated challenge to ensure its citizens behave safely and responsibly in the digital space.

Moderator: Svetlin Nakov

                     Co-founder, SoftUni

Denitsa Sacheva

Deputy Minister, Ministry of Education

Bogdan Pismicenco

Territory Sales Manager - Romania, Bulgaria & Republic of Moldova, Kaspersky Lab

Krasimir Kotsev

CEO, SoCyber

Doroteya Smilenova

Lawyer

Yavor Papazov

Senior Researcher, Sofia Tech Park

16:00 - 17:00

Cocktail

Agenda
Tech Labs

 

 Are you security consultant, information security officer, security engineer, security architect, incident responder, computer forensics expert, penetration tester, security analyst, security software developer, security auditor or in general some Jedi equivalent of a security guru? Then keep on reading!

On 14th of February in John Atanasoff Forum, eight separate tech laboratories, provided by world-known leaders  in cyber security will take place. Each lab is one hour long, and will be happening along the conference on the main stage, providing uparalleled newtworking opportunities. 

The participation in the labs is upon registration only and the places are limited for each of the labs.

 

 

 

 

 

 

 

Topic: Privileged accounts in modern IT and OT environments - underestimated security risk

Speaker: Marcin Paciorkowski, Reginal Sales Engineer, CyberArk

Marcin Paciorkowski is a privileged access security expert. With over 11 years of experience in systems engineering and information security, during which he consulted to some of the largest companies in Europe in verity of industries: Financial services, Healthcare, Military, Retail and more, and covered comprehensive projects for infrastructure, networks, systems and applications security. Marcin hold a B.S. and M.S. degrees from the Military University of Technology, Poland.

250px-CyberArk_logo.jpg

 

 

 

 

 

 

 

 

 

 

 

Topic: Next Gen Security Intelligence platform 

Speaker: Presenter: Mariusz Stawowski

 
Short description: What would security intelligence look like if you could actually find attackers before they cause harm? If you could amplify the abilities of your incident response team so they could quickly respond to all threats they encountered? All without need to sacrifice potentially valuable security data, and prevent ever-growing log management costs. What if we could combine unlimited data collection at a predictable cost? Behavioural analysis-based threat detection, and API-based incident response automation into the next generation of SIEM technologies, so you never have to worry about security blind spots, building or maintaining handmade correlation rules, or running tedious manual response processes again. Exabeam provide a data lake for unlimited data collection. Machine learning and behavioural analysis for detection of advanced threats, like those with lateral movement, and security orchestration and response playbooks for incident response automation. All at the predictable cost. 

478189-exabeam-logo.jpg

 

 

 

 

 

Topic: Protect your Users, Data and Systems with Palo Alto Networks Next-Generation Firewalls, demonstration and open discussion.

Speaker:Martin Konov - System Engineer, Palo Alto Networks Certified Authorized Trainer, Clico

Senior system engineer with a rich knowledge of information technology acquired in his long-term work in the telecommunication industry. Experience in maintaining and designing solutions in information security and data transfer. An IT professional with a master’s degree in Telecommunications from the Technical University of Sofia, certified by leading manufacturers such as Palo Alto Networks, F5 Networks, Checkpoint, VMWARE, Cisco

 

 

 

 

 

Topic: Smart Defense: L7 Behavioral Analysis for DDoS detection and mitigation

Speaker: Sven Mueller, Security Solution Architect

Sven Mueller is Security Solution Architect in EMEA, focused on Application- and Network-Security. 
He acts as a liaison between customers, the F5 sales team, and the F5 prod

uct teams, providing a hands-on, real-world perspective. 
Before he joined F5, he was a Security Consultant and active on HoneyNet research topics. He has a diploma in Electrical Engineering.

amatas-logo-cbracad-bg.jpg

 

 

 

 

Topic: Protect your organization from 5th generation and zero-day cyberattacks with the Best in class Technology

 

Info: Check Point’s multi-layered cybersecurity technology provides Zero-Day Protection against advanced 5th generation of cyberattacks. Choose a SandBlast solution to minimize risk and run your business without disruptions.

 

Presenter info:

Sergey Nevstruev - Threat Prevention Sales Manager Eatern Europe

Sergey Nevstruev works as Head of Threat Prevention, Eastern Europe at Check Point Software Technologies. He started his career as a C++ and Java developer. Sergey worked at Kaspersky lab as VP Mobile Solutions for 7 years, where he managed mobile security business. After Kaspersky he worked in information technology startups. For the past 14 years Sergey has been involved in business development and also mobile and cloud-based applications. He graduated at Moscow State Technical University.

CP_ltd_vertical_Pos.png

Tech Labs

 

 Are you security consultant, information security officer, security engineer, security architect, incident responder, computer forensics expert, penetration tester, security analyst, security software developer, security auditor or in general some Jedi equivalent of a security guru? Then keep on reading!

On 14th of February in John Atanasoff Forum, eight separate tech laboratories, provided by world-known leaders  in cyber security will take place. Each lab is one hour long, and will be happening along the conference on the main stage, providing uparalleled newtworking opportunities. 

The participation in the labs is upon registration only and the places are limited for each of the labs.

 

 

 

 

 

 

 

Hall C, 10:00-11:00

Topic: Privileged accounts in modern IT and OT environments - underestimated security risk

Speaker: Marcin Paciorkowski, Reginal Sales Engineer, CyberArk

Marcin Paciorkowski is a privileged access security expert. With over 11 years of experience in systems engineering and information security, during which he consulted to some of the largest companies in Europe in verity of industries: Financial services, Healthcare, Military, Retail and more, and covered comprehensive projects for infrastructure, networks, systems and applications security. Marcin hold a B.S. and M.S. degrees from the Military University of Technology, Poland.

250px-CyberArk_logo.jpg

 

 

 

 

 

 

 

 

 

 

Hall A, 10:00-11:00

Topic: Next Gen Security Intelligence platform 

Speaker: Presenter: Mariusz Stawowski

 
Short description: What would security intelligence look like if you could actually find attackers before they cause harm? If you could amplify the abilities of your incident response team so they could quickly respond to all threats they encountered? All without need to sacrifice potentially valuable security data, and prevent ever-growing log management costs. What if we could combine unlimited data collection at a predictable cost? Behavioural analysis-based threat detection, and API-based incident response automation into the next generation of SIEM technologies, so you never have to worry about security blind spots, building or maintaining handmade correlation rules, or running tedious manual response processes again. Exabeam provide a data lake for unlimited data collection. Machine learning and behavioural analysis for detection of advanced threats, like those with lateral movement, and security orchestration and response playbooks for incident response automation. All at the predictable cost. 

478189-exabeam-logo.jpg

 

 

 

 

 

Hall A, 11:30-12:30

Topic: Protect your Users, Data and Systems with Palo Alto Networks Next-Generation Firewalls, demonstration and open discussion.

Speaker:Martin Konov - System Engineer, Palo Alto Networks Certified Authorized Trainer, Clico

Senior system engineer with a rich knowledge of information technology acquired in his long-term work in the telecommunication industry. Experience in maintaining and designing solutions in information security and data transfer. An IT professional with a master’s degree in Telecommunications from the Technical University of Sofia, certified by leading manufacturers such as Palo Alto Networks, F5 Networks, Checkpoint, VMWARE, Cisco

Palo-Alto-Logo.png

 

 

 

 

 

Hall C, 11:30-12:30

Speakers: Jakub Orkiszewski - Account Executive Eastern Europe

Topic: Insider Threat – How to find the needle in a haystack?

Description: Data breaches are difficult to detect because security team is often drowning in alerts. Imperva complex approach allows to identify suspicious data access and prioritise threats. By distilling millions of alerts, Imperva allows you to focus on high-risk incidents.

imperva-vector-logo-small.png

 

 

 

 

 

Hall A, 13:30-14:30

Topic: Protect your organization from 5th generation and zero-day cyberattacks with the Best in class Technology

 

Info: Check Point’s multi-layered cybersecurity technology provides Zero-Day Protection against advanced 5th generation of cyberattacks. Choose a SandBlast solution to minimize risk and run your business without disruptions.

 

Presenter info:

Sergey Nevstruev - Threat Prevention Sales Manager Eatern Europe

Sergey Nevstruev works as Head of Threat Prevention, Eastern Europe at Check Point Software Technologies. He started his career as a C++ and Java developer. Sergey worked at Kaspersky lab as VP Mobile Solutions for 7 years, where he managed mobile security business. After Kaspersky he worked in information technology startups. For the past 14 years Sergey has been involved in business development and also mobile and cloud-based applications. He graduated at Moscow State Technical University.

CP_ltd_vertical_Pos.png

 

 

 

 

 

 

Hall C, 13:30-14:30

Topic: Smart Defense: L7 Behavioral Analysis for DDoS detection and mitigation

Short agenda or summary of the demo: In this demo you will learn how easy it is to configure F5´s behavioral DOS protection. Understand the concept and effect of this multilayer defense system, by watching it fighting against a L7 DDoS attack.

Speaker: Sven Mueller, Security Solution Architect

Sven Mueller is Security Solution Architect in EMEA, focused on Application- and Network-Security. 
He acts as a liaison between customers, the F5 sales team, and the F5 prod

uct teams, providing a hands-on, real-world perspective. 
Before he joined F5, he was a Security Consultant and active on HoneyNet research topics. He has a diploma in Electrical Engineering.

images.png
amatas-logo-cbracad-bg.jpg

 

 

 

 

Hall A, 15:00-16:00

Topics:

#HackMyHeart -- or why 2FA is not enough

We will hijack the session of a Facebook user protected by 2FA. We will use this showcase to explain what signs users need to observe and what measures they need to take in order to stay safe when using online services, even when protected with 2FA.

 

Artificial Intelligence in modern cybersecurity solutions -- a hands-on experience

Most threats to the organisations come from the external environment, but there are internal threats, too, that companies need to be protected agains. We will show you how Artificial Intelligence can help companies observe and manage them.

Presenters:

Lyubomir Tulev, Chief Cyber Security Operations Lead

Lyubomir started his career as an investigator in the Bulgarian Cybercrime Department at General Directorate Countering Organized Crime. He has led investigative operations into computer crimes and incidents and the process of cyber forensics. For the last 7 years he has been a point of contact for companies such as Facebook, Google, Skype in Bulgaria. At AMATAS, he is one of the leading cybersecurity experts and trainers.

Alexander Klassanov, Senior Security and Privacy Consultant

Alexander has more than 18 years of professional experience in the IT industry.
He has occupied management positions in leading Bulgarian and international organisations at the intersection of business and information security.

His focus at AMATAS is implementation, coordination and integration of Information Security projects and technologies.

 

ibm-logo-png-transparent-background.png

Hall C, 15:00-16:00

Topic: Augmenting security operation centers with cognitive analysis and threat hunting capabilities

Speaker: Aleksandar Ciric, Security technical sales, Southeast Europe, IBM

In an evolving Cybersecurity landscape a sophisticated attacker can remain undetected for months or even years. Proactive approach to the threat identification is becoming a necessity for the high profile organizations, especially in the defense, government and finance sectors. 
IBM is tackling the problem by enhancing the security operations center incident investigation and threat hunting capabilities with the tools and methodologies that aid the analysts uncover connections and patterns in data to identify hidden threats. Using advanced analytics and visual analysis helps analysts focus on core problem and analysis of the data, now displayed in human readable and understandable format, while automating parts of the otherwise manual process with the machine assistance. Behavior analysis, machine learning and threat intelligence feeds augmented by IBM Watson cognitive technology can help in processing the large data sets that would otherwise be unmanageable for the human analyst operating on the unfiltered data set alone. Successful threat hunt and following investigation outcome will result in the new matching and correlations techniques for the automated detection technologies thus gradually improving organizations security posture and ability to combat sophisticated external or internal threats in the future. 

BUY TICKETS

Tickets
Partners

PARTNERS

Powered by:

microsoft_PNG10.png
Kaspersky_CMYK_POS.png
CLICO logo RGB.png
coursedot-logo-full-big.png
TL_LOGOTO_RGB.png
01_GV_PANTC_POS.png
a1_logo_1.jpg
stone_new_logo-final.png
Fortinet_Logo_1200px.png

With the special participation of:

logoEMAIL.jpg
SoftwareUniversity_Logo_2x.png
ZLATO_LOGO_en.jpg
logo_basscom_full_name_300dpi-redesigned
KMETA_NEW.jpg
AmCham Logo Flag 3RR.jpg
KRIB copy1 (1).jpg

The wine experience at the event will be provided by the Pixels Brand of New Bloom Winery

pixels.PNG

While Spetema and Devin will take care of your refreshements

spetema-logo-new (pantone).jpg
Devin Mineral Logo CMYK.png
TL_LOGOTO_RGB.png

VENUE

Venue
bottom of page