Security must be built into business, technology and processes. We invite you to the event during which we will present real case studies of the approach to cybersecurity - from the perspective of CIO and CISO of top organizations. We will focus on everyday cooperation and the greatest challenges at the interface between IT and security.


If you want to learn how to effectively and safely implement changes, systems, new applications and products in the company, such as technological architecture, IT and security, how it should look and evolve in the company, or how to build the organizational culture of the company, where everyone feels jointly responsible for security - you can't miss Security Connect 2022.

KEYNOTE SPEAKERS

SPEAKERS

PROGRAM DIRECTORS

WEBINAR 
A conversation between Tomasz Matuła & Artur Kurcweil

We invite you to a free webinar to talk about how technology used wisely provides real business value, why cybersecurity is not a "crutch" but an integral part of the services provided.

SM(1)

WEBINAR 
A conversation between Mirosław Maj & Tomasz Matuła

We invite you to a free webinar on the strategic importance of cybersecurity. Experts will answer the questions of how to make security embedded in technologies and business and what to do to understand its value for the organization.

WEBINAR www

- THEMATIC SCOPE -

#CybersecurityValue&Innovation
We will explain how to talk about financial aspects of cyber security, calculate ROSI, cost of incident occurrence and show the real value of investing in cyber security.
#CyberInCrisis
We will tell you how to manage change and risk, so that the pressure for rapid emergence of new IT systems or their reconfiguration, application services , often affecting flaws in architecture, errors in software, use of temporary solutions, does not reduce the level of security of the entire organization.
#SupplyChainSecurity
We will present tools for verifying that our partners and suppliers comply with security policies and do not threaten the security of the company.
#CERTPeople
We will suggest where to start, which team members to look for, which services to provide to your organization, and which are more profitable to purchase on the market, or maybe which should be "exported"?
#CommandControlCommunication
We will focus on the challenge of clarity and purity of the message, appropriate language, emotion. We will also tell you how to communicate about an incident or vulnerability and how to efficiently conduct communication in a crisis situation.
#CloudSecurity
We will show how to cooperate with the cloud provider in the processes of incident management, business continuity, computer forensics, security testing.
#BusinessValue
Czy i kiedy wdrożenie chmury faktycznie się opłaca? Porozmawiamy o antycypowanych zyskach, realnych kosztach a także optymalizacji finansowej w poszukiwaniu odpowiedzi na to pytanie.
#Hybrid&MultiCloud
Czy i kiedy warto korzystać z usług kilku dostawców chmury? Jakie wynikają z tego benefity, a jakie są potencjalne ryzyka podejścia Multi Cloud czy Hybrid Cloud?
Get In Touch
With an Expert
FLEXIBLE FORMAT
FLEXIBLE FORMAT
Choose from 6 hashtagged tracks and build a personalized agenda tailored to your interests and daily business responsibilities. Recorded presentations are available on the platform for 3 weeks after the event. The most interesting threads from each thematic track will be compiled and discussed by the program director and invited guests in an essential session at the end of the program on Thursday.
50+ PRESENTATIONS
50+ PRESENTATIONS
Security Connect is primarily practical knowledge and experience in cybersec strategy and digitization. You will learn examples of implementations from top companies.
70+ DISCUSSIONS
70+ DISCUSSIONS
Security Connect enables knowledge sharing and collaborative solution finding among CIOs and their teams. All this during 30-minute in-depth discussions on topics submitted by both speakers and event participants.
Security Screw-Up Stories
SECURITY SCREW-UP STORIES
On September 14 in Warsaw, we invite you to an evening networking in the form of "Security Screw-Up Stories"! We will show you surprising, funny and sometimes scary life stories related to cybersecurity, hacking attempts, ongoing projects or cooperation between IT, security and business. It is a great opportunity to talk and network with other participants.
250+ PARTICIPANTS
250+ PARTICIPANTS
Two weeks before and two weeks after the event you can use the platform to make valuable business contacts. Schedule One2One meetings, meet other attendees, speakers, and partners from technology companies.

 

- TICKETS -

last call off eng
Fully Responsive

WE INVITE TO PARTICIPATE:

Especially CIO, CISO, security managers and their teams responsible for the development of cybersecurity strategies in organizations. In addition, we recommend the participation of:
  • IT managers
  • IT architects
  • Cybersecurity project managers
  • Product and service development manager

BY PARTICIPATING YOU GAIN:

  • monthly access to the event platform (2 weeks before and 3 weeks after)
  • possibility to participate in all sessions (show off presentations and topic discussions)
  • possibility to take part in an evening networking "Security Screw-Up Stories" event (limited number of places)
  • the ability to create your own session topics 
  • unlimited number of one2one meetings with participants 
  • summary of the week with the most interesting topics 
  • recordings of presentations from main stages available after the event 
  • substantive support of the event concierge 
  • summary report 
  • access to the Security Excellence community

- TESTIMONIALS -

FAQ

Frequently asked questions

 

ORGANIZER

STRATEGIC PARTNER

Fundacja bezpieczna cyberprzestrzeń

PARTNERS

 

- CONTACT US -

 

Ola

 

Marta

 

Kasia Kęsicka

 

COOPERATION & SPEAKERS


ALEKSANDRA ZYGARSKA
aleksandra.zygarska@degroup.pl

ATTENDEES


MARTA DENEKA
marta.deneka@degroup.pl

PARTNERS

KATARZYNA KĘSICKA

katarzyna.kesicka@degroup.pl