Nowadays, we do hear a serious information security incident almost every day. Whether it is the Snowden-case, disclosure of nude celebrity pictures, stolen of millions of credit card data or even the theft of unpublished movies, the stakes are higher now.
Due to the dramatic development of information technology, laptops and tablet computers, smart phones and their environment become an integral part of our lives. Not to mention those emerging technologies that goes far beyond to control them the usual way. If we consider the increasing trends in information security threats and vulnerabilities – including the human factor – it becomes clear that we have a big challenge.
The aim of Sec-TOUR conference is to bring IT and information security leaders, as well as supporting companies in this segment together in an environment where strategic and technical topics are discussed and networking is the key.
26 March 2015, Thursday | ||
---|---|---|
09:30 - 09:35 | Welcome | Péter Rónaszéki - Árpád Svájger |
09:35 - 10:00 | Market analysis | Tamás Gaidosch |
10:00 - 10:25 | SANS TOP20 Critical Controls and how Qualys support them | Vilmos Szegő, Proyet Consulting, CISA CISM |
10:25 - 11:00 | Fortinet FortiGuard services against today's advanced threats | Gabor Hirsch, Foritnet Sales Manager - Peter Sajó, EuroOne |
11:00 - 11:25 | Explore the latest innovations from AirWatch in the Enterprise Mobility Management Arena | Alfredo Rolletta, AirWatch by VmWare |
11:25 - 11:45 | ||
11:45 - 12:10 | Cloud - integrated Data Protection for Physical and Virtual Environments | Tibor Bán, SafeSoft, sales director |
12:10 - 12:35 | Data Center Security, Software Defined Protection - variations for different SDN architectures | László Csósza, Check Point, system engineer |
12:35 - 13:00 | James Bond is in my laptop: APTs, cryptoviruses and protection against them | Tamás Fórján, 2F 2000 Kft. operations director |
13:00 - 13:25 | Scalabe and open NG security by Juniper Networks | Karel Hendrych, Juniper Networks |
13:25 - 14:05 | Lunch | |
14:05 - 14:30 | DDoS 1x1: distributed denial of service attacks and the protection methods | Péter Páli, senior system engineer, S&T Consulting Hungary Ltd. |
14:30 - 14:55 | Real threat intelligence and security analytics with Splunk | Tamás Horváth, BrightDea |
14:55 - 15:20 | Aruba Networks – Content in MOVE | Miklós Juhász, Valkyr, CTO |
15:20 - 15:45 | Application security from the beginning of developement till the operation | Tamás Csinos, RRC Hungary |
15:45 - 16:05 | Coffee break | |
16:05 - 16:30 | Mobile tools management from Cloud | Zsolt Hegyi, WSH |
16:30 - 16:55 | Ethical hacking | PRAudit presentation |
16:55 - 17:20 | Bringing Big Data Visibility to Network Security | Gabor Nagy, SafeSoft, system engineer |
17:20 - 17:45 | Dell Sonicwall SuperMassive - new generations of firewall for the enterprises | László Papp, RRC Hungary |
27 March 2015, Friday | ||
---|---|---|
09:00 - 09:05 | Welcome | Péter Rónaszéki - Árpád Svájger |
09:05 - 09:30 | Security issues of Conected Cars | Gábor György Strausz, General Motors, CIO Southeast Europe |
09:30 - 09:55 | IT Security worth as much as how intelligent it can get! | Árpád Tóth, McAfee |
09:55 - 10:20 | How to transform your network into a strategic and secured business asset | Michal Zlesák, Extreme Networks |
10:20 - 10:55 | SIEM systems and about the 2013 l Law | Szabolcs Hallai, WSH |
10:55 - 11:15 | Coffee break | |
11:15 - 11:40 | Evolution of the IT contracts | dr. Zoltán Ormós, lawyer |
11:40 - 12:05 | FortiWEB - for protecting web applications | Balazs Bajmóczi, WSH, senior system engineer |
12:05 - 12:30 | Hacked! Stolen! Sold! Ransom! Is this the trend? | Kálmán Makay, mySec, CEO |
12:30 - 12:55 | Comparing complex endpoint security solutions | Attila Tóth, BME |
Fülemüle street 2.
Mezőkövesd 3400
Balneo Hotel Zsori Thermal & Wellness****
GPS: 47.796352,20.523286