Nowadays, we do hear a serious information security incident almost every day. Whether it is the Snowden-case, disclosure of nude celebrity pictures, stolen of millions of credit card data or even the theft of unpublished movies, the stakes are higher now.

Due to the dramatic development of information technology, laptops and tablet computers, smart phones and their environment become an integral part of our lives. Not to mention those emerging technologies that goes far beyond to control them the usual way. If we consider the increasing trends in information security threats and vulnerabilities – including the human factor – it becomes clear that we have a big challenge.

The aim of Sec-TOUR conference is to bring IT and information security leaders, as well as supporting companies in this segment together in an environment where strategic and technical topics are discussed and networking is the key.

Programs

26 March 2015, Thursday
09:30 - 09:35 Welcome Péter Rónaszéki - Árpád Svájger
09:35 - 10:00 Market analysis Tamás Gaidosch
10:00 - 10:25 SANS TOP20 Critical Controls and how Qualys support them Vilmos Szegő, Proyet Consulting, CISA CISM
10:25 - 11:00 Fortinet FortiGuard services against today's advanced threats Gabor Hirsch, Foritnet Sales Manager - Peter Sajó, EuroOne
11:00 - 11:25 Explore the latest innovations from AirWatch in the Enterprise Mobility Management Arena Alfredo Rolletta, AirWatch by VmWare
11:25 - 11:45
11:45 - 12:10 Cloud - integrated Data Protection for Physical and Virtual Environments Tibor Bán, SafeSoft, sales director
12:10 - 12:35 Data Center Security, Software Defined Protection - variations for different SDN architectures László Csósza, Check Point, system engineer
12:35 - 13:00 James Bond is in my laptop: APTs, cryptoviruses and protection against them Tamás Fórján, 2F 2000 Kft. operations director
13:00 - 13:25 Scalabe and open NG security by Juniper Networks Karel Hendrych, Juniper Networks
13:25 - 14:05 Lunch
14:05 - 14:30 DDoS 1x1: distributed denial of service attacks and the protection methods Péter Páli, senior system engineer, S&T Consulting Hungary Ltd.
14:30 - 14:55 Real threat intelligence and security analytics with Splunk Tamás Horváth, BrightDea
14:55 - 15:20 Aruba Networks – Content in MOVE Miklós Juhász, Valkyr, CTO
15:20 - 15:45 Application security from the beginning of developement till the operation Tamás Csinos, RRC Hungary
15:45 - 16:05 Coffee break
16:05 - 16:30 Mobile tools management from Cloud Zsolt Hegyi, WSH
16:30 - 16:55 Ethical hacking PRAudit presentation
16:55 - 17:20 Bringing Big Data Visibility to Network Security Gabor Nagy, SafeSoft, system engineer
17:20 - 17:45 Dell Sonicwall SuperMassive - new generations of firewall for the enterprises László Papp, RRC Hungary

27 March 2015, Friday
09:00 - 09:05 Welcome Péter Rónaszéki - Árpád Svájger
09:05 - 09:30 Security issues of Conected Cars Gábor György Strausz, General Motors, CIO Southeast Europe
09:30 - 09:55 IT Security worth as much as how intelligent it can get! Árpád Tóth, McAfee
09:55 - 10:20 How to transform your network into a strategic and secured business asset Michal Zlesák, Extreme Networks
10:20 - 10:55 SIEM systems and about the 2013 l Law Szabolcs Hallai, WSH
10:55 - 11:15 Coffee break
11:15 - 11:40 Evolution of the IT contracts dr. Zoltán Ormós, lawyer
11:40 - 12:05 FortiWEB - for protecting web applications Balazs Bajmóczi, WSH, senior system engineer
12:05 - 12:30 Hacked! Stolen! Sold! Ransom! Is this the trend? Kálmán Makay, mySec, CEO
12:30 - 12:55 Comparing complex endpoint security solutions Attila Tóth, BME

Location

Fülemüle street 2.
Mezőkövesd 3400
Balneo Hotel Zsori Thermal & Wellness****

GPS: 47.796352,20.523286

Sponsors





































Professional partners