Registration Become a partner

Program - Spring ITAPA 2025


  • Program
08:00
8:00 - 18:00 ITAPA CYBER
ITAPA CYBERSEC
On the second day of the Spring ITAPA 2025 conference, we will focus on topics from the field of cyber security.

The programme will be accompanied by:

1  2  3  2
08:00
Registration
09:00
2. deň - úsek 1
9:00 - 9:25 Third Party Management (DORA)
Moderator: Pavol Dovičovič
09:00
Pierluigi Sartori , ISACA Venice-Italy Chapter
Third Parties Management: Just a DORA issue?
09:20
2.deň - úsek 2
9:25 - 9:50 AI and Cybersecurity
Moderator: Pavol Dovičovič
09:25
Petr Chmelař , Resistine
AI in cybersecurity
09:32
Ľubomír Ondrišek , FORTINET
FortiAI in practice
09:35
2.deň - úsek 3
9:50 - 10:30 Ransomware - Too Late to Cry over Spilt Milk, or How the Cataster Trained us
Ransomware is one of the most significant cyber threats, increasingly targeting public sector organizations. The discussion will focus on a comprehensive view of the issue of ransomware, including the methods of its spread, the motivation of attackers, and current trends in attacks on the public sector. Panelists will discuss preventative measures that organizations can put in place to reduce the impact of an incident and how to effectively implement the requirements of the Cybersecurity Act, with an emphasis on strengthening overall cyber resilience. The discussion will also include practical experiences responding to ransomware incidents, crisis management, and disaster recovery after an attack. Particular attention will also be paid to legal aspects. What options do public administrations have in recovering damages caused by ransomware, how can vendor liability be enforced, and what role proper compliance with legal requirements plays in the legal defense against the consequences of cyber-attacks?

Moderator: Pavol Dovičovič
09:50
Ondrej Kubovič , ESET
Sunshine, hay, ransomware?
09:57
Milan Pikula , SK-CERT National Security Authority
(Very vivid) experience of incidents
10:04
Milan Pikula , SK-CERT, National Security Authority
Michal Srnec , Aliter Technologies
DISCUSSION "Ransomware - Too Late to Cry over Spilt Milk, or How the Cataster Trained us"
09:50
2.deň - úsek 4
10:30 - 10:45 Current State and Challenges of Cybersecurity
Moderator: Pavol Dovičovič
10:30
Jaroslav Ďurovka , National Cyber Security Center
State of cybersecurity
10:45
NETWORKING BREAK
10:00
2.deň - úsek 5
11:05 - 11:35 Technological Trends in Cybersecurity

Cybersecurity is currently evolving at a dynamic pace, driven by new technologies and increasingly sophisticated threats. In this panel discussion, two distinguished academics in computer science will focus on current and future technology trends shaping the way information systems are protected. The discussion will cover topics such as the use of artificial intelligence and machine learning in threat detection, the development of quantum cryptography, the automation of security processes, and the challenges associated with the rise of the Internet of Things (IoT) and 5G/6G interfaces. It will also include an analysis of the potential security risks posed by deploying new technologies and a discussion on the need for adaptive and predictive approaches to cyber defense. The discussion will also offer insight into the state of cybersecurity research, identify key directions for technological innovation, and outline how organizations should prepare for the changing ecosystem.

Moderator: Ivan Makatura

11:05
Luboš Klokner , Palo Alto Networks
AI Security: From Access to Runtime
11:12
11:19
Ivan Kotuliak , Slovak University of Technology in Bratislava, Faculty of Informatics and Information Technologies
1on1 interview
11:35
2.deň - úsek 5.1
11:35 - 11:50 Cybersecurity in the Department of Social Affairs
Moderator: Pavol Dovičovič
11:35
Peter Daňko , Ministry of Labour, Social Affairs and Family of the Slovak Republic
Cybersecurity in the Department of Social Affairs
10:15
2.deň - úsek 6
11:50 - 12:50 Means of Authorising Legal Acts in the Electronic Environment
Trustworthy identification, authentication, and authorization of participants in electronic processes play a key role in the digitization of public administration. The panel discussion will focus on current ways of identifying citizens, businesses, and other entities in public administration information systems, including using electronic identity cards (eIDs) and other authentication mechanisms. The discussion will also address the current status and challenges of the means of authorization and authentication on the Central Portal of Public Administration Slovensko.sk. The panelists will raise the question of ‘quo vadis’ - where the next developments in identity management are heading and what technological and legislative changes are needed to ensure greater availability, security, and user-friendliness of eGovernment services. The discussion will also include a broader look at identity and access management (IAM) processes in public administration, including topics such as decentralized identity (self-sovereign identity), mobile authentication solutions, linking with European frameworks (eIDAS2, EUDI Wallet) and the need for dynamic access rights management in a changing environment of digitized services. The discussion will provide insights and recommendations for policymakers, e-services administrators, and practitioners to strengthen trust in the state's digital services.

Moderator: Ivan Makatura
11:50
11:57
Pavol Frič , ITAS
Peter Handzuš , DXC Technology
Martin Hrachala , Ministry of Interior of the Slovak Republic
Ladislav Kovár , Slovensko.Digital
Ervín Šimko , Ministry of Investment, Regional Development and Informatisation of the Slovak Republic
DISCUSSION "Means of Authorising Legal Acts in the Electronic Environment"
13:30
Deň 2 úsek 9.1
12:50 - 13:05 A Well-Functioning Network as the Foundation of Cybersecurity
Moderator: Pavol Dovičovič
12:50
Ondřej Hubálek , GREYCORTEX
Analysis of network performance parameters
11:20
2.deň - úsek 8
13:05 - 13:35 The Future of Critical Infrastructure in the Cloud
Ensuring the continuity of critical systems during major cyber security incidents, war, hybrid threats, or natural disasters is a key challenge for public administrations. Moving infrastructure and data to the cloud offers opportunities to increase resilience but also raises questions about state sovereignty, protection of sensitive data, and legal frameworks. In this discussion, the Secretaries of State from the two departments will work together to find answers on how to build cloud solutions for the public sector securely and efficiently. They will also look at issues such as moving data abroad, resilient systems architecture, digital sovereignty, access management, and how to ensure continued service availability in an environment of increasing geopolitical tensions. The discussion will offer a strategic perspective on the technological, legal, and financial aspects of the future of critical infrastructure in the cloud and outline the direction of the next steps in digital sovereignty and national security.

Moderator: Ivan Makatura
13:05
František Baranec , INTERWAY
Patrik Krauspe , Ministry of Interior of the Slovak Republic
Ervín Šimko , Ministry of Investment, Regional Development and Informatisation of the Slovak Republic
DISCUSSION "The Future of Critical Infrastructure in the Cloud"
13:35
LUNCH
14:00
pridané
14:30 – 14:40 How do We Form the Slovak Cyber Team?

The European Cybersecurity Challenge (ECSC) is the largest international competition targeting young talent and up-and-coming cybersecurity professionals. It is a platform for technical skills development, collaboration, and networking between participants who tackle challenging tasks in Capture the Flag (CTF) games. In the presentation, team manager Alexandra Húsková will introduce the competition's objectives and the creation and preparation of the national representative team, the Slovak Cyber Team.

Moderator: Pavol Dovičovič

14:30
Alexandra Húsková , Cyber Security Competence and Certification Center
How do We Form the Slovak Cyber Team?
11:40
Deň 2 - úsek 6.2
14:40 - 14:55 Cybersecurity in a World of Geopolitical Upheaval - The View from Washington
Moderator: Michal Ivantyšyn
14:40
Rastislav Janota , Special Ambassador of the National Security Office
1on1 interview
11:50
2.deň - úsek 9
14:55 - 15:50 Business Continuity Management - How to Guarantee the Operation of (not only critical) Infrastructure?
Business continuity management (BCM) has long been a topic that is not exclusively for financial institutions or critical infrastructure operators. At a time of growing cyber threats, geopolitical instability, and organizations' reliance on digital services, the issue of crisis preparedness is becoming crucial across the public and private sectors. How do we respond quickly and effectively to incidents? How to plan for business recovery? How do security incident response processes relate to continuity management processes, and where are the boundaries of responsibility? The discussion will provide practitioners' perspectives on current challenges in BCM, crisis management, and disaster recovery, taking into account the specificities of both the public and private sectors. 

Moderator: Pavol Dovičovič
14:55
Ondrej Žilinec , ARICOMA
There are never enough advances
15:09
František Boda , Social Insurance Company
Zuzana Holý Omelková , GAMO
Juraj Praženka , BCM management expert
Július Selecký , ESET
DISCUSSION "Business Continuity Management - How to Guarantee the Operation of (not only critical) Infrastructure?"
15:50
NETWORKING BREAK
15:05
IOT
16:10 - 17:00 ITAPA OPEN TALK: The Growing Phenomenon of Cyberbullying - Prevention versus Intervention

One in three high school students in Slovakia has experienced cyberbullying. Most often, it is defamation, arguments in an online environment, and sharing intimate content without consent, which affects one in ten young people. However, victims of cyberbullying often go unnoticed, not least because up to a third of victims will never confide their experience to anyone. That's according to the latest representative research from the Institute for Public Affairs. In addition to the most up-to-date data, the discussion will bring expert perspectives on the boundaries for a safe digital environment and what form the interaction between the state, education, family, and the neighbourhood should take when it comes to cyberbullying and helping its victims.

Moderator: Michal Havran

16:10
Zuzana Juráneková , IPčko
Henrich Krejčí , ASMOS
Daniel Milo , DG CONNECT, European Commission
Miroslava Remenárová , Slovak Telekom
Lenka Svoradová , Ministry of Education, Research, Development and Youth of the Slovak Republic
DISCUSSION "ITAPA OPEN TALK: The Growing Phenomenon of Cyberbullying - Prevention versus Intervention"
14:00
2.deň - úsek 11
17:00 - 17:50 Round Table: When Do we Start Locking up Cybersecurity Crooks?
Cybersecurity and cybercrime are two sides of the same coin, but their interconnection in practice often faces many obstacles. Although the number of cyber incidents in Slovakia is increasing yearly, only a specific percentage results from deliberate, malicious actions. An even smaller proportion of these cases fulfill the elements of criminal offenses under the Criminal Code. The discussion will focus on the problem of the low rate of escalation of cyber incidents to the prosecution phase, which is significantly lagging compared to other EU countries. Why is the detection and prosecution of cybercrime in Slovakia insufficient? What hinders more effective law enforcement in cyberspace? And what changes in legislation, organization, or competencies are needed to bring cyber crooks, ransomware extortionists, and malicious hackers realistically to justice? The roundtable will bring the perspectives of experts in law, security, cybercrime, and state institutions to open a discussion on how to connect the worlds of cybersecurity and criminal law effectively.

Moderator: Ivan Makatura
17:00
Roman Fundárek , Forensic Expert
Peter Kováč , Forensic Expert and Lawyer
Jana Maškarová , Police Corps of the Slovak Republic
Milan Pikula , SK-CERT, National Security Authority
DISCUSSION "Round Table: When Do we Start Locking up Cybersecurity Crooks?"
17:50
Glass of wine