Registration Become a partner

Program - Autumn ITAPA 2025


  • Program
08:00
ITAPA CYBERSEC
ITAPA CYBERSEC
On the second day of the Jesenná ITAPA 2025 conference, we will focus on topics related to cyber security.

The programme will be accompanied by:

1 2 3 6
08:00
Registration of participants
09:00
2sekcia1
9:00 - 9:20 Cybersecurity between Scylla and Charybdis (hall LONDON I+II)
Why do bogeymen often replace rationality in discussions about cybersecurity?

Moderator: Pavol Dovičovič
09:00
Jindřich Kalíšek , Cyber Security Commission
Cybersecurity between Scylla and Charybdis (15 min)
10:00
2sekcia3
9:20 - 10:00 Application Practice of the New Decree on Security Measures (hall LONDON I+II)

The new decree on security measures brings fundamental changes to the practices of entities subject to cybersecurity legislation. The discussion will focus on how the decree is reflected in real-world processes, what new obligations it introduces, and how it changes the application of rules in individual sectors. It will also address the transposition of the NIS2 Directive in the CEE region, the details of the changes presented by the National Security Authority, and the legal principle of "lex specialis derogat legi generali" in the context of sectoral decrees. The aim is to show not only the theoretical framework, but also the specific challenges and solutions that organizations encounter in practical application.

Moderator: Ivan Makatura

09:20
Jindřich Kalíšek , Cyber Security Commission
Štefan Pilár , Attorney
Marcel Zanechal , SLOVAK TELEKOM
Jaroslav Ďurovka , National Cyber Security Center
DISCUSSION "Application Practice of the New Decree on Security Measures"
9:30 - 12:30 Masterclass: Effective Protection Based on Attacker Knowledge (hall LONDON III)

To effectively defend your organization, you must first understand how an attacker thinks. MITRE ATT&CK for Enterprise is a globally recognized framework that describes attacker behavior in all phases of an attack. It allows you to map real techniques, identify weaknesses in detection, prioritize defensive investments, and build a strategy based on real threats - not hypotheses.

REGISTRATION ON MASTERCLASS

09:30
Milan Pikula , National Cyber Security Center, National Security Authority
The masterclass is accompanied
12:40
2sekcia9
10:00 - 10:45 Technological Trends in Cybersecurity (hall LONDON I+II)

Cybersecurity is evolving dynamically, and new technological trends are fundamentally changing the way critical infrastructure and organizations are protected. The focus is primarily on automation and artificial intelligence in threat detection, the development of cloud security, zero trust, and resilience to sophisticated attacks. The discussion will provide an overview of key innovations that are shaping the future of security strategies.

Moderuje: Pavol Dovičovič 

PARTNER OF THE PANEL IS COMPANY FORCEPOINT

FCP logo transparent

10:45
NETWORKING BREAK
09:20
2sekcia2
11:00 - 11:40 Change in Risk Doctrine (hall LONDON I+II)

Traditional approaches to risk analysis based on numbers and probabilities are no longer sufficient in times of complex threats and dynamic changes. The new doctrine shifts the emphasis to the qualitative dimension, which allows for a better understanding of contexts, identification of systemic weaknesses, and prediction of impacts that cannot be precisely quantified. This represents a fundamental shift in the professional community's thinking—from a rigid computational framework to a flexible and contextual assessment approach. Such an approach fosters interdisciplinary dialogue, facilitates faster adaptation, and enables more effective strategic decision-making. Are we ready to embrace this paradigm shift and start looking at risks in a whole new way?

Moderator: Ivan Makatura

11:07
Michal Hanus , Cyber Risk Tamer and Visionary
Anton Horváth , Expert
Aleš Špidla , Center for Information Competence Development, CEVRO University
Marek Zeman , Cyber Security Competence and Certification Center, CISO Club
DISCUSSION "Change in Risk Doctrine"
14:00
2sekcia10
11:40 - 12:20 Strategy for the Development of Quantum Computing and Post-Quantum Cryptography in Slovakia (hall LONDON I+II)

The panel discussion will focus on the future of secure communication in the era of quantum computers. Today's encryption algorithms, which protect electronic signatures, codes, and confidential information, are designed with the assumption of the limited computing power of classical computers. However, quantum computers can dramatically speed up the factorization of large numbers and the solution of discrete logarithms. QC thus paves the way for breaking currently commonly used cryptographic mechanisms. Participants will focus on the resilience of cryptographic algorithms for electronic signatures, also in the context of combining the capabilities of artificial intelligence with the possibilities of quantum computers. The discussion will therefore raise the question of how to ensure the protection of personal data and the integrity of communication in an environment where traditional cryptographic schemes are no longer reliable. The aim is to provide an overview of global trends, the standardization process, and the challenges of practical implementation of post-quantum algorithms, and to demonstrate the need to combine mathematical innovation, technological readiness, strategic decisions, and research and development funding. The post-quantum cryptography strategy in Slovakia will be a key part of the panel, which aims to show that cryptography is entering a new phase and that Slovakia must maintain security, trust, and anonymity in the digital world even in the era of quantum computers.

Moderator: Ivan Makatura
11:40
Stella Bulejková , Association of Critical Infrastructure of the Slovak Republic
A safer future for critical infrastructure (7 min)
11:54
Michaela Abel , Decent Cybersecurity
Anton Jelenčiak , Ministry of Investment, Regional Development and Informatics of the Slovak Republic
Matej Týč , Red Hat
DISCUSSION "Strategy for the Development of Quantum Computing and Post-Quantum Cryptography in Slovakia"
12:20
LUNCH
12:30
2deň - doplnené
13:20 - 13:50 Modern Tools for Combating Cyber Threats (hall LONDON I+II)
Slovakia is building its own ecosystem of tools to analyze, prevent, and respond to cyber threats. This block will present key solutions that shape modern defense in both the public and private spheres. MIRDI SR will present the development of the national platforms Afrodita, Achilles, and Ares, designed to detect vulnerabilities, visualize risks, and automate incident response. IstroSec will present the GRYPHON system, which uses artificial intelligence for advanced vulnerability assessment in enterprise environments. This block aims to show the synergy of public and private solutions in strengthening Slovakia's cyber resilience.

Moderator: Pavol Dovičovič
13:25
Alexander Valach , Ministry of Investment, Regional Development and Informatization of the Slovak Republic
Government response to cyber threats – three pillars of defense (7 min)
13:39
12:10
2sekcia8
13:50 - 14:50 Security in the School Environment (hall LONDON I+II)
The panel discussion will focus on protecting children, parents, and teachers from the risks posed by the digital space. It will not be about cybersecurity education, but about the safety of the educational environment itself. The Ministry of Education is currently preparing its own Risk Catalog, which will identify threats and offer tools to protect young people and their legal guardians from them. The discussion will raise questions about various types of cyber threats that negatively affect schools and educational institutions. It will also touch on the role of teacher training, as teachers must be able to recognize and address these threats. The goal is to create a picture of how to systematically protect the school environment and strengthen confidence in the security of digital education, and how to protect our children from the hundreds of threats in cyberspace.

Moderator: Pavol Dovičovič
13:50
Michal Danilák , Senior Consultant for Cyber Security
Catalogue of risks for children and young people in cyberspace (5 min)
13:55
Michal Danilák , Senior Consultant for Cyber Security
Marián Hamada , Ministry of Labour, Social Affairs and Family of the Slovak Republic
Tomáš Kelemen , FORTINET
Michal Rybár , Ministry of Education, Research, Development and Youth of the Slovak Republic
Milan Ráchela , Private Secondary Vocational School of Automotive Engineering Dual Academy
DISCUSSION "Security in the School Environment"
14:00 - 14:30 ITAPA MEET UP (hall LONDON III)

Facilitator: Miroslav Havelka
A space for open discussions at the table – no podiums or formal speeches. A small group, direct questions, and practical experience. Here you can raise objections, ask questions, and seek specific solutions. Each discussion lasts approximately 30 minutes. Capacity is limited to ~20 participants, so we recommend registering in advance.

14:00 - 14:30 How to (not) hack a car company or supply chain security

Incidents involving key suppliers are currently among the most serious yet underestimated threats to organizations' operations. The discussion will offer a detailed, factual analysis of specific incidents, unburdened by unresolved facts, in which the compromise or failure of a third-party-operated system can shut down a customer's essential services within hours. We will focus on fundamental weaknesses in supplier relationship management, architectural dependencies that become single points of failure during attacks, and risks that remain overlooked in practice, even in mature organizations. No marketing, no euphemisms – just practical insights from analyzing real-world incidents that can bring an entire business to a halt.

Speaker: Ivan Makatura, Cybersecurity Association

REGISTRATION ON MEETUP
14:00
2 deň - doplnené 2
14:50 - 15:10 Approaches to Adult Cybersecurity Education (hall LONDON I+II)
How can we prepare experts and the public sector for new threats in the digital space? What are the modern approaches to cybersecurity education, and why is it essential that they reflect the rapidly changing technological environment? New training programs, certifications, and practical tools aimed at building organizational resilience are linked to a trend in education that connects real incidents and attack simulations, shaping a new generation of security experts.

Moderator: Pavol Dovičovič
14:57
Róbert Bučko , Ministry of Investment, Regional Development and Informatisation of the Slovak Republic
The Human Factor: Risk or Solution? Strengthening National Resilience through Education (7 min)
14:45 - 15:15 ITAPA MEET UP (hall LONDON III)

Facilitator: Miroslav Havelka

A space for open discussions at the table – no podiums or formal speeches. A small group, direct questions, and practical experience. Here you can raise objections, ask questions, and seek specific solutions. Each discussion lasts approximately 30 minutes. Capacity is limited to ~20 participants, so we recommend registering in advance.

14:45 - 15:15 Private Cybersec Hub: Initial Asessment of Business Interest

The city of Bratislava is preparing an economic development plan in which cybersecurity plays an important role, including in connection with areas such as robotics, artificial intelligence, and dual-use technologies. In this context, the city wants to examine whether companies are interested in creating a privately funded research and innovation hub that emerges from the bottom up to meet market needs. The city's role is to facilitate coordination and support the conditions for its eventual formation, while, at a later stage, the hub could - similar to the AI institute KInIT - also partially use public resources. The mini-session will serve as an introductory discussion, during which the city will present its intention and open a space for an exchange of views to identify which companies are interested in continuing to develop the initiative.

Speaker: Iva Kleinová, City of Bratislava and Bloomberg Associates

14:45
2sekcia12
15:10 - 15:35 Security of Industrial Control Systems (ICS/SCADA) (hall LONDON I+II)
Operational technologies (OT), ICS, and SCADA systems control the physical processes that underpin energy, industry, and critical infrastructure. Unlike traditional IT systems, they have specific requirements: they must be separated from the internet, secured against external interference, and must never stop working—continuous availability is an absolute priority. This creates tension between cybersecurity requirements and the expectations of process owners. The discussion will focus on: the specifics of protecting OT/SCADA systems, the approach to security with the current requirement for continuous operation, vendor lock-in and limitations on modifications, examples of good practice, and recommendations for the public and private sectors. The discussion aims to show that OT security is not just about isolating systems, but about finding a balanced model between operation, availability, and cyber protection.

Moderator: Ivan Makatura

 
15:10
Branislav Adamkovič , U.S.Steel Košice
Martin Fábry , ACCURA
Róbert Mramúch , Manager of the Security and Crisis Management Department
DISCUSSION "Security of Industrial Control Systems (ICS/SCADA)"
15:35
NETWORKING BREAK
15:05
2sekcia13
15:45 - 16:05 Legislation from the Perspective of Technology Companies (hall LONDON I+II)
What does it look like in practice when legislation meets technological reality? New European regulations are influencing strategic planning and the implementation of cybersecurity solutions. Hear specific experiences from companies that must respond quickly to changing requirements and strike a balance between compliance and innovation. This legislation can be not only a challenge, but also an impetus for more efficient and secure technologies.

Moderator: Pavol Dovičovič
16:25
doplnene
16:05 - 16:20 A Strategy That Protects Data, Systems, and Reputation (hall LONDON I+II)

Today's cyber threats are faster, wiser, and more unpredictable than ever before. The likelihood of becoming a victim is high -it's not a question of if, but when. Fortunately, even if an attack cannot be avoided entirely, we can prepare for it so that it does not cause a catastrophe. The presentation will demonstrate how to leverage real-life experiences and best practices to develop a resilient strategy that safeguards your data, systems, and reputation. Because preparedness is not a luxury – it is a necessity.

Moderator: Pavol Dovičovič

12:30
doplnene cyber
16:20 - 16:50 Cybersecurity in Public Administration in the Age of AI (hall LONDON I+II)
The panel will focus on post-quantum encryption and new approaches to data protection that are resistant to attacks by quantum computers. It will examine the link between government cyber defense and national digital security strategies. The topic also includes the use of artificial intelligence in national defense, legislative challenges, and emerging threats. Attention will be paid to the transformation of authentication and authorization, as well as to the role of eIdentity in verifying users' true identities.

Moderator: Ivan Makatura
16:20
Jaroslav Ďurovka , National Cyber Security Center
Martin Hrachala , Ministry of Interior of the Slovak Republic
Milan Pikula , SK-CERT
DISCUSSION "Cybersecurity in Public Administration in the Age of AI"
14:30
2sekcia11
16:50 - 17:05 Reform of the Personal Data Protection Act (hall LONDON I+II)

The Slovak Data Protection Authority has announced a comprehensive legislative reform that will fundamentally change the privacy protection framework in Slovakia. The current Act No. 18/2018 Coll. will be repealed in its entirety and replaced by two new pieces of legislation. The discussion will provide insight into the expected changes, their impact on practice, and the preparedness of organizations for the latest personal data protection regime.

Moderator: Pavol Dovičovič

16:50
Zuzana Valková , Office for Personal Data Protection of the Slovak Republic
1on1 interview
12:00
2sekcia7
17:05 - 17:20 Strategic Autonomy in the Context of Cyber Diplomacy (hall LONDON I+II)

The one-on-one interview will focus on the new challenges and opportunities that the digital space brings to international relations, security policy, and the protection of national interests. At a time when cyber attacks transcend national borders, there is a need for coordination, negotiation, and trust-building between governments, international organizations, technology companies, and civil society. The discussion will raise questions about how Slovakia is engaging its capacities in European and global initiatives, what role diplomatic missions play in communicating cyber threats, and how partnerships with the technology sector can be created to promote the values of democracy, the rule of law, and the protection of citizens.

Moderator: Klára Jelínková

17:05
Radoslav Repa , National Security Office representative for cybersecurity and cyber diplomacy in Brussels
1on1 interview
17:20
ITAPA OPEN TALK - 2 deň
ITAPA OPEN TALK
17:20
doplnené druhý deň
17:20 - 17:30 Hybrid Operation (hall LONDON I+II)
Moderator: Michal Havran

REGISTRATION on ITAPA OPEN TALK
15:40
2sekcia14
17:30 - 18:30 Strategic Technology in Defense (hall LONDON I+II)

Cyber operations have become an integral part of modern conflicts. Military structures and alliance partners face attacks that target not only critical infrastructure but also communication networks, weapon systems, and logistics chains. The discussion will focus on questions such as how the nature of military operations is changing as a result of cyberspace, where military and civilian cybersecurity meet, and where cooperation is needed, what technological solutions can bring advantages in cyberspace, and how military experience can be transferred to the protection of the civilian environment and vice versa. The aim is to initiate a professional debate among military leaders, technology companies, and the civilian sector on how to effectively secure cyberspace at a time of growing threats from hybrid conflicts.

Moderator: Michal Havran

REGISTRATION on ITAPA OPEN TALK

17:35
Pavel Macko , security expert
AI in defense (10 min)
17:45
Pavel Macko , security expert
Monika Masariková , Security Expert
Martin Sklenár , Former Minister of Defense of the Slovak Republic
Tomáš Vobruba , Check Point
DISCUSSION "Strategic Technology in Defense"
18:30
Glass of wine
20:00
večer - 2 deň
PARTNERS OF THE DAY are companies ACCURA, ISTROSEC and REGFOR
 
Dizajn bez názvu (13)istrosec  regfor
18:00
EXPO ZÓNA
EXPO ZONE
Throughout the entire ITAPA Autumn 2025 event, we invite you to the EXPO zone, where our partners present their current initiatives and projects. It is an ideal space for conversation, questions, and networking with experts from the field.
20:00
ITAPA APP
ITAPA APP
Icon-192    logo-google-play    icon_appstore__ev0z770zyxoy_large_2x