Program - Spring ITAPA 2026
08:00
CYBERSEC DAY
Transitioning from sovereignty to security, the program for the first day, CYBERSEC DAY, reflects the dynamic evolution of threats in 2026.
Throughout both days, the ITAPA EXPO ZONE will feature interactive demonstrations of the latest innovations and MASTERCLASSES focused on practical skill-building in cybersecurity and artificial intelligence.
REGISTRATION
08:00
Registration
08:30
deň 1 - sekcia 1.0
8:45 - 9:00 Opening of the Conference
08:40
deň 1 - sekcia 2.0
9:00 - 9:15 Sovereign Artificial Intelligence for the State
Europe is currently engaged in discussions on digital sovereignty. Poland is responding by developing its own language model for use in state administration and public services. The opening keynote will explain why sovereign AI is becoming a new pillar of European security.
08:50
deň 1 - sekcia 3.0
9:15 - 9:30 A Resilient Nation: How to Protect State Data, Maintain Services, and Manage Crises in the Digital Age
A modern state must be capable of more than just cyber defence. It must protect its data, securely operate critical digital services, manage crisis situations, and respond to emerging forms of crime. This discussion will outline what it means today to build a truly resilient nation in an era of increasing digital threats and the growing dependence of the state on technology.
09:15
deň 1 - sekcia 4.0
9:30 - 9:45 How Europe Builds Sovereign AI: From National Ambition to Real Capacity
The future of AI will no longer be determined solely in laboratories and companies, but also by those who control infrastructure, data, and the rules. Europe has much at stake: its sovereignty, its security, and its ability to remain a relevant power in the digital age.
09:45
deň 1 - sekcia 4.1
9:45 - 10:00 When Reality Fades: Social Engineering and Digital Trust in the Age of AI
AI-generated content, bots, and automated manipulation are transforming the online landscape and security risks alike. How can we detect synthetic activity, protect users from a new generation of social engineering, and maintain trust in the digital space?
09:45
Domagoj Marić, Pontis Technology
Presentation and Q&A (15 min)
09:30
deň 1 - sekcia 5.0
10:00 - 10:10 Slovakia’s Response: What Steps Will Be Taken to Ensure AI Sovereignty at the National Level?
Following the European debate, the focus turns to Slovakia’s reality. Do we have a plan to be a creator in AI, or will we remain merely a consumer?
09:50
deň 1 - sekcia 6.0
10:10 - 10:30 Agentic AI as a New Attack Vector
AI agents are the new workforce - tireless, cost-efficient, and scalable. At the same time, they are being granted access, permissions, and the ability to act without human intervention, creating an entirely new security challenge. Through a case study, we will demonstrate how quickly an intelligent tool can become an attacker when autonomy outpaces governance.
10:10
Daniel Hejda, Ethical hacker, Cyber Rangers
DISCUSSION "Agentic AI as a New Attack Vector"
10:30
NETWORKING BREAK
10:20
deň 1 - sekcia 7.0
10:50 - 11:20 Cloud for the State: Greater Security or a New Dependency?
The cloud can help the state overcome its own outdated infrastructure. However, it can also render it dependent on technologies it does not control. This panel will examine where enhanced security ends and a new form of vulnerability begins.
10:50 - 11:20 Cybersecurity Technologies: Zero Trust Architecture 2.0
"Trust no one" has long been the mantra of cybersecurity, but by 2026, Zero Trust Architecture (ZTA) has evolved into a dynamic, AI-driven framework. While traditional ZTA relied on static policies—continuously verifying every user and device -the next generation leverages contextual and behavioral intelligence to make real-time decisions.
10:40
deň 1 - sekcia 8.0
11:20 - 11:40 When the Line Stops: The New Security Reality for Manufacturing Enterprises
In modern manufacturing, attacks are no longer confined to computers. They target the very continuity of operations. Every new integration, remote access point, or IT/OT convergence enhances performance - yet simultaneously increases the risk of production halts, supply chain disruptions, or extortion schemes where companies are forced to pay for their own operations. This panel will demonstrate where modernization ends and vulnerability begins.
11:20 - 11:40 Crisis Management and National Resilience: The Critical First 60 Minutes
11:10
deň 1 - sekcia 9.0
11:40 - 12:00 The Resilient Organization: Prevention, Preparedness, Detection, and Response
The best defense does not begin at the moment of impact, but long before it. This panel will demonstrate how people, technology, processes, and monitoring converge to build true organizational resilience - the capacity to preempt attacks, detect them in their early stages, mitigate their impact, and restore operations without collapse.
11:40 - 12:00 Mountain Safety/AI-Driven Physical Security for Facilities
Real-time AI avalanche forecasting, powered by advanced artificial intelligence, satellite imagery, and drones.
11:30
deň 1 - sekcia 10.0
12:00 - 12:30 The Future of Cybersecurity: Key Trajectories
A Discussion Among CEOs of the Most Influential Cybersecurity Firms.
12:30
LUNCH
13:30
deň 1 - sekcia 11.0
13:30 - 13:50 Keeping Government Online Under Attack
This is not cybersecurity theory; this is the autopsy of an attack on the digital state. Step by step, it will reveal the decisive factors in whether a government under pressure remains online or begins to fracture. Frontline experiences will uncover what truly works in a crisis - and which mistakes a nation can only afford to make once.
13:50
deň 1 - sekcia 12.0
13:50 - 14:10 When Failure Is Not an Option: How the State Builds Cyber Resilience
Today, a national cyber incident means more than just an IT outage. It can halt social benefits, disrupt financial flows, jeopardize sensitive data, and erode public trust. How are individual ministries preparing for these risks? What are their experiences in building oversight, response capabilities, and resilient operations for systems that the state simply cannot afford to shut down?
14:10
deň 1 - sekcia 13.0
14:10 - 14:30 Post-Quantum Security and Cryptography: How Crypto-Agility Becomes the New Competitive Advantage
The year 2026 marks a turning point in cybersecurity. Post-quantum cryptography (PQC) is transitioning from academic research to massive deployment, as the looming threat of future quantum computers - often referred to as 'Q-Day' -necessitates immediate data protection measures.
14:10 - 14:30 A Regulatory Storm in Cybersecurity
The government is responding to cyber threats by introducing new legislation. The AI Act has been added to NIS2, which now carries the threat of heavy fines. In addition, the Cyber Resilience Act (CRA) is currently being drafted. What is the structure of this legislation? What is its context and rationale?
14:30
deň 1 - sekcia 14.0
14:30 - 14:50 Human Safety and Security in the Age of AI
Cyber Fraud, Deepfake Scams, and Child Safety.
14:30 - 14:50 Is Slovakia Prepared?
According to current legislation and regulations, Slovakia requires more than 10,000 cybersecurity managers. However, the current reality stands at approximately 400 experts. This means that in most organizations, cybersecurity is either managed only formally or, in many cases, not at all. What is the solution?
00:00
deň 1 - sekcia 15.0
14:50 - 15:10 How to Meet Adequate Cybersecurity Requirements on a Limited Budget?
What are the minimum requirements organizations must meet to comply with NIS 2 and other regulations? According to the candid responses of survey participants, only a small proportion of organizations feel fully prepared for these changes. As a result, regulations have become one of the biggest sources of stress for IT and security management. How can this be managed on a minimal budget?
15:10
NETWORKING BREAK
15:20
deň 1 - sekcia 16.0
15:20 - 16:00 ITAPA Cybersec Round Table
A high-level discussion among key players in cybersecurity.
16:00
Glass of wine