About
Congress results 2019
News
Partners
Agenda
Useful information
Session broadcast
Photo gallery
Threat Zone
ICC 2018
RU
Photo gallery
June 20
June 21
Photo gallery
Session broadcast
Participants’ registration
Opening plenary session
The road to cyber-resilience – a walk together?
Panel discussion
Cybersecurity Strategies: Public Services
Panel discussion
Cybersecurity Strategies: Critical Infrastructure
Panel discussion
Cybersecurity Strategies: Telecommunications
Panel discussion
Cybersecurity Strategies: Financial Industry
Panel discussion
Cybersecurity Strategies: Disruptive Technologies
Topical session
Attributing Cyber Attacks
Topical session
Сyber security education in the nuclear and energy sector
Topical session
Customer is not always right
Topical session
Future vehicular mobility transition and its impacts on CyberSecurity
Topical session
Evolution of targeted attacks on the financial sector
Topical session
Legislating a borderless, ungoverned virtual world – is it possible?
Topical session
Building a global cyber ecosystem: the role of the academia
Topical session
Cybersecurity in digital chaos
Topical session
Islands of freedom: how universities become growth points of cybersecurity capacity
Topical session
Cybersecurity in the era of mobility: protect business by protecting ourselves
Topical session
Advanced Threat Trends
Topical session
Can Malicious Actors Be Held Accountable for Illegal Acts in Cyberspace?
Topical session
An incident. How to bounce high?
Topical session
Machine learning on the other side of cybersecurity barricades
Topical session
Investments – Risk, Return & Impact
Topical session
Cybersecurity Investment Opportunities
Topical session
Biometrics in Cybersecurity as an investment opportunity
Topical session
Innopolis – Special Economic Zone
Topical session
Ensuring cybersecurity of critical infrastructure
Topical session
Predicating the Unpredictable: A Look into 2019 Cyber Threat Landscape
Topical session
The use of prognostic and statistical analysis methods for automating the processes of predictive response to new cyberattack techniques
Panel discussion
Р2Р transfers – where is security?
HUB 1. Sberbank
Threat Intel automation: increasing the efficiency of proactive defense
HUB 1. Vulkan R&D
Practical cyber exercises
HUB 1. Autretech LLC
Detecting fraud in trading activities in financial markets: from expert rules to self-learning and AI
HUB 1. Qrate
Quantum communications as a response to new challenges
HUB 1. Swordfish Security
DevSecOps: Development process evolution
HUB 1. Oracle Russia
Offsetting the risks of transitioning to cloud-based technology
HUB 1. Perimetrix
Information-centric security model. Solutions and practical experience of Perimetrix in managing data after classification
HUB 1. UserGate
Using artificial Intelligence for information security of enterprises
HUB 2. Trend Micro
Hybrid data centers in the age of micro services: when is it too early and too late for security?
HUB 2. Huawei Enterprise
Current status and prospective ways of using artificial Intelligence to prevent cyber attacks
HUB 2. Cisco
How can you turn your network into a distributed security system? Seven practical recommendations
HUB 2. Vehicle Security Solution LLC
Connected car cyber security – new challenges
HUB 2. IBM
How we automated the phishing playbook
HUB 2. Rostelecom - Solar
SOC practice: processes, cases, examples
HUB 2. Microsoft Russia
World without passwords: modern ways of authentication of corporate users
HUB 2. Group-IB
Threat Hunting – innovative approach to detecting complex target attacks and monitoring the landscape of cyber threats