We invite
you to participate
in the
Security First CEE conference!

Computerworld magazine ISSA Polska, ISACA Warsaw and Katowice Chapters invite you to the online cyber security conference. The idea of the conference is to increase managers' knowledge about IT security, which in the new reality is more challenging for enterprises than ever before.

Information security has become a critical factor for the operation and development of businesses in almost every industry, which is why it is so important to share the experience of those involved. We want our experts and participants to create a platform for the exchange of knowledge, which they can use to develop their business safely.

The conference will be held entirely in a virtual formula with the use of interactive technologies, thanks to which there will be no shortage of LIVE interviews, chats with participants and, above all, a large dose of knowledge about IT security, which will be provided by the best practitioners live on stage.

This year edition is international in scope, covering Central and Eastern Europe, including: Poland, Hungary, Romania, Czech Republic, Slovakia and Bulgaria, but also Lithuania, Latvia and Estonia. The conference will be held in English.

Security First CEE Online is:

Meet first speakers of the conference:

Viktorija Česonytė

Security Compliance Manager, Vinted

Łukasz Chudyga

Director of ICT Bureau & Cybersecurity Products, T-Mobile Polska S.A.

Sebastijan Čutura

CISO Community and Cyber Resilience Manager, European Cybersecurity Organisation (ECSO)

Paweł Dobrzański

Chief Security Officer, Security Tribe Lead & Counter Espionage Officer, T-Mobile Polska S.A.

Fatih Emiral

CISA, CISSP, CIA, OSCP, ISO27001 LA, ISACA Istambul Chapter

Michał Kurek

Head of Cyber Security in Poland and CEE/Chapter Leader, KPMG/OWASP

Mirosław Kutyłowski

Professor at Department of Fundamentals of Computer Science (Faculty of Information and Communication Technology), Wrocław University of Science and Technology

Jan Marek

Co-founder, Red Teamer, DFIR, Cyber Rangers

Grzegorz Nocoń

System Engineer, Sophos

Cezary Wieczorek

Vice President, Cloudware Polska

Candid Wüest

VP of Cyber Protection Research, Acronis


Conference Host:

Jaroslaw Kuzniar

Journalist, lecturer, CEO, Kuźniar Media


Practical Threat Hunting with SIEM.

Fatih Emiral - CISA, CISSP, CIA, OSCP, ISO27001 LA, ISACA Istambul Chapter

Our current cyber security paradigm dictates that we must assume the attacker is either already in our network or forcing its doors every chance it has. That makes threat hunting one of the routine periodic (if not continuous) security operations today. The need to monitor the endpoints is ever increasing, however, that does not diminish the value of network wide analytic reviews to identify the potential culprits in our networks. SIEM is still and it will be an essential tool for monitoring our networks, although it is not enough all by itself. The strongest capabilities of a SIEM tool are its analytic aggregation functionalities and stream processing of real life data. With those capabilities we are able to identify some of the real time malicious activities and analyze the past event patterns which are good signs of malicious behavior. Like any tool SIEM is only as effective as it user's skills. In this session we go through various use cases of a SIEM tool to demonstrate how we can identify suspicious activities and their sources. In those cases we will also testify the importance of understanding offensive techniques for an effective blue team.

Anamorphic Cryptographic Schemes: Opportunities and Threats.

Mirosław Kutyłowski - Professor at Department of Fundamentals of Computer Science (Faculty of Information and Communication Technology), Wrocław University of Science and Technology

Cryptography is treated as a golden bullet for data protection. We not only trust its formal security proofs but also believe that the products delivered are the products described. Unlike in many other application areas, inspection possibilities might be limited, for example, due to the necessary protection of secret keys. There are a growing number of examples in which a cryptographic device behaves according to specification A, but at the same time implements hidden functionality B, which is undetectable to an observer. This can be used for good but also for malicious purposes. We discuss this issue and try to find where we are today. 

CaaS – Cybersecurity as a Service.

Łukasz Chudyga - Director of ICT Bureau & Cybersecurity Products, T-Mobile Polska S.A.

Paweł Dobrzański - Chief Security Officer, Security Tribe Lead & Counter Espionage Officer, T-Mobile Polska S.A.

Nowadays the world of cybercrime generates millions of different and ever-changing threats. The post-pandemic reality, the situation related to the war in Ukraine, as well as the growing sense of cyber threat, accompany companies at every step they take. Covering all areas of vulnerability to cyber threats has become extremely difficult, and sometimes even unattainable. The contributors include barriers such as the poor availability of experts and the costs related to the appropriate diagnosis, acquisition and deployment of the best cybersecurity technologies. During the lecture, we will tell you how to build an effective environment to fight cyber threats.

Even the antivirus and EDR can be successfully bypassed by an attacker.

Jan Marek - Co-founder, Red Teamer, DFIR, Cyber Rangers

Antivirus is now a necessity and EDR is becoming standard. These two layers of defense are definitely needed in every organization's environment. But what can an attacker do in the network even if he has to go through these secured systems? And what role does user and administrator behavior play in this? This is the subject of my presentation full of practical examples.

OWASP flagship projects – cure for application vulnerabilities.

Michał Kurek - Head of Cyber Security in Poland and CEE - KPMG, Chapter Leader OWASP

Application security vulnerabilities are currently one of the biggest risks for enterprises. OWASP community strives to decrease this problem through the implementation of various projects. During the presentation, the latest changes in the flagship OWASP projects will be discussed. The presentation will be full of practical tips on how OWASP resources can be used in the development of applications, their maintenance or security verification.

Process automation as a way to ensure constant improvement of defense mechanisms.

Grzegorz Nocoń, System Engineer, Sophos

Along with the expansion of the IT infrastructure, the number of tools used by administrators increases. In the entire flood of information and events - are we able to find those that have a significant impact on our organization from the point of view of security? What are the advantages of solutions working on the basis of an integrated ecosystem which is to serve not only the exchange of information about threats, but also automatic response in order to enforce an appropriate level of security? Do XDR class solutions allow us to see the full picture or is it better to use the knowledge and experience of third parties and people?

Why is there a lack of cooperation among cybersecurity communities at the EU level?

Sebastijan Čutura - CISO Community and Cyber Resilience Manager, European Cybersecurity Organisation (ECSO)

Adversaries and attack vectors are constantly increasing in numbers making it difficult for organisations to single-handedly protect against threats. Organisations do not have a pool of expertise or tools that could provide adequate coverage. What can be done to improve cyber resilience in a cost-effective way?  Cross-border and cross-sector cooperation with a timely exchange of information between organisations in Europe should be sought. Cooperation already exists on the national and regional level but lags behind at the EU level.  Private sector has threat intelligence and is often on the first line of defense. If public sector established communication channels (e.g. EU CSIRT Network), why companies wouldn’t do the same?  This is even more important when considering that economies and companies in the EU are often interconnected through wide supply chains. Breach in a company in one country often spill-overs to the company in another country. Proactive and timely cooperation can limit the potential of consequences. How to improve the cooperation between cybersecurity stakeholders? What are the current existing regimes, mechanisms and good practices of information sharing? What are the incentives for cooperation and eventual risks in forming partnerships? What is the role of European Cyber Security Organisation in facilitating cooperation at the EU level? Presentation will seek to answer these questions.

Transitioning Information Security from scaring to caring: implementing positive internal culture.

Viktorija Česonytė - Security Compliance Manager, Vinted

About secure identity management 3.0, i.e. IdM and IBM Cloud Pack for Security.

Cezary Wieczorek - Vice President, Cloudware Polska

Trust – the outsourced insider problem.

Candid Wüest - VP of Cyber Protection Research, Acronis

The easiest way in – is via your trusted partner. Abusing the relationship of trust is one of the most important weapons in cybercriminals' arsenal. Software supply chain attacks, hijacked MSP tools as well as compromised supporter accounts are getting more common. Especially MSPs have become the focus of cyber-attacks. Despite the common “why would anyone attack me” mentality, they are a perfect target for any cybercriminal. In this session, the main topics of trust will be discussed using real example cases and solution approaches presented. We will highlight where companies put too much trust into the IT infrastructure and where the common blind spots are abused, including ransomware attacks and data exfiltration. 


  • Zero Trust Model as a response to minimizing internal risk in the European enterprises
  • Securing distributed data - how to deal with the new model of data processing
  • Risk management vs. cybersecurity
  • The role of the human factor in IT security
  • How to plan expenses for infrastructure and cybersecurity solutions
  • Cyber Resilience - a concept that could change the approach to cyber security in times of information wars
  • Cloud migration - threats and security
  • Security Operation Center - is it also a solution for your organization?
  • Effective backup in the organization - good practices
  • How to manage cybersecurity at remote work
  • Securing data at the network edge - Edge Computing Security
  • Automation of security processes - is it an answer to the growing demand on the labour market for IT security specialists
  • Artificial Intelligence - perspectives of development and use of AI technology in security operations
  • Security of 5G services with their growing importance in business
  • Prevention of Insider Threats in your organisation
  • Phishing automation - how to deal with increasingly automated solutions from cybercriminals
  • Supply chain security - the growing importance of new solutions

Participation in the Security First CEE guarantees 7 points for the following certificates: CISSP/ CISA/ CISM/ CRISC/ CGEIT


Participation in the role of a Partner is a unique opportunity to present experiences and solutions to practitioners of the cyber security area. Please have a look and familiarize yourself with our proposal.


Become a partner

Photo Gallery of last edition

Video Relation of last edition

We particularly wish to invite:

  • CSOs and managers responsible for information and communication security
  • Managers who want to understand the latest threats and how to counter them in order to protect the interests of their organisations
  • Persons responsible for the administration of networks and systems
  • Experts responsible for business continuity and crisis management
  • Information security consultants and experts
  • Persons responsible for the purchase of cyber security services and products
  • IT Security providers


Content-related Cooperation

General Partners

Strategic Partners

Partnerzy merytoryczny

Media Patrons


Filip Walicki
Tel. 662 287 904
[email protected]

Piotr Fergin
Tel. 533 358 952
[email protected]

Włodzimierz Duszyk
Tel. 662 287 870
[email protected]