Opening speach

DSS ITSEC opening speach annualy performed by Deffence Minister of the Republic of Latvia
Raimonds Bergmanis Minister of Deffence of the Republic Of Latvia, Ministry of Deffence of the Republic of Latvia


Security Industry and Business Association greetings

{comment about session, theme]
Various prominent speakers …,


Malicious informations manipulation

All institutions, public and private alike, are fundamentally founded on the idea of trust on the information they operate on. What happens, when that trust is compromised? [expander_maker id=”1″ more=”Read more” less=”Read less”] Compromising information integrity, its trustworthiness, can have far more devastating operational effects than mere theft of information or denying access to it. It might cause an organization to make decisions based upon bad information or reduce customer trust in their platform or business. Cyberthreat, information manipulation, is all about that. In this session, we will get introduction to what information manipulation is about, some public cases already taken place and ideas on how to detect and prevent information manipulation. This session will also dig into problematics of countering information manipulation due lack of actors in cybersecurity understanding the actual information they are supposed to protect and the operations (e.g. processes) using that information to operate. A shift in thinking is needed from ICT-system security to actual security of information and processes [/expander_maker]
Jani Antikainen Chairman of the Board, Sparta Consulting & Huginn


Integrated Scoring and Awareness for Cyber Ranges. Strategy

The solution is based on eight years of research and experience in conducting complex technical cyber security exercises, including NATO CCDCoE “Locked Shields“, “Crossed Swords“ and other national and international exercises.
Aare Reintam Director, Locked Shields


IBM Security: Our Biggest Bet Yet

2018 has presented even more daunting challenges to cyber security professionals. Criminal innovation is thriving and the “black hats” are continually inventing new ways to improve profit and reduce the effort required to conduct their “businesses”. Meanwhile, the average time required and cost to detect and remediate breaches continues to escalate. [expander_maker id=”1″ more=”Read more” less=”Read less”] In this session, you will learn how IBM is “doubling down” on our cyber security investments in order to combat these threats–and those yet to emerge. [/expander_maker]
Mark Ehr Program Director, IBM Security


Coffee break



SCADA Cyber Security: The Paradox of Industrial Digitization

Much has been said and written about Information Technology / Operations Technology integration in the last decade. IT/OT network integration is generally assumed to go hand-in-hand with other kinds of IT/OT personnel and business process integrations. [expander_maker id=”1″ more=”Read more” less=”Read less”] Safety and reliability issues associated with IT/OT integration are often not discussed at all, or are at best dismissed as something “OT has to look after.” If it were only that easy. With every advantage gained through digitization, there comes a potential safety or reliability challenge – many of which relate to cybersecurity. This presentation introduces control systems and control system security issues for IT audiences. We look to the near term future examining how IT and OT networks must be managed differently, in spite of OT networks hosting essentially the same kind of network and computer components as do IT networks. Finally, we explore an emerging spectrum of options for safe IT/OT integration. [/expander_maker]
Motty Slomovitz, Director, Europe Waterfall Security


Cost Of Cyber Security Crime Study 2018

Intars Garbovskis, Security practice lead, Accenture Latvia


Skyrocketing Cybercrime: Reasons and Measures

Ilia Kolochenko CEO & Founder, High-Tech Bridge


Lunch break


The Artificial Reality of Cyber Deffence

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational tax on nearly every employed individual throughout the world. [expander_maker id=”1″ more=”Read more” less=”Read less”] Amazingly enough, attackers have reached a level of maturity and efficiency – taking advantage of the increased value and vulnerability of online targets, and resulting in a dramatic increase in attack frequency, complexity and size. In order to fight evolving threats, organizations need to implement the most adequate security solutions to fully protect against new threats and all types of attacks. Attackers are deploying multi-vector attack campaigns by increasing the number of attack vectors launched in parallel. In order to target an organization’s blind spot, different attack vectors target different layers of the network and data center. Even if only one vector goes undetected, then the attack is successful and the result is highly destructive. [/expander_maker]
Fabio Palozza, EMEA pre sales director, Radware


Using Behaviour Based Detection to Defeat Attackers & Insider Threats

Harri Ruuttila, Specialist Systems Engineer – Behavioral Analytics and Logging, Palo Alto


Security Testing: Lies, Truths and Little Secrets They Never Told You, from 20+ Years of Field Experience

Raoul “Nobody” Chiesa, President/ founder, Security Brokers ScPA


Coffee break



TOP 10 Ways to Make Hackers Excited: All About The Shortcuts Not Worth Taking


Tom Nowakowski
Security Expert, CQURE


Discussion Panel





Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.