Expert Track Agenda

Watch the cybersecurity experts’ presentations

Ask your question

The Cybercrime Pyramid

2020 was the infamous drama that touched everybody on the planet. Industries too were drastically affected by last year’s events, and will continue to feel the consequences of 2020 for many years to come. Cybersecurity is one such industry. Driven by cybercriminals’ actions, the threat landscape has changed dramatically. The general trends and dynamics of 2020 will continue throughout 2021 and later.

In this presentation we’ll review the ‘pyramid’ of cybercrimes in 2020 and 2021. Based on scams (including phone scams), in the middle of the pyramid we have ransomware affecting companies and governments around the globe. At the top of the pyramid we have ‘advanced persistent threats’ (APTs), which have been extremely successful in the last 18 months due to increased vulnerability on the defense side due to the pandemic.


Sergey Golovanov, Chief Security Expert, Kaspersky

Rethink Cloud Security to Innovate at Speed

Operating a hybrid, multi-cloud environment is different from yesterday’s world, and so is securing it. Join us in this session as we dig deeper into the security imperatives that organizations like yours face around the world, and hear about:

  • Interpreting compliance controls, assess and manage risk with prescriptive controls
  • Ensuring data-centric protection with a Zero Trust architecture
  • Managing threats across hybrid and multi-cloud and achieve continuous detection and response
  • Infusing security and privacy into your application migration and modernisation roadmap with DevSecOps, and innovating at speed


Sridhar Muppidi, IBM Fellow, VP & CTO, IBM Security
Abhijit Chakravorty, Partner & Cloud Security Competency Leader, IBM Security

Zero Trust: How Microsoft does it

We are at an inflection point now. With the move to hybrid work we will embrace a more flexible work model both in terms of where and when we work. We must adapt how we provide a great employee experience that is also secure. Fortunately, we know the solution and it called «Zero Trust». It means we don’t assume any identity or device is secure on any network — we verify it. This provides for a consistent and simplified experience from home, the office or anywhere in between.

What’s potential of Zero Trust Security to address a constantly-changing security landscape? Is it right for your organization? What are the challenges and obstacles your organization needs to overcome to make it a viable strategy? And is possible to develop and deploy modern cybersecurity model without trusting anyone. Let’s find it out together.


Artyom Sinitsyn, Security Program Manager for Central & Eastern Europe, Microsoft
CISSP, CCSP, MCSE, Certified Azure Security Engineer

Seeing through clouds: ways to regain data visibility and control during cloud migration

In this talk we will be covering common ways to establish data security program in SaaS and IaaS environments. We will discuss advantages and disadvantages of existing approaches and provide recommendations on how they can be combined in a single unified architecture.


Kirill Kasavchenko, Senior engineer, Netskope

Protection of API and micro-service infrastructure. What shall WAF be able to do?

The security requirements of modern web applications have changed. Today, almost all traffic on the web is API calls: IoT, mobile app backends, any single-page applications, B2B integrations and interfaces, back-end systems and services.

And, surprisingly, all of these things are a blind spot for legacy security systems. About 40% of vectors for attacks on web applications are API-related, and the old generation WAFs can’t provide high-level protection against such attacks.

So what should a modern WAF be able to do? What are today’s criteria for choosing a system to effectively protect API? Find out in the speaker’s report.


Ivan Novikov, CEO, Wallarm

Ask your question