expert seminars 2014 – analysis

Based on number of employees in the company:
13 %
Based on position in the company:
1 %1 % 1 % 1 %
2 %2 %
30 %
13 %
1 000 a více
or more
méně než 50
than 50
33 %
19 %
25 %
Based on company’s industry segment:
2 % 1% 1 % 1 %
2 %2 %
31 %
6 %
11 %
7 %
Public Administration
Státní správa
Wholesale and Retail
Velkoobchod a maloobchod
Processing Industries
Zpracovatelský průmysl
Chemical Industry
Chemický průmysl
Heavy Machinery Industry
Strojírenský průmysl
Automobilový průmysl
Security Technologies
Zabezpečovací technika
15 %
Popularity of presentations among listeners:
IT Manager
IT manager
IT Leader
Vedoucí IT
IS Admins
Správce IS
IT Consultant
IT konzultant
IT Specialist
IT specialista
IT Technician
IT technik
IT Architect
IT architekt
System Engineer
Systémový inženýr
Economist/Financial Analyst
Project Manager
Projektový manažer
College Professor
VŠ učitel
PR Presentations
Case Studies
Non-commercial Presentations
• partner presentations much comply or fit with the set topics for the event
• we welcome case studies: case studies are generally the most interesting and
most effective way to communicate with customers about products and solutions.
Customers can see themselves in the role of „product recipients“ and partners
„demonstrate“ the longevity/life-cycle of the implemented solution. Case studies
include the following basic information:
• description of the (customer) environment where implementation took place
• needs and requirements for the solution
• description of the solution (possible comparison with other solutions, description
of benefits)
• implementation process
• real benefits for customer
• future perspectives
• Panel discussions are an integral part of all seminars. It’s essential that partners
take part in the panel discussion. Panel discussions offer participants a means for
verifying their knowledge and experience gathered during the seminar.
• We ask that you please deliver documents (annotations, presentations, etc.) on
time, based on the agreed deadline!
• Do you work with an expert capable of giving an independent presentation? We
can provide you space for a free presentation during the theoretical part of the
seminar program.
The marketing part of the presentation cannot exceed 20%. The presentation must
focus on a solution. Pure product presentations are not popular (successful) among
The location is great and the whole event is very well
organized. The presentations are done professionally. To sum up in once sentence: I’m glad I’m here.
Wolfgang May, Barracuda
We regularly take part in the conference, ICT and
Security, together with our partners, for it involves
one of the most important, autumn security
events focused on the end user (clientele). DCD
Publishing, as the event organizer, guarantees
good participation, high quality presentations and
good overall event organization.
Lucie Stránská, Veracomp
We give the event a positive review – an interesting mix of participants from a sales point of view
and also as concerns the space we had for our
Tomáš Kvašňovský, HP
I am at one of these events for the first time, but
I give it a positive review. I like how it’s organized
as well as the number of participants and partners. I also like the event format, which combines
lectures and info stands, where you can run product demos. I also like the timely communications
about the event.
Jaromír Štěpán, Samsung
We liked the event’s interesting venue, the
excellent organization, keeping to the time limits
for individual presentations, the active audience,
the good technical equipment and the interesting
panel discussion at the end.
Maroš Mihalič, Novell
I liked the large number of participants; especially
those from larger companies. When I look around
the conference room, I feel that more people showed up than expected. A lot of people also visited
our info stand, so our impressions are definitely
positive. It’s good that we are visible among other
print solution brands. The event organization is
also very good.
Jindřich Balogh, Brother
I like the events as such. I give them a positive
review. I was pleased by the interesting structure
of participants. It will be interesting to follow the
events’ long-term benefits.
Jan Vituj, MyQ
I have to commend the organizers, because given
how many people there are in attendance, there is
no problem with space. The technical equipment
works fine together and everything runs according
to plan. The lectures are very interesting and
I haven’t come across any problems. The purpose
of my coming here – to find out something new –
has been met to a T. I have been at other similar
events – paid ones – and learned nothing. So from
my side: thumbs up!
Marin Jelek, Defense Ministry
I give the events a good evaluation. So far all
lectures have been very interesting. All organizational details have also been handled in an excellent
manner. I can boost my knowledge and skills
at the events; ones I use when planning further
investments in IT.
Vladislav Dvořák, Tradeco
Attending the conferences it a positive thing for
me, because I draw inspiration from it and the
lectures are the most interesting (part). The case
studies on virtualization had the greatest value
for me.
Filip Týc, ÚAMK (Žlutý Anděl / Golden Angel)
Product and company promotion shouldn’t take up
the majority of the presentation!
Jan Kuřík, Defense Minister
22 Apr. 2015
The volume of enterprise data continues to grow and as does its cost. Questions on efficient and secure data storage have come to the fore, as well as ones on backup, recovery and archiving.
This holds true for businesses and organizations of all sizes. However, the means, resources and tools may vary. The seminar will include not only theoretical and practical examples of
solutions for storing and archiving data; presentation of solutions and systems for intelligent work with data; but also the area generally called Big Data, which today is rapidly developing. Big
Data is an evolving term, which indicates a vast amount of data, procedures and technologies for storing, processing, analyzing and imagining/envisioning this data and the given results. The
aim of these processes is to extract new, synthesized and strategically- or otherwise-important information. Even though it might seem that Big Data is just a nice-sounding marketing term,
that’s not true. The analysis of information mined through the use of AI algorithms or collected by machines from Data Lakes, and which is constantly gathered in global networks as well as
in the information systems of businesses and public administrative offices, offer astounding results (benefits). In relation to society‘s growing „openness“ toward providing information and the
rapid growth in volumes of data gathered by machines, Big Data will definitely play an increasingly important role in decision-making and strategic processes for all organizations. Therefore,
it is important to become acquainted with the term, with means for mining data and using acquired knowledge, before the overall „boom“ comes.
Framework Program for Seminar
The seminar’s aim is not just to acquaint participants with the newest trends in technologies and methods for storing, backup and archiving of data by using networked, virtualized and virtual
storage servers, but also to connect, organically, the discipline of data storage with equipment and technologies for working with data. This includes mainly the newest analytical methods,
assessment and mining information contained in constantly growing volumes of unstructured data, i.e. Big Data.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations)
Evolution and trends in storing and processing enterprise data
Introduction to data storage and working with data
a. history of data storage from an information technology perspective
b. changing forms of information in businesses and organizations
c. growth in volumes of unstructured data
d. hierarchical approach to data storage and information life-cycle management
e. online storage (technologies and features)
f. storage networks (SAN) and networked storage (NAS); principles, technologies,
g. cloud storage (features and use)
h. data storage and backup as a business process
i. data storage server administration as a comprehensive activity
2. Big Data: how to handle unstructured information
Introduction to work with unstructured data
a. Big Data, areas of usage and related terms, creating and working with metadata,
b. Big Data platforms (Hadoop, et. al.)
c. basics of Data Management
Master Data Management, definitions, tools, solutions
artificial intelligence (AI)
normalization, rule administration, error detection and repair, consolidation
and deduplication, storage, distribution, classification, taxonomy services
identifying sources from which data is collected
cloud solutions: Information as a Service, BDaaS (Big Data as a Service), using
data from social networks Systems, Technologies and Solutions:
3. Resources and technologies for data storage:
a. disks and disk arrays
b. servers and storage systems
c. networked storage (NAS) and storage networks (SAN)
d. virtual and cloud-based servers
4. Software and systems for administration, management and use of data and data storage
a. data storage server and data administration
b. solutions for data storage and archiving
c. work with big and unstructured data
Case Studies:
5. Examples of realization and implementation of data storage servers, backup, archiving and
work with unstructured data, Big Data, etc.
Short presentation (approx. 15-20 min.) of implemented solutions
Presentation Structure:
description of (customer’s) environment, where the implementation took place
solution needs and requirements
solution description (possible comparison with other solutions, description
of benefits, shortcomings)
implementation process
real benefits for customer
future outlook
Panel Discussion
23 Apr. 2015
With the rapid development of use of smart mobile devices, smart phones, tablets and other mobile devices, the enterprise network has expanded to include a mobile component. Whereas
the administration of classic landline networks has been historically fixed and planned out, administration of mobile networks has begun to develop only recently. Meanwhile use of mobile
devices brings many new aspects and risks for enterprise information systems. Management of mobile networks and securing enterprise information systems in today’s mobile age (and
in the future as well) has become very important (if not fundamental), as regards growing cyber security vulnerabilities and cyber crime. The aim of this seminar is to broaden participants‘
understanding of enterprise information systems and enterprise networks beyond the enterprise; i.e. working in a space where use of mobile devices – mainly smart phones and tablets – has
become standard: whether it be employees doing their work or handling private/personal matters. The event will address not only legislative questions on use of mobile solutions and BYOD,
but also questions on security and management of mobile devices. This will also include handling said issues and looking at systems currently available and their features, as well as the issues
of implementation and specific trends in this area.
The seminar’s aim is to acquaint participants with current trends in using mobile devices; mainly smart phones and tablets – be it by employees at work or when they are sorting out
personal/private matters. The seminar will describe methods, specificities, risks and means of implementing mobility in businesses and organizations. It will address BYOD as a legislative
matter as well as questions on security and management of mobile devices. It will look at systems currently available for handling these issues as well as their features; in addition to
questions of implementation and trends in this field.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations):
Mobile devices in enterprise information systems
a. mobile devices as part of information systems
b. specifics and risks of integrating mobile devices
c. mobile device management
d. access to information, its management and implementation of security policy
e. ensuring secure usage and problems that might arise
f. trends and the future of using mobile devices in information systems
BYOD: use of private/personal devices for work purposes
a. definitions and types of BYOD
b. means and the specifics of integrating BYOD from the employee and employer
points of view
c. legal, legislative and organizational consequences for implementing BYOD
Systems, Technologies and Solutions:
3. Systems and solutions for enterprise mobility
a. systems and solutions for mobile device management in an enterprise
information system
b. securing information systems with mobile elements and devices
c. supervision of information systems with mobile devices
d. other enterprise mobility solutions Case Studies:
4. Presentation of successful implementation of mobility systems:
Presentation Structure:
description of (customer’s) environment, where the implementation took place
solution needs and requirements
solution description (possible comparison with other solutions, description
of benefits, shortcomings)
implementation process
real benefits for customer
future outlook
Panel Discussion
23 May 2015
Whereas not so long ago it was enough to install a computer network and connect user work stations to it in order to set up business information infrastructure, nowadays IT infrastructure
consists of a complex, hybrid environment that includes a wide array of systems: from your own infrastructure of local, enterprise and remote communications networks and their passive
and active elements to servers and various other devices on to services related to supervision, administration, management and security. Projecting and building enterprise ICT infrastructure
requires in-depth analysis of activities, information flows and organizational/business needs. It must take into consideration both current and future requirements, developments and objectives. Today a mind-boggling amount of means for setting up enterprise ICT infrastructure are available: from one’s own local solution to complete outsourcing and purchase of infrastructure
as a service. This seminar will acquaint participants not only with what current information and communications technologies, hardware and software offer, but also with processes for how
to evaluate and analyze your needs and future development properly. This will include review of tested, modern solutions; their features; characteristics and options that they offer. We will
also look at future development trends in ICT infrastructure.
Some of the most important current activities involving ICT infrastructure are modernization. expansion and partial or full renewal of ICT infrastructure. This seminar’s aim is to acquaint
participants with the features and options that contemporary ICT infrastructures provide, with modern methods for building local and extensive/broader enterprise ICT infrastructure,
options for virtualizing enterprise infrastructure, tools and solutions for supervision, diagnostics, management and administration. Last but not least, we will discuss trends and prospects
for the future.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations):
1. ICT infrastructure as an integral part of business activities.
Clarification of ICT infrastructure roles in the overall business or organizational structure as
an equal tool for achieving work/activity goals:
a. enterprise infrastructure and its evolution
b. definition of infrastructure and its parts
c. outsourcing ICT infrastructure, ICT as a service, cloud
d. administration and management of enterprise ICT infrastructure
e. security for enterprise or organizational ICT infrastructure
f. virtualization of enterprise infrastructure
Systems, Technologies and Solutions:
Data networks, basic part of enterprise infrastructure
Building a data network:
a. local (LAN) and wide-area (WAN) networks
b. network administration, managed LAN/WAN, network outsourcing, network as a service
c. passive and active network features
3. Performance elements of ICT infrastructure
a. servers, server systems, clusters, etc.
b. data storage servers, disk arrays, etc.
c. specialized infrastructure elements/features (networked phone switchboards, IP telephony systems, infrastructure elements for information sharing, video-conferencing systems,
d. tools for ICT infrastructure virtualization
e. other enterprise ICT infrastructure components
4. Tools and solutions for ICT infrastructure analysis, diagnostics, supervision, administration,
management and security. SW tools for ICT infrastructure administration, management and
Case Studies:
5. Examples of realization and implementation of DMS:
Short presentations (approx. 15-20 min. each) on an implemented solution
Presentation Structure:
description of (customer’s) environment, where the implementation took place
solution needs and requirements
solution description (possible comparison with other solutions, description
of benefits, shortcomings)
implementation process
real benefits for customer
future outlook
Panel Discussion
09 JUNE. 2015
Enterprise document management is a topic that has so far mainly been overlooked, particularly by smaller businesses and organizations. However, as the amount of time needed for
business activities grows and expands, document management, distribution and presentation continue to grow in importance. Whereas several years ago it was enough to share a hard disk,
it is practically impossible to get by without a quality system for document management (a DMS) organically integrated into an entire enterprise or organizational information system. This
seminar loosely builds on other seminars on print solutions and data storage and expands their content to include processes for working with electronic documents. The seminar’s aim is to
acquaint participants (both theoretically and practically) with the current and future states of working with electronic documents, resources, systems and tools for document administration
and flow, storage, archiving, search and other parts of DMS.
The seminar’s aim is to explain how inclusion of document management is an increasingly important part of enterprise information systems. The seminar also looks to acquaint participants
with how to work with e-documents, resources, systems and tools for document administration and flows, storage, archiving, search and other DMS components.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations):
Case Studies:
5. Examples of DMS realization and implementation
1. Past, present and future of enterprise document management:
a. Brief introduction to the topic of document management systems (DMS)
electronic documents and their administration
definition of DMS, activities, roles and objectives
DMS structure and components
b. how DMS tie into enterprise information systems
c. DMS and unified communications (UC)
d. options for setting up DMS
e. DMS and mobility
current status and newest development trends in DMS
2. Standardization in enterprise document management
a. standards, their roles and important in enterprise document management
b. standards used today and future ones (i.e. ISo 12651, ISo/TC 171, ISo 9001
and others)
c. how to achieve compliance with standards?
Presentation Structure:
Systems, Technologies and Solutions:
Panel Discussion
3. Technical resources for DMS:
a. technical resources for storing and archiving documents (data storage servers, disks,
disk arrays, etc.)
b. DMS infrastructure
c. servers, server systems, clusters, etc.
d. mobile DMS components
4. Software and solutions for DMS:
a. solutions for smaller DMS components (storage, secure archiving, search, etc.)
b. comprehensive systems and software for enterprise document management
c. mobile DMS solutions
description of (customer) environment, where the implementation took place
solutions needs and requirements
solution description (i.e. comparison with other solutions, description of benefits)
implementation process
real benefits to customer
future outlook
Laws and Legislation:
6. Legislative and legal aspects of enterprise document management
a. legislative requirements when working with electronic documents (acts on electronic
requirements, paper vs. electronic documents)
b. legal aspects of administration and archiving of e-documents (validity and reliability
of documents, use of e-documents in administrative and legal procedures,
reliable archiving, etc.)
17 June 2015
Cloud is without a doubt a contemporary phenomenon and also one of the near future. One can look at the cloud from many angles, in many aspects, as regards a business or organization.
Many of these aspects have been discussed and addressed in the past. Cloud, as with any other model of providing information and communications technology services, represents one
of many possible approaches for businesses and organizations to obtain optimum ICT services in all regards: financial, user-facing and quality-wise; in the best possible way. So let’s look at
the cloud, not from the perspective of definitions and the most frequently quoted marketing buzzwords, but rather as one way to implement ICT services in a business or organization. The
seminar will provide relevant information mainly to businesses and organizations as future users of ICT and cloud-based services; whether realized locally (private and hybrid cloud, enterprise
data centers) or when buying from third party suppliers of ICT and cloud services.
The aim of this seminar is to acquaint participants with the possibilities that the cloud provides, and does not provide. They will learn about ways of implementing cloud solutions on their own
and when working with third parties, about ways of putting together cloud solutions and, last but not least, about cloud-based services, their benefits, insufficiencies and management. The
seminar will provide a comprehensive basis both for decision-making on when and how to use the cloud and cloud-based services, as well as basic information to persons considering a move
to cloud-based services or implementing them.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations):
1. IT as a Service, cloud as one of the options for handling enterprise ICT
ICT not from the perspective of cloud-based principles, but rather from the perspective of
using it as a solution for building enterprise IT:
a. cloud, IT as a Service, definitions and basic terms (cloud, managed services)
b. types of clouds (public, private, hybrid), features and areas of use
c. public cloud (provision, options, advantages, challenges)
d. Managed Services – features, usability, strengths
e. cloud vs. local ICT solutions as concerns options, features, realization, usage value, management, operations
f. economic aspects of using ICT and cloud services, financial comparisons
g. security aspects of cloud-based ICT solutions
Systems, Technologies and Solutions:
Resources and solutions for implementation of private and hybrid clouds.
Tools and resources for virtualization in businesses and connecting private and public clouds
Public ICT and cloud-based services for businesses and organizations
ICT and cloud-based services available in the CR
Moving businesses to cloud-based services and management of ICT provided by third parties
Tools, resources, experiences from the move to using ICT as a Service and to the cloud
and means for managing ICT provided by a third party
Case Studies:
5. Examples of realization and implementation of outsourced ICT services:
Short presentations (approx. 15-20 min. each) on implemented solutions
Presentation structure:
description of (customer’s) environment, where the implementation took place
solution needs and requirements
solution description (possible comparison with other solutions, description
of benefits, shortcomings)
implementation process
real benefits for customer
future outlook
Panel Discussion
24 Sept. 2015
The role of ICT is to provide services. ICT services are one of the tools for running a business‘ or organization’s activities or for running manufacturing machines, finance departments or
building administration. In order for ICT to provide proper services with minimum costs, it has to be managed properly. ICT and ICT services management (ITIL, COBIT, standardization in
compliance with ISO 20000, etc.) are very quickly becoming strategic affairs that the leadership of any business or organization has to deal with. They have to implement them or will have to
do so, to some degree, in the future. There is a difference between an IT project, whose aim is to build IT infrastructure, and an ITSM project, whose job is to ensure that ICT is used properly
and provides the right services at minimum cost.
The seminar’s aim is to acquaint participants with the importance of managing information and communication technologies (IT Service Management, ITSM), to present ITSM as an
important, independent discipline, to acquaint listeners with the basic approaches, principles, processes, methods, frameworks and standards in the field of managing ICT, i.e. ITIL,
COBIT, ISO 20000, etc. The seminar’s task is to prepare a comprehensible, transparent and sufficiently thought out platform that will serve in the eventual implementation of ITSM in an
organization or company; or for further dissemination of knowledge in the field of ICT management. Participants will also learn about tools and technologies for introducing and implementing
ITSM and the benefits of implementations that have already been done.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations):
1. Principles of ICT management
Introduction to the topic of managing information and communication technologies, definition
of terms and principles:
a. basic terms for ICT management (ICT, ICT infrastructure, ICT resources, ICT services
and their relation to the cloud)
b. management and processes (functional, process, project)
c. history and evolution of ICT management
d. ITIL, COBIT, principles, frameworks, methods, standards for ICT management
(BS 15000, ISO 9000, ISO 20000, etc.), relationship to other standards and methods
e. implementation methods and principles (Six Sigma, Balanced Scorecard, PRINCE 2,
f. certifications and trainings in the field of ICT management
2. Methods and principles for managing ICT in organizations and businesses
Summary of basic principles and processes that are currently used when implementing ITSM;
definition and clarification of relationships between the realization team, the company leadership and employees, implementing ITSM and the associated risks
3. Training and certification in the field of ITSM:
a. certifications and ITIL, COBIT certification schemes, etc.
b. who to train and how, requirements for educating and training employees
c. course and certification authorities
Systems, Technologies, Solutions:
4. Tools and platforms for implementing ITSM
Description of platforms, technologies and software used for introducing, implementing,
auditing and managing ICT
5. Courses and training
Case Studies:
6. Examples of successful implementation of ICT solutions and support for ICT solutions as part
of projects.
Presentation Structure:
description of (customer’s) environment, where the implementation took place
solution needs and requirements
solution description (possible comparison with other solutions, description
of benefits, shortcomings)
implementation process
real benefits for customer
future outlook
Panel Discussion
22 Oct. 2015
Print solutions are hardly just shared printers connected by a computer network. They are an integral element of document and content management systems that are closely connected
with the majority of other processes in a business or organization. This seminar’s aim is to provide a comprehensive view of printing options that contemporary print solutions offer and of new
print technologies that lead to simplified printing for users and administrators and also lead to financial savings and protection of the environment. The seminar will also explore the means and
paths for integrating printing solutions with enterprise systems for document and content management, the benefits and savings that the proper and adequate introduction of such solutions
afford and the means and paths for implementing and managing the solutions. It will look at problems and obstacles that arise when designing, managing and integrating such solutions.
This seminar loosely builds on the seminar „Enterprise Document Management and Enterprise Information Systems“. The seminar’s aim is to look at printing solutions as a comprehensive
part of enterprise information systems and their tie-in to enterprise systems for document and content management. It will present new print technologies, means and principles of handling
enterprise printing, integration of enterprise print solutions into enterprise systems for document management and enterprise print management. The seminar will also address issues
such as savings on enterprise print and environmental protection, which today are integral parts of any print solution. The event will also pay special attention to security and the privacy of
enterprise printing.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations)
1.Old and new print technologies.
Overview of new, modern print technologies, mainly from the perspective of features, costs,
savings and environment protection
2. Means of handling print activities in businesses and organizations.
Print solutions from the perspective of various aspects of modern print solutions for enterprise printing:
a. distributed and centralized printing, Managed Print Solutions
b. multifunctional devices and processing documents
c. wireless and mobile printing
d. means of creating (designing) print solutions
e. administration and management of print processes
f. document management, document distribution
g. security and privacy when printing (approaches to print and printed documents)
h. monitoring documents, protection against attacks on mobile and distributed printing,
private printing using the network
i. print in heterogeneous environments
j. administration of print drivers, universal drivers, print platforms
k. issues of maintenance, the environment, eco friendliness, recycling/waste management
Systems, Technologies, Solutions:
3. Print solutions, their implementation and integration with enterprise systems for document
Main lecture block, presentation of various print solutions with an emphasis on features that
distinguish them from others:
analysis of printing environments, optimization, solution design
mobility and print solutions
outsourcing, leasing and solution rental
financing print solutions, cost monitoring, ROI, savings
resources for implementing secure print environments
service levels for various forms of implementing print solutions, benefits and risks for
the customer
integration of print solutions with enterprise systems for document management
and content management
systems and tools for administration and management of print solutions
Case Studies:
4. Examples of successful implementation of print solutions
Presentation Structure:
description of (customer’s) environment, where the implementation took place
solution needs and requirements
solution description (possible comparison with other solutions, description
of benefits, shortcomings)
implementation process
real benefits for customer
future outlook
Panel Discussion
12 NoV. 2015
Security is increasingly viewed as a system issue. It is standardized and implemented in compliance with systematic, generally valid rules. It is measured and audited. It has become
a discipline that is no longer seen as separate from information and communications technologies. It is an integral and essential part of the latter. Threats and attacks change constantly.
Long-term threats appear more and more; they are prepared strategically with a specific target in mind. Meanwhile, the significant growth in worker mobility brings new, up-to-now-unknown
or underestimated aspects (of security) to the field of ICT. A further non-negligible factor is the decreasing perception of risks on the part of internet users in general. This is caused on one
hand by social networks and their mass usage, and on the other by many times, indiscriminate pressure from software makers (mainly makers of mobile devices) to provide various data, i.e.
location. The topic of ICT security is generally very broad, for the spectrum of undesirable activities and means by which hackers can penetrate a system is vast. The number of security risks
has grown rapidly with growth in the scope of services that ICT systems provide.
The seminar’s aim is not just to describe specific security solutions, either hardware or software, but also to provide information on security from a more general perspective; explaining
the issue of ICT security as a discipline and to set a certain level of perception of protective information systems overall. This later helps with the better implementation or update of security
(solutions) in the organization, for each security solution covers a specific set of protective elements. The seminar will also touch upon global issues of legislation, rights, liability (including
criminal law). Last but not least, it will provide an evaluation of the implementation and impact of the Cyber Security Act on overall ICT security, i.e. at a time when the law will have been in
effect for almost one year.
Framework Program for Seminar:
General, Theoretical Section (meant only for non-commercial presentations):
1. ICT security as a systematic discipline
Description of possible threats, spots or areas in the organization’s information system that
are potential targets for attacks, reasons for attacks, principles and means of protection.
Systematic protection in ICT:
a. theft and misuse of data, reasons, targets and consequence, means of defense
b. social engineering and protection against it
c. aspects of ICT crime for various types of organizations (banks, state administration,
industrial espionage, etc.)
d. human factor and its role in ICT security, liability, its enforcement and sanctions
e. strategies, principles and technologies for security management (security oversight,
security audits, content, benefits)
systematic approach to securing enterprise ICT
g. training employees in the field of security
2. ISo 27000 standard and its relation to ICT security
Standardization in the area of information security, description of standards and related standards, their meaning, how protecting information relates to business
Systems, Technologies, Solutions:
3. ICT security in businesses and organizations
Main block of lectures that will present real possibilities for enterprise security. Main topics
will include
a. implementation and management of security in the organization, security documents
and related activities
b. secure mobility and BYoD (security for mobile devices, security for mobile access,
measures, tools, resources and systems for protecting mobile devices, views and
approaches to mobile security from the company or organization’s perspective
c. crisis solutions
d. outsourcing and third party security solutions
4. Tools and systems for implementing security requirements
Hardware, software and other tools, systems, platforms for implementing security (solutions); both comprehensive and single-purpose
a. authentication, verification and secure access
b. securing ICT system components
c. security appliances (HW systems for securing ICT systems)
d. software for authorization, authentication and security administration
e. VPN, firewall security and perimeter, border security, etc.
content security (anti-virus, filtering web content, anti-phishing, protection against
attacks on servers, security during message transmission, etc.)
g. protection against infiltration, against attacks, data theft and misuse
h. cloud security solutions, cloud security gateways, etc.
Legal Aspects:
one year of applicability for the Cyber Security Act and news on legislation relating to ICT
security. What did the Cyber Security Act change, how did it change perceptions on and implementation of ICT security (policies, solutions) and news on legislation and laws that relate
to ICT security
Panel Discussion
Standard Partner Benefits
General Partner
Main Partner
Sponsoring an
Independent Lecture
140,000 CZK
75,000 CZK
50,000 CZK
Logo on the e-invite, logo on the seminar webpage (will remain there after the event), logo at the event venue, logo in the printed event report, exhibition stand in the foyer at
the venue (for two company representatives), inclusion of promo materials in participants‘ bags, internet connection during the event, discount on presentation in Professional
Computing magazine
Logo and exhibition stand in
the foyer at the venue
45 min
30 min
Roll-up Stand in the Conference Room
Comparison of Lecture Evaluations for All Partners
Expert Presentation
Database of Seminar Participants
VIP Entry for Your Customers
Advertisement or Technical Article in the Event Report (210 x 297 mm)
Above-standard Partner Benefits
Showing of an Ad Video
General Partner
Main Partner
5,000 CZK
Own bags with own branding for all participants (bags will include promo materials
from all event partners)
Distribution and processing of your own questionnaires (5 questions max.)
10,000 CZK
5,000 CZK
Creation of a presentation + its presentation by an expert – with your company logo
Per Agreement
Sponsorship of an independent lecture
Per Agreement
Per Agreement
DCD Publishing, Lublaňská 21, 120 00 Prague 2, Tel.: +420 224 936 895; Fax: +420 224 936 908,
Sales Department
[email protected]
+420 224 936 895
Magdaléna Čupková
[email protected]
+420 602 555 899
Lenka Hortvíková
[email protected]
+420 602 275 955
Kamila Jurošková
[email protected]
+420 606 761 824
[email protected]
+420 724 667 750
Events Coordinator
Petra Beranová
You can find photographs from all DCD Publishing events on