SoftwareOne logo

Cybersecurity Forum 6ᵗʰ Edition: Defend the unpredictable

Cybersecurity Forum 6th Edition logo

In-person and online

Cubex Centrum Prague, May 27, 2026, 9:30 – 17:00 CEST

Defend the unpredictable.

In these volatile times, the only certainty is uncertainty.

AI-powered attacks, identity threats, geopolitical shifts and disruptive tech are not just reshaping the digital landscape – they are making it increasingly unpredictable.

This chaotic environment places a heavy burden on security teams, who are tasked with continuous adaptation while securing vulnerable legacy systems.

Join cyber experts and industry leaders at the 6ᵗʰ Annual Cybersecurity Forum to discover how to optimize defenses, stay ahead of emerging threats and maintain resilience in an unpredictable world.

Woman's face partially illuminated by swirling, ethereal blue light

Today’s threat landscape in numbers

  • 100

    trillion security signals processed…

  • 4.5

    million new malware files blocked…

  • 38

    million identity risk detections analyzed…

  • 5

    billion emails screened…

by Microsoft,

every single day.

Secure your place today.

Attend in-person at Cubex Centrum Prague or online, May 27, 2026, 9:30-17:00 CEST.

Advanced registration now open. Register today to be the first to hear about special guests and workshop content.

Detailed event agenda coming soon.

Cubex Centre Prague is an award-winning venue with cutting-edge technology, flexible spaces, and eco-friendly design. Hosting conferences, meetings, launches, and galas, we guarantee a seamless, professional experience. Located in Prague’s only LEED Platinum–certified building, Cubex is the city’s premier sustainable event choice.

Secure Your Place

Agenda

Alexander Värä - Director, Global Security Business & Uko Valtenberg Group CISO Eesti Energia, NATO Core Infrastructure lead


Cyber resiliency amid uncertainty and digital disruption

Yuri Diogenes - PhD Cybersecurity | Principal PM Manager at Microsoft Threat Protection CxE Team | University Professor


Cyberattacks in Modern Conflicts and the Importance of Reducing your Attack Surface

Modern conflicts increasingly extend into cyberspace, where nation-states and threat actors use cyberattacks to disrupt infrastructure, compromise sensitive systems, and gain strategic advantages. As organizations expand their digital footprint, their exposure to cyber threats grows, making attack surface reduction a critical defense strategy. This keynote explores how cyber operations are used in modern conflicts and highlights practical approaches for minimizing risk by reducing unnecessary exposure, strengthening identity and access controls, and continuously managing vulnerabilities. In today’s threat landscape, proactively reducing the attack surface is essential for building cyber resilience.

Yuri Diogenes has been working at Microsoft for 20 years and currently is a Principal PM Manager for the Defender for Cloud and Azure Network Security Team. Yuri has a PhD in Cybersecurity Leadership and a Master degree in Cybersecurity intelligence and forensics investigation. Yuri has published 34 books, mainly covering information security and Microsoft technologies. In addition to work at Microsoft, Yuri is also a Professor at University of Texas at Dallas for their Bachelor in Cybersecurity and Risk Management program. Yuri also holds many industry certifications, such as CISSP, C|ND,C|EH, E|CSA, C|HFI, E|CTI, CompTIA Security+, CySA+, CASP, and MITRE ATT&CK Cyber Threat Intelligence.

Yuecel Karabulut - Principal Security Leader, Strategic Executive Engagements AWS


Engineering Autonomy: Verifiable Sovereignty by Design

Digital power is being rewritten. In 2026, shaped by the EU AI Act, NIS2, and DORA, digital sovereignty has moved from compliance to a strategic imperative. Organizations face a critical question: Who truly controls your data and digital future?

This session offers a practitioner-focused framework to move from promised sovereignty to provable autonomy. Leveraging the generally available AWS European Sovereign Cloud and sovereign-by-design architectures, attendees will learn how to implement verifiable control over data location, access, and operations, while maintaining innovation and scale.

Attendees leave with a roadmap to bridge the sovereignty gap, ensuring their organizations remain resilient, compliant, and operationally autonomous in a world of shifting global regulations.

Google keynote | Speaker TBC

Good mood is sponsored by coffee.

Comming soon

Comming soon

Barracuda keynote | Speaker TBC

Veeam keynote | Speaker TBC

Paula Januszkiewicz - CEO of CQURE & CQURE Academy | MVP & RD | International Keynote Speaker | Penetration Tester | Red Teamer | Cybersecurity Expert | MVP Enterprise Sec & Microsoft Regional Director | Businesswoman of the Year’18


Where Hackers Hide and Investigators Hunt

Persistence is the attacker’s best friend — and the defender’s recurring nightmare. Even when malware is removed, or a compromised account is reset, persistence mechanisms let intruders remain in control, waiting for the next opportunity.

In this session, Paula draws on extensive incident response experience to reveal how attackers achieve persistence across endpoints, Active Directory, and cloud environments. Through practical demonstrations, she will show how subtle misconfigurations, overlooked monitoring gaps, and creative abuse of legitimate features create long-term footholds for attackers. Additionally, Paula will demonstrate the latest discoveries in Automatic Destinations and USN journal to create full transparency of hacker's actions.

Workshop 1 | Managing and Defending Against Current Threats

Paula Januszkiewicz - СEO CQURE

This session provides a practical overview of modern infrastructure security across both on-premises and cloud environments. We will explore where today’s systems are most exposed and how attackers identify and exploit those weak points.

Participants will learn how contemporary adversaries target identities, endpoints, and critical services, with high-level examples of real-world attack techniques used to gain access to valuable data and resources. We will also discuss how modern malware operates and what observable signals can help teams detect malicious activity early.

The session will cover foundational practices in incident detection and response — how to recognize signs of compromise, what to prioritize during initial investigation, and how to reduce the impact of an ongoing attack.

Finally, we will look at practical strategies for strengthening endpoint and communication security, along with approaches organizations can use to improve resilience against evolving threats, including supply chain risks.



Workshop 2 | Automated Cyber Defense for the AI Era

Erik Stiphout Lead Product Architect – Microsoft Security SoftwareOne Global CoE

Uros Babic - Lead Product Engineer - Microsoft Security DevOps SoftwareOne Global CoE team, Microsoft Security MVP, MCT

AI has fundamentally changed the attack surface — and most security operating models were never designed for it.

Join SoftwareOne experts Uros Babić and Erik for a deepdive workshop on how organizations modernize Security Operations using MDR for Microsoft Sentinel, automation, and Microsoft’s integrated security platform.

What you’ll experience:

  • AIdriven attack scenarios and how they unfold in real life
  • Automated detection & response with MDR for Microsoft Sentinel
  • Unified SecOps with Defender XDR, Sentinel & Security Copilot
  • Live demo: from identity compromise to automatic attack disruption
  • Practical next steps for executives and practitioners


Workshop 3 | TBC

Enjoy relaxed networking over snacks and drinks, connect with peers, and engage in informal discussions with our event partners. A great opportunity to exchange insights, build new relationships, and continue conversations from the day’s sessions.

Woman's face partially illuminated by swirling, ethereal blue light

Register for Forum

Secure your spot today and be part of the conversation shaping the future of cybersecurity!

Cybersecurity Forum history

Statistics from previous Cybersecurity Forum editions

Cybersecurity is a critical priority.

Cost and complexity must no longer be a barrier.

Organizations must defend the unpredictable. As threats intensify, the demand for effective solutions continues to rise. Our events have seen unprecedented growth year after year, driven by the increasing urgency and relevance of this critical issue. The conversation is at its peak, and the need for action has never been more pressing. 

Digital graph with glowing blue lines and orange highlights

In 2025...

  • 52%

    of cyberattacks are driven by extortion and ransomware.

  • 87%

    increase in destructive campaigns targeting cloud environments.

  • 200%

    increase in effectiveness of phishing due to AI.

Partners of Forum

  • Microsoft logo
  • AWS logo
  • lockup_GoogleCloud_FullColor_rgb_544x96px
  • Veeam logo
  • barracud-black-logo
prague-adobe-1408435173-square

We can support your accomodation

Occidental Praha**** is ideally located near the venue location. It has good transport links to the Vaclav Havel International Airport and is very close to tourist attractions such as Vyšehrad, Wenceslas Square and Prague Castle.

Contact our team:

Petra Nováková
Marketing Manager
Petra.Novakova@softwareone.com

Michaela Krajíčková Bochňáková
Field Marketing Manager
Michaela.Bochnakova@softwareone.com