Cybersecurity is a public health and global security issue. It requires an urgent, interdisciplinary approach strongly rooted in technology fundamentals and the acknowledgment that people -- from users to decision makers to engineers -- are a critical part of the network.
If you agree, the Global Cybersecurity Summit (GCS), the first of its kind in Ukraine’s history, is for you and the hundreds who will gather at one of the geo-strategic cyber crossroads of the world. Come learn, explore, and share your knowledge about important cyber issues, best practices, and innovations like artificial intelligence, the Internet of Things (IoT), policy and government, encryption, user responsibility, and more.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
Ticket type | Features | Price |
---|---|---|
SUMMIT ATTENDANCE For Ukrainian citizens discount of 50%. Up to 20% discount for group orders |
|
619
usd
buy ticket
|
VIP All Inclusive |
|
1500
usd
buy ticket
|
LIGHTNING TALKS |
|
1500
usd
buy ticket
|
EXHIBITION ATTENDANCE |
|
10
usd
buy ticket
|
SPEECH AT THE EXHIBITION |
|
1300
usd
buy ticket
|
Timeliness of holding the cybersecurity summit cannot be overstated. What is its target audience - whether developers of software solutions or consumers of these services?
Cybersecurity affects a multitude of stakeholders - from an individual computer-user in their living room to country leaders ensuring national security. This Summit is targeted toward all of these concerned audiences: consumer, technicians, instructors, developers, designers, advocates, entrepreneurs, tech experts, corporate leaders, non-governmental, and members of the government.
According to the summit's program, all speakers are foreigners. What criteria did you use choosing experts? Does this mean that the main language of the event will be English?
When choosing our speakers and experts, we made sure to target relevant and diverse subject matter, focusing on a mix between the private, academic, non-profit, and government sectors. Since cybersecurity issues are, by nature, a borderless issue, we created a line-up of speakers with international, as well as in-country expertise. Our speakers will include experts and policymakers from the U.S., Western Europe, Ukraine and other regions of the world.
What main themes are speakers going to talk about? Please, define the most interesting reports that are "must be" for visiting participants and why.
The main themes are broad, and are intended to touch upon the many aspects of cybersecurity - both the more prominent ones that are on the forefront of the news, and ones that are increasingly growing in importance. Focusing on current and future challenges, and most importantly, solutions, sample panel topics include: Creating the Next Generation of Cyber Pros The Bold New World of IoT Security AI and Machine Learning Securing the Vote: Elections in a Digital World Collaboration and Threat Intelligence Sharing Emerging Trends in Automation and Application Security From Cyber Academia to Independent Researchers & Beyond Encrypting the Future
In addition to reports panel discussions are planned. Who will take part in them and what most relevant topics will be discussed by their participants?
In addition to the main panel events, the Summit will feature smaller fireside chats with some of our featured speakers, as well as local partners and sponsors. These intimate events will expand on the previously discussed panel topics, as well as give speakers more freedom to go into detail on topics of their choice. What's more, audience members will have the chance to ask questions, delving into deeper details on topics of their choice.
Tell us about special aspects of the organization of this event - which one was the most difficult and how did you overcome these difficulties?
The most difficult aspect of organizing the Summit is being able to place our amazing speakers into just one or two panels each, considering the breadth of their expertise and their enthusiasm to speak on a multitude of topics. They had so many more ideas of panel topics, and fitting everything into two days is quite the challenge.
We know that the event is supported by public authorities - in what way their support is expressed?
The Summit is being supported by a variety of governmental and institutional stakeholders in Ukraine, including the Ukrainian Ministry of Economic Development & Trade's State Finance Institution for Innovations (SFII), IT Ukraine Association, Telecommunication Chamber of Ukraine Association (TCU), Association of Information Technology Enterprises of Ukraine, Ukrainian Association of Information Security and Information Technology, and Hi-Tech Office Ukraine.
Give three tips for cybersecurity professionals as for what to do to be always aware of the latest industry's innovations?
1. Stay connected - consume information on a global scale because information and developments are rapidly changing. 2. Don't always think as a defender or an offender - think from both your side and the side of your "attacker." Be flexible and anticipate threats. 3. Be aware of user vulnerabilities - identifying non-secure links, keeping software updated, encrypted communications and data. These are the daily technical tactics that will make major differences.