The conference is aimed at IT managers and Experts from all segments of the economy:
Directors and Managers “Information Security”; Managers of Risk Management; Infrastructure managers; System architects; Security engineers; IT managers; Information security auditors; IT companies with focus Cybersecurity.
InfoSec SEE 2023 will be a hybrid event, in order to answer the requirements and preferences of the huge range of participants.
InfoSec SEE 2023 offers a mix of traditional and digital opportunities. Some participants may choose to attend the conference online, due to their agenda at the moment, but others will benefit from the live participation and the opportunity of networking. According to your preferences, please select the suitable form of attendance during your registration.
Welcome to Attend the Keynotes, the Presentations, the Demos, the Workshops and the Social Events.
Come and Experience the Biggest InfoSec Event in the South Eastern Europe!
Ministry of E-Governance, Republic of Bulgaria
16th of May 2023 – Arrival, Welcome Reception and Dinner
17th of May– 18th of May 2023 Conference
KINGS’ VALLEY SPA Hotel Bulgaria
Conference languages: English and Bulgarian for some sessions
Tuesday, 16th of May 2023
The Lobby of KINGS’ VALLEY SPA Hotel Bulgaria
16:00-19:00 Registration
19:00 Welcome Reception
19:30 Dinner in Restaurant “TRAKIYA” in KINGS’ VALLEY SPA Hotel Bulgaria
The dinner is for all guests, who arrived on 16th of May in KINGS’ VALLEY SPA Hotel Bulgaria – vendors, partners, customers.
Wednesday, 17th of May 2023
Main Stage, Conference Hall “KING BALLROOM”
Moderator: Yavor Yanakiev
7:30-8:45 Registration in the Lobby
8:45-8:55 Welcome Remarks by Anelia Kostadinova, General Manager at COMPUTER 2000 Bulgaria
8:55 – 9:05 Opening Keynote by Atanas Maznev, Deputy Minister at Ministry of E-Governance, Republic of Bulgaria
9:05-9:15 Opening Keynote by Hannah Kamenetsky, Commercial Counselor, U.S. Embassy Sofia
KEYNOTE PANEL
9:15-10:45 KEYNOTE ADDRESSES “SECURITY PREDICTIONS 2023”
“Why the attacker wins: three things our adversaries will do in 2023 to be ahead of us.” Dirk Schrader, Vice President of Security Research, Practitioner at NETWRIX 15min
”Escalation of the Threat Landscape: The New Hacktivist” by Benny Haik, Country Manager at RADWARE 15 min
“Cyber Security in 2023: Breaking Point or Tipping Point? -Geo-politics, advancing threats and technology breakthroughs are challenging traditional approaches to cyber security. This lightening talk will focus key technology trends and capabilities every leader must consider in 2023.” by Mo Cashman, Senior Director, EMEA Field CTO at TRELLIX 15 min
“Future Security in the digital era. Challenges, opportunities and tricks for a fast evolving scenario.” by Pierpaolo Ali, Director Southern Europe, CIS, CEE & Israel at OPENTEXT CYBERSECURITY 15 min
“IT Security – Its integrity starts with Data Control: USA in April announce they arrested an individual who leaked Defence Secure information to the open web. How can such a highly Cyber secure US Defence department continuously suffer from these attacks? The Worlds press is declaring a major push from Russia to Cyber-attack nations sympathetic to Ukraine! You have invested heavily in your own Cyber security, so where should you focus to enhance your real-time IT Cyber and Data Security. Cyber attacks happen 24X7 constantly scanning and probing your defences, being a secure environment often attacks are customised at you from highly skilled teams, and you always the constant danger of accidental human error. There are six technologies which any one will greatly improve your IT and DATA security and two changes in approach advised.” by Raymond John Kelly, EMEA Defence, Intelligence and NATO Director at FORTRA 15 min
“Why Lowcode Security Automation – Why now – Why Swimlane?” by Toby Van de Grift, Vice President EMEA at SWIMLANE 15 min
10:45 – 11:15 Coffee break
11:15 – 12:15 LIVE Discussion „The Future of the Cybersecurity in the next 10 years” Topics: How we protect the new technologies like AI; Cybersecurity and Automation, New technologies like Quantum and Blockchain; Cybersecurity regulations.
Moderator: Yavor Yanakiev
Panelists in the Discussion Panel:
Peter Kirkov, Director Network and Information Security at Ministry of E-Governance; Head of Bulgarian National Computer Security Incident Response Team (CERT.BG), National Cybersecurity Coordinator
Dirk Schrader, VP of Security Research, Practitioner at NETWRIX
Mo Cashman, Senior Director, EMEA Field CTO at TRELLIX
Haim Halperin, Regional Sales Manager Bulgaria at RADWARE
Pierpaolo Ali, Director Southern Europe, CIS, CEE & Israel at OPENTEXT CYBERSECURITY
Lucian Barnea, Regional Sales Manager EE at MANDIANT, now part of Google Cloud
Robert Zelazo, Regional Director Eastern Europe at CYBEREASON
Alexandar Stoyanov Information Security Governance Delivery Manager at DIGITALL
Vihren Slavchev, CEO at MNEMONICA
12:15 – 14:00 HOT CYBERSECURITY CHAIR “Ask Me A Question”
Format, where on the chair at the stage will seat one representative of one vendor and the guests can ask him questions.
Sitting on the Chair:
Pierpaolo Ali, Director Southern Europe, CIS, CEE & Israel at OPENTEXT CYBERSECURITY 15 min
Mo Cashman, Senior Director, EMEA Field CTO at TRELLIX 15 min
Damian Hoffman, Security Architect and System Engineer at MANDIANT, now part of Google Cloud 15 min
Lior Haimovitz, System Engineer Team Leader at RADWARE 15 min
Dirk Schrader, VP of Security Research, Practitioner at NETWRIX 15 min
Lyubomir Tulev, Director Managed Security Services at DIGITALL 15 min
Maxim Akimov, Distribution Sales Manager CEE at N-ABLE 15 min
14:00 – 14:30 Lunch
Conference Hall “King Ballroom”
14:30 – 17:30 B2B Meetings With Vendors
Conference Halls: Damascena 1, Damascena 2, M1, M2
14:15 – 17:45 Workshops
20:00 – 00:00 GALA DINNER with Awards in “King Ballroom“
Thursday 18th of May 2023
Conference Halls Damascena 1, Damascena 2, M1, M2 + Rose Valley 1
9:00 – 14:00 Workshops, Case Studies, Hands-on Labs, Demos
Conference Hall “King Ballroom”
9:00 – 14:00 B2B Meetings with Vendors
Workshops 17th of May 2023
Wednesday 14:30- 17:45
14:30 -15:25 Workshop “Radware ADC Automation & Analytics –To get a full Auto scale Automation and understanding of our Network Latency” by Lior Haimovitz, System Engineer Lead Team at RADWARE
14:30 -15:25 Workshop “Butterfly effect – Happy hunting, Threat hunters!” by Kostadin Ivanov, Angel Tsvetkov, Lyuben Seymenov, Vladimir Andonov at DIGITALL
14:30 -15:25 Workshop “Accelerate your SOC with Trellix XDR platform” by Piotr Tobiaszewski, Software Pre-Sales Engineer at TRELLIX
14:30 -15:25 Workshop “How Low-code Security Automation Makes it Possible to Respond Quickly and Effectively to Today’s Complex Challenges” (Introduction and demo dynamic use cases, scalability of Cloud Security, sophisticated dashboards and automated reporting and show ROI calculator.
Use Cases demo: Ransomware and Vulnerability Management) by Asif Khan, Senior System Engineer at SWIMLANE
15:30 – 16:25 Workshop “Securing your identities from start to finish – a blueprint for a safer governance and administration of privileged and regular users” by Dirk Schrader, VP of Security Research CISSP, CISM, ISO27001 Practitioner at NETWRIX
15:30 – 16:25 Workshop “Ransomware Multi-Stage Attack Simulation” by Marcin Kacprzak, Senior Sales Engineer at CYBEREASON
15:30 – 16:25 Workshop “Foritify – Great Code Demands Great Security” by Tamer El Refaey, Cybersecurity Sales Engineering Leader, Emerging Markets at OPENTEXT CYBERSECURITY
15:30 – 16:25 Presentation “Sycope: See The Invisible: Gaining Full Control Over Your Network Security ” by Piotr Kałuża Solution Architect at SYCOPE
16:25 – 16:45 Coffee Break
16:50 – 17:45 Workshop “How a data security platform is essential for an effective zero-trust strategy” by Ian Davies, Partner Manager Data Security at FORTRA
16:50 – 17:45 Workshop “Securing Remote Workforces with FortiSASE” by Pavlin Koldamov, Systems Engineer at FORTINET
16:50 – 17:45 Workshop “Arcsight -Six Key Components to Build an Intelligent SOC” by Tamer El Refaey, Cybersecurity Sales Engineering Leader, Emerging Markets at OPENTEXT CYBERSECURITY
16:50 – 17:45 Workshop “Bitdefender GravityZone EDR & XDR” by Catalin MITREA, Sales Engineering – Country Partners at BITDEFENDER
Workshops, Hands-On-Labs, Demos, Presentations 18th of May 2023
Thursday 09:00 – 14:00
09:00 – 09:55 Workshop “Avoiding a data breach starts with knowing what is in the data you have and who is accessing it.” by Dirk Schrader, VP of Security Research CISSP, CISM, ISO27001 Practitioner at NETWRIX
09:00 – 09:55 Workshop “Public cloud and Kubernetes – To protect your asset on public cloud and on Kubernetes environments.” by Lior Haimovitz, System Engineer Lead Team at RADWARE
09:00 – 09:55 Workshop “Learn how Trellix can protect your company from data leakage” by Piotr Tobiaszewski, Software Pre-Sales Engineer at TRELLIX
09:00 – 09:25 Workshop “The Defender’s Advantage -Activate your Cyber Defence against the most sophisticated Adversaries” by Iulian Hars, Consulting Sales Engineer, Eastern Europe at MANDIANT
09:00 – 09:55 Live Demo “Remote Access Challenge – how to replace VPN in a secure way” by Detlef Lueke, Solutions Engineer at BEYONDTRUST
10:00 – 10:55 Workshop “Nothing should be built on shifting sand, yet many IT infrastructures are very much like that. Here’s how to change that.” by Dirk Schrader, VP of Security Research CISSP, CISM, ISO27001 Practitioner at NETWRIX
10:00 – 10:55 Workshop “Artificial intelligence in Cyber Security for attack and defense” by Georgi Balev, Radoslav Stefanov at DIGITALL
10:00 – 10:55 Workshop “Voltage- Privacy by Design: A Data-Centric Approach to Protecting High-Value Information” by Tamer El Refaey, Cybersecurity Sales Engineering Leader, Emerging Markets at OPENTEXT CYBERSECURITY
09:30 – 09:55 Presentation in BG language “On-Premise Secure Cloud” Presentation by Boycho Boychev, CEO at NEBOSYSTEMS
10:00 – 10:25 Case Study “Combining Network and Security into integrated platform” by Yanko Bahchevanov, Sales Executive Managet at KONTRAX
11:00 – 11:55 Workshop “Radware Cloud Services – DDOS \ WAF \ BOT \API and client-side protection. To get a full Protection without any need for local installation” by Lior Haimovitz, System Engineer Lead Team at RADWARE
11:00 – 11:55 Workshop “Trust No One: Securing Your Digital Identity and Access Management in a Dynamic Digital Environment” by Peter Ararev & Georgi Antov at DIGITALL
11:00 – 11:55 Workshop Data Security “The top most impactful and powerful Cyber Technologies” by Raymond John Kelly, EMEA Defence, Intelligence and NATO Director at FORTRA
10:00 – 10:25 Presentation “LogSentinel SIEM – Fast Journey to Advanced Security” by Vlado Nedkov, Business Development Manager at LOGSENTINEL
10:30 – 10:55 Presentation “SOC Platforms Data Enrichment with Threat Intelligence as a service” by Vladislav Saykov Senior IT Solutions Architect Cyber Security and IT Service Management at CNSYS
12:00- 12:55 Demo on GAMFT+Vera “Securing sensitive data in transit effectively” by Eduard Seseras, Lead Solutions Engineer at FORTRA
12:00- 12:55 Workshop with Demo “N-able N-Central Remote Managament & Monitoring” by Martin Rakov, Presales Engineer at COMPUTER 2000 Bulgaria
12:00 – 12:55 Workshop “The Defender’s Advantage -Activate your Cyber Defence against the most sophisticated Adversaries” by Iulian Hars, Consulting Sales Engineer, Eastern Europe at MANDIANT
10:30 – 10:55 Presentation “From Desktops to Data Centers: Comprehensive Cybersecurity for Managed IT Services with Lirex” by Boyan Yanchev, CTO at LIREX Bulgaria
11:00 – 11:55 Workshop with Demo How Turbine supports Major Use Cases: Phishing, SIEM Triage, Threat Hunting, EDR Alert Triage “Why Traditional Incident Response Falls Short?” (Introduction of how automation solves top security challenges: Automate Breach Prevention, Mitigate Alert Fatigue, Connect Siloed Security Tools, Manage SecOps Efficacy) by Asif Khan, Senior System Engineer at SWIMLANE
13:00 – 14:00 Workshop “Network viability for Efficient Security” by Bakir Malik, Senior Sales Engineer EMEA at NIAGARA NETWORKS
13:00 – 14:00 Workshop with Demo “N-able EDR” by Martin Rakov, Presales Engineer at COMPUTER 2000 Bulgaria
13:00 – 14:00 Workshop “Challenge any zero-day threat with the comprehensive portfolio of Trellix” by Zlatomir Milanov, Presales Engineer at COMPUTER 2000 Bulgaria
11:00 – 11:25 Presentation “A Kikimora was born” by Krasimir Kotsev, CEO and Founder at SOCYBER
12:00 – 12:55 Workshop “From Basics to advanced principles (CMR and OT)” by Hristo Hristov – Eastern Europe Cybersecurity Lead, Zahari Zahariev – Eastern Europe Security SDL & SRM Lead and Ralitsa Ivanova – Eastern Europe Security Delivery Manager at DXC
11:30 – 11:55 Presentation “Static Code Analysis with Fortify SCA – how TechnoLogica uses Fortify to deliver secure software to its clients“, by Peter Peshev Cyber Security Lead at TECHNOLOGICA
13:00 – 13:30 Presentation “A Comprehensive Cybersecurity Strategy: Layered Defense, Cyber Insurance, and Real-World Case Studies” by Kiril Grigorov, CEO at CyberOne
12:00 – 13:00 Workshop “Swimlane Turbine: Modern Security Automation” (Introduction of the features and integrations, demo how to automate Incident Response Playbooks with Low-Code Security Automation) by Asif Khan, Senior System Engineer at SWIMLANE
14:00 Lunch
Workshops 17th of May 2023
Wednesday 14:30- 17:45
14:30 -15:25 Workshop “Radware ADC Automation & Analytics –To get a full Auto scale Automation and understanding of our Network Latency” by Lior Haimovitz, System Engineer Lead Team at RADWARE
15:30 – 16:25 Workshop “Securing your identities from start to finish – a blueprint for a safer governance and administration of privileged and regular users” by Dirk Schräder, VP of Security Research CISSP, CISM, ISO27001 Practitioner at NETWRIX
16:25 – 16:45 Coffee Break
16:50 – 17:45 Workshop “How a data security platform is essential for an effective zero-trust strategy” by Ian Davies, Partner Manager Data Security at FORTRA
14:30 -15:25 Workshop “Butterfly effect – Happy hunting, Threat hunters!” by Kostadin Ivanov, Angel Tsvetkov, Lyuben Seymenov, Vladimir Andonov at DIGITALL
15:30 – 16:25 Workshop “Ransomware Multi-Stage Attack Simulation” by Marcin Kacprzak, Senior Sales Engineer at CYBEREASON
16:25 – 16:45 Coffee Break
16:50 – 17:45 Workshop “Securing Remote Workforces with FortiSASE” by Pavlin Koldamov, Systems Engineer at FORTINET
14:30 -15:25 Workshop “Accelerate your SOC with Trellix XDR platform” by Piotr Tobiaszewski, Software Pre-Sales Engineer at TRELLIX
15:30 – 16:25 Workshop “Foritify – Great Code Demands Great Security” by Tamer El Refaey, Cybersecurity Sales Engineering Leader, Emerging Markets at OPENTEXT CYBERSECURITY
16:25 – 16:45 Coffee Break
16:50 – 17:45 Workshop “Arcsight -Six Key Components to Build an Intelligent SOC” by Tamer El Refaey, Cybersecurity Sales Engineering Leader, Emerging Markets at OPENTEXT CYBERSECURITY
14:30 -15:25 Workshop “How Low-code Security Automation Makes it Possible to Respond Quickly and Effectively to Today’s Complex Challenges” (Introduction and demo dynamic use cases, scalability of Cloud Security, sophisticated dashboards and automated reporting and show ROI calculator.
Use Cases demo: Ransomware and Vulnerability Management) by Peter Draper, Seniour System Engineer at SWIMLANE
15:30 – 16:25 Presentation “Sycope: Network Performance and Security monitoring” by Piotr Kałuża Solution Architect at SYCOPE
16:25 – 16:45 Coffee Break
16:50 – 17:45 Workshop “Bitdefender GravityZone EDR & XDR” by Catalin MITREA, Sales Engineering – Country Partners at BITDEFENDER
Workshops, Hands-On-Labs, Demos, Presentations 18th of May 2023
Thursday 09:00 – 14:00
09:00 – 09:55 Workshop “Avoiding a data breach starts with knowing what is in the data you have and who is accessing it.” by Dirk Schräder, VP of Security Research CISSP, CISM, ISO27001 Practitioner at NETWRIX
10:00 – 10:55 Workshop “Nothing should be built on shifting sand, yet many IT infrastructures are very much like that. Here’s how to change that.” by Dirk Schräder, VP of Security Research CISSP, CISM, ISO27001 Practitioner at NETWRIX
11:00 – 11:55 Workshop “Radware Cloud Services – DDOS \ WAF \ BOT \API and client-side protection. To get a full Protection without any need for local installation” by Lior Haimovitz, System Engineer Lead Team at RADWARE
12:00- 12:55 Demo on GAMFT+Vera “Securing sensitive data in transit effectively” by Eduard Seseras, Lead Solutions Engineer at FORTRA
13:00 – 14:00 Workshop “Network viability for Efficient Security” by Bakir Malik, Senior Sales Engineer EMEA at NIAGARA NETWORKS
14:00 Lunch
09:00 – 09:55 Workshop “Public cloud and Kubernetes – To protect your asset on public cloud and on Kubernetes environments.” by Lior Haimovitz, System Engineer Lead Team at RADWARE
10:00 – 10:55 Workshop “Artificial intelligence in Cyber Security for attack and defense” by Georgi Balev, Radoslav Stefanov at DIGITALL
11:00 – 11:55 Workshop “Trust No One: Securing Your Digital Identity and Access Management in a Dynamic Digital Environment” by Peter Ararev & Georgi Antov at DIGITALL
12:00- 12:55 Workshop with Demo “N-able N-Central Remote Managament & Monitoring” by Martin Rakov, Presales Engineer at COMPUTER 2000 Bulgaria
13:00 – 14:00 Workshop with Demo “N-able EDR” by Martin Rakov, Presales Engineer at COMPUTER 2000 Bulgaria
14:00 Lunch
09:00 – 09:55 Workshop “Learn how Trellix can protect your company from data leakage” by Piotr Tobiaszewski, Software Pre-Sales Engineer at TRELLIX
10:00 – 10:55 Workshop “Voltage- Privacy by Design: A Data-Centric Approach to Protecting High-Value Information” by Tamer El Refaey, Cybersecurity Sales Engineering Leader, Emerging Markets at OPENTEXT CYBERSECURITY
11:00 – 11:55 Workshop Data Security “The top most impactful and powerful Cyber Technologies” by Raymond John Kelly, EMEA Defence, Intelligence and NATO Director at FORTRA
12:00 – 12:55 Workshop “The Defender’s Advantage -Activate your Cyber Defence against the most sophisticated Adversaries” by Iulian Hars, Consulting Sales Engineer, Eastern Europe at MANDIANT
13:00 – 14:00 Workshop “Challenge any zero-day threat with the comprehensive portfolio of Trellix” by Zlatomir Milanov, Presales Engineer at COMPUTER 2000 Bulgaria
14:00 Lunch
09:00 – 09:25 Workshop “The Defender’s Advantage -Activate your Cyber Defence against the most sophisticated Adversaries” by Iulian Hars, Consulting Sales Engineer, Eastern Europe at MANDIANT
09:30 – 09:55 Presentation in BG language “On-Premise Secure Cloud” Presentation by Boycho Boychev, CEO at NEBOSYSTEMS
10:00 – 10:25 Presentation “LogSentinel SIEM – Fast Journey to Advanced Security” by Vlado Nedkov, Business Development Manager at LOGSENTINEL
10:30 – 10:55 Presentation “From Desktops to Data Centers: Comprehensive Cybersecurity for Managed IT Services with Lirex” by Boyan Yanchev, CTO at LIREX Bulgaria
11:00 – 11:25 Presentation “A Kikimora was born” by Krasimir Kotsev, CEO and Founder at SOCYBER
11:30 – 11:55 Presentation “Static Code Analysis with Fortify SCA – how TechnoLogica uses Fortify to deliver secure software to its clients“, by Peter Peshev Cyber Security Lead at TECHNOLOGICA
12:00 – 13:00 Workshop “Swimlane Turbine: Modern Security Automation” (Introduction of the features and integrations, demo how to automate Incident Response Playbooks with Low-Code Security Automation) by Peter Draper, Seniour System Engineer at SWIMLANE
14:00 Lunch
09:00 – 09:55 Live Demo “Remote Access Challenge – how to replace VPN in a secure way” by Detlef Lueke, Solutions Engineer at BEYONDTRUST
10:00 – 10:25 Case Study “Combining Network and Security into integrated platform” by Yanko Bahchevanov, Sales Executive Managet at KONTRAX
10:30 – 10:55 Presentation “SOC Platforms Data Enrichment with Threat Intelligence as a service” by Vladislav Saykov Senior IT Solutions Architect Cyber Security and IT Service Management at CNSYS
11:00 – 11:55 Workshop with Demo How Turbine supports Major Use Cases: Phishing, SIEM Triage, Threat Hunting, EDR Alert Triage “Why Traditional Incident Response Falls Short?” (Introduction of how automation solves top security challenges: Automate Breach Prevention, Mitigate Alert Fatigue, Connect Siloed Security Tools, Manage SecOps Efficacy) by Peter Draper, Seniour System Engineer at SWIMLANE
12:00 – 12:55 Workshop “From Basics to advanced principles (CMR and OT)” by Hristo Hristov – Eastern Europe Cybersecurity Lead, Zahari Zahariev – Eastern Europe Security SDL & SRM Lead and Ralitsa Ivanova – Eastern Europe Security Delivery Manager at DXC
13:00 – 13:30 Presentation “A Comprehensive Cybersecurity Strategy: Layered Defense, Cyber Insurance, and Real-World Case Studies” by Kiril Grigorov, CEO at CyberOne
14:00 Lunch
The lectors of the conference and the trainers of the workshops and hands-on demos are leading experts and specialists in the field of cybersecurity, representatives of First-in-Class IT Security vendors and IT companies with cyber security expertise.
Experience a selection of the Best Speakers from the International Cybersecurity Community and benefit from their exceptional practical knowledge.
COMPUTER 2000 Bulgaria is a value-added wholesale distributor of technology products, services and solutions. Its VA services enable the resellers to work efficiently and to actively support the diverse technology needs of end users in the Balkan region. COMPUTER 2000 Bulgaria represents solutions of leading IT vendors, providing professional pre-sales, post-sales, marketing and technical support for partners and end-customers.
Our mission is to provide our customers with the most important technologies, solutions and professional services related to areas that are essential to their projects, as well as active support for their future development.
For our partners – top brands manufacturers – to create value with efficiency, to generate demand and to provide access to markets and customers.
For our partners – resellers – to support the growth of their business, to create unique sales propositions and means to generate profits, by providing them with products and services, which make the resellers business easier and successful. Access is granted to valuable partner programs of the leading manufacturers, access to credit lines, possibilities for training and development in various areas.
ABOUT/CONFERENCE LOCATION
Kings Valley Medical & Spa Hotel
About Venue
Kings Valley Medical & Spa Hotel is located in the very heart of central Bulgaria outside the ancient town of Kazanluk. The hotel spreads over 10 acres in an area rich in mineral thermal water.
Kings' Valley Medical & Spa Hotel combines elegant design and maximum comfort for its guests. All 244 rooms and 22 suites are spacious, bright and all reveal exceptional panoramic views of the Valley of Roses and Balkan Mountain. The conference center of Kings' Valley Medical & Spa Hotel offers 2 ballrooms, 2 multifunctional halls and 6 meeting rooms, all equipped with the most modern conference equipment. The ballrooms provide comfortable capacity for about 600 people and are suitable for conference, personal or corporate celebrations. The unique Kings' Valley Medical & Spa Center spreads over 4,000 m² and uses the healing power of the mineral water. The variety of restaurants with stunning panoramic views, open terraces and tempting cuisine make the hotel an ideal place for fans of culinary art.
For more information, please visit: https://kingsvalleyhotel.bg/en/kings-valley-spa-hotel-kazanlak/
KINGS VALLEY MEDICAL & SPA HOTEL
Deadline for reservations: 5th of May 2023
You could book your hotel room after this deadline, only if there are free rooms available!
The above prices are per room per night in BGN inclusive of overnight, Buffet Breakfast; free access to SPA thermal area, the indoor/outdoor pool and gym, insurance, 9% VAT; complimentary Internet access and parking.
Check in time: from 14:00 Check out time: until 12:00
There are no more free rooms at Kings Valley Medical and Spa Hotel, please book rooms at Knyaz Pavel Hotel, which is located in Pavel Banya, 25 minutes’ drive from Kings’ Valley Medical and Spa Hotel. We have negotiated special prices for our conference: 85 EUR for a Single room and 110 EUR Double room.
Please send an email to reservations@knyazpavel.com, use in subject “Reservation with Bonus code: infosec2023″, only with the bonus code you will get these preferential rates.
If you would like to receive an invoice for the accommodation, send in the reservation email your Company Data: name of the company, address of the company, VAT.
ONLY with this special code you will receive the special price above.
MANDIANT brings together the world’s leading threat intelligence and frontline expertise with continuous security validation to arm organizations with the tools needed to increase security effectiveness and reduce organizational risk.
FORTRA is a cybersecurity company like no other. We’re creating a simpler, stronger future for our customers. Our trusted experts and portfolio of integrated, scalable solutions including data security, infrastructure protection, managed services, and threat research and intelligence bring balance and control to organizations around the world. We’re the positive changemakers and your relentless ally to provide peace of mind through every step of your cybersecurity journey.
Learn more at https://www.fortra.com.
RADWARE is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection and availability services to enterprises globally. RADWARE’s industry-leading DDoS mitigation, web application firewall (WAF) and application delivery solutions optimize business operations, minimize service degradation and prevent downtime. RADWARE’s solutions empower more than 12,500 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down.
N-ABLE empowers managed services providers (MSPs) to help small and medium enterprises navigate the digital evolution. With a flexible technology platform and powerful integrations, they make it easy for MSPs to monitor, manage, and protect their end customer systems, data, and networks. Their growing portfolio of security, automation, and backup and recovery solutions is built for IT services management professionals. N-ABLE simplifies complex ecosystems and enables customers to solve their most pressing challenges. They provide extensive, proactive support—through enriching partner programs, hands-on training, and growth resources—to help MSPs deliver exceptional value and achieve success at scale.
OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time contextual threat intelligence, OpenText Cybersecurity customers benefit from high-efficacy products, a compliant experience, and simplified security to help manage business risk.
LOGSENTINEL is an innovative cybersecurity company focused on providing affordable and straightforward solutions to organizations ranging from small and medium businesses to large multinational corporations.
Their flagship product, LogSentinel SIEM, is powerful, yet easy to deploy and use platform which enables organizations to monitor and defend their entire infrastructure from malicious activities. LOGSENTINEL is cloud and on-premise compatible and motivates organizations to use the full spectrum of protection offered, including all functionalities in an easy to understand all-in-one license model. Employing advanced cryptographic techniques which served as a basis for blockchain, LogSentinel SIEM allows organizations to collect and securely store log data for virtually unlimited periods of time, as well as guarantees the immutability of the collected data, in a way that no other industry solution can. LogSentinel SIEM is trusted by healthcare, finance, and critical infrastructure clients worldwide, and is a preferred choice for flexible MSSPs who are looking to provide their clients with peace of mind.
BEYONDTRUST is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.
Their extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Ther holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments.
BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. They are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network.
Sycope is focused on designing and developing highly specialised IT solutions for monitoring, improving network performance and security. Sycope believes engineers who work in large organisations do not need a system that presents all available data about networks, devices, and applications. Instead, teams require selected, specific information presented as rapidly as possible. Sycope solution is designed to discover network events and issues, measure delays and identify security threats.
Swimlane is the leader in cloud-scale, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record that helps overcome process and data fatigue, chronic staffing shortages, and quantifying business value. The Swimlane Turbine platform combines human and machine data into actionable intelligence for security leaders.
Niagara Networks™ solutions enable NetOps and SecOps teams to easily and efficiently operate and administer multiple security tools and platforms with service scale and flexibility, while reducing operational expenses and downtime.
Niagara Networks™ provides all the building blocks for an advanced Visibility Adaptation Layer at multiple data rates up to 100Gb, through offering packet brokers, bypass elements, network TAPs and a unified management layer. We design, develop and manufacture our products in Silicon Valley, USA.
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 635,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.
Bulgarian National Cybersecurity Cooperation Center was created in the middle of 2022’. One of its main intentions is the development of the Bulgarian cyber community. BNCCC will cooperate with different scientific research, industrial and public bodies to create better and stronger collaboration among themselves. BNCCC also has a major role in supporting the Bulgarian IT industry in the meaning of SMEs in participating in European and global projects related to cyber security and scientific activity in the field, finding partners and funding for projects in the field.
DIGITALL (formerly ec4u and BULPROS) was born from two technology companies with more than 20 years of success on the global market. Joining forces, they deliver the next generation Digital Transformation & Digital Cloud Experience to enterprises.
DIGITALL operates on a global scale with over 1,400 employees across 25 offices in 11 countries located in Europe and North America. In addition to building a competitive portfolio, the team of expert employees has established strong relationships with strategic technology partners, including Salesforce, Microsoft, IBM, SAP, Oracle, Cisco, Snowflake etc.
Nebosystems Ltd. is a Bulgarian company that provides services in the fields of IT infrastructure management, System Integration, Information Security and DevOps.
Information security is the key concept and top priority for Nebosystems. They are a partner of leading Information security vendors. The company has a team that has won the trust of many customers. Many projects are done with implementation of different information security techniques. They provide consulting, IT auditing and IS services to help the customers to prepare for compliance with different Cybersecurity standards like ISO/IEC 27001 / 27002 and PCI DSS.
Mnemonica JSC is a Bulgarian system integrator, founded in 2009. The company has dynamic development and is very fast growing.
They are certified in ISO 27001:2013, ISO 20000-1:2018 and 9001:2015, and specializing in delivering top class technology solutions in the IT area, based on technologies from the world’s leading vendors. They have expertise in the following areas: Information security and regulatory compliance, Cloud technologies and virtualization, System Integration, protecting and storing data, Managed Service and Outsourcing.
LIREX® is a leading Bulgarian group of IT companies. With over 30 years of experience in the high-tech industry, LIREX® is leading the way in implementing comprehensive solutions and professional services for organizations from various industries. We cover a wide range of the needs for technology, IT expertise and IT resources with core expertise in: cyber security, physical security, datacenter and networking, and digitalization of processes.We know that IT is a complex business that requires careful planning and synchronization of many IT activities in any organization, and that our customers require effective solutions. We offer the IT solutions and services they need on their way to innovation and success.
CNSys provide IT products and services with guaranteed high quality and integrate them into complex technological solutions and software systems. They are a reliable and competent partner who will build and develop your complex IT infrastructure, maintain your devices and systems, and advise you on specific IT tasks and projects.
CNSys team focuses on the technologies of these world leaders, where they can develop and implement quality and working protection systems with added value, experience and expertise. In their portfolio you will find solutions based on IBM, Cisco, Microsoft, VMware, Oracle, Forcepoint. FireEye, Netwrix, Symantec, F-Secure, Micro Focus.
KONTRAX JSC was established in 1992 as an international holding of companies in six Eastern European countries with headquarters in Budapest, Hungary. Since 2000, KONTRAX has been an entirely Bulgarian private company. The long years of experience and the broad potential of the company have established it as a leading ICT provider for large private and state structures. As a result of hard work and good management, it takes a leading position on the Bulgarian IT market.
SoCyber brings a new approach to cybersecurity, being the only company in Bulgaria, narrowly specialized in providing security testing and vulnerability assessment for applications and networks. The company aims to deliver services of the highest quality, combined with a customized approach to each of the organizations that they work with. They are certified in ISO 27001:2013 and 9001:2015.
SoCyber developed a holistic vulnerability management solution that will make the vulnerability management process centralized, transparent and easy to follow and understand. It will enable companies to prioritize the remediation of vulnerabilities and address their security issues in a timely manner.
CYBERONE is 100% focused on cybersecurity. In fact, that’s all they do. They are fully committed to combating cyber threats to ensure that their customers are fully protected.
CyberOne has two security operations centers (SOCs) located in Israel and Bulgaria, where their specialists monitor more than 1,000 endpoints every day. By investing in the best technology and the brightest geniuses in the industry, they provide effective detection, analysis and response to cyber attacks. This means that they identify the attack at the time it occurs and take the right measures to eliminate the risk to you and your information systems.
As a leader in the cybersecurity market in Bulgaria, CyberOne combines technological innovation with human intelligence to develop the full potential of your security and protection.
ISACA is a professional membership organization committed to the advancement of digital trust by empowering IS/IT professionals to grow their skills and knowledge in audit, cybersecurity, emerging tech and more. It’s a community designed to guide your career, propel your enterprise, and take your organization into the future, while you help advance digital trust.
For its 16 years of existence, the formation has performed more than 2,000 concerts on the local and international stage. In Bulgaria, the group is recognized as a formation of the highest level, which performs in front of diplomats, presidents, foreign delegations, on the occasion of national and regional holidays and any type of official events.
From its inception until today, the concert formation takes part in over 250 private events a year: weddings, anniversaries, proms and christenings all over the country and even abroad!
Masters of the Dance present in a new and unique way the magic of the art of dance, intertwining tradition and innovation with a single goal – to deliver a unique emotion and spectacular experience to their viewers!
PRIVACY POLICY
In this Privacy Policy, we describe the conditions under which COMPUTER 2000 Bulgaria Ltd. offers products and services and what measures we take to guarantee our users’ Personal Data protection. The legal regulations in Republic of Bulgaria and the EU, give both you, the individual, and us, the company, a formal framework for the processing of personal data.
COMPUTER 2000 Bulgaria Ltd. is committed to protecting the privacy of visitors of its website – WWW.COMPUTER2000.BG: individuals who register to use the products and services; individuals who register to attend the Company’s corporate or other events; business partners. This privacy policy describes our privacy practices in relation to the individual activities with the company including the individual’s choices regarding use, access, and editing of Personal Data.
What Information Do We Collect?
We may collect the following information:
(a) personal information from Users in a variety of ways, including, but not limited to, when Users visit our Website, register on the Website, send us enquiry, subscribe to our newsletters, respond to a survey, fill out a form, and in connection with other activities, services, features or resources we make available on our Website. Users may be asked for, as appropriate, for their personal names, email address, mailing address, phone number. Users may, however, visit our Website anonymously. We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personal identification information, except that it may prevent them from engaging in certain Website related activities.
(b) non-personal information about Users whenever they interact with our Website. Non-personal identification information may include the used browser type and version, the type of computer and technical information about Users means of connection to our Website, such as the operating system and the Internet Service Provider’s utilized and other similar information.
(c) cookies and log files may be used on our Website to enhance User experience. A cookie is a small text file written to an individual’s hard drive that contains the user ID. User’s web browser places cookies on their hard drive for record-keeping purposes and sometimes to track information about them. Users may choose to set their web browser to refuse cookies, or to alert you when cookies are being sent. If they do so, note that some parts of the Website may not function properly. You can find out more about the use of cookies and how you can remove them by going to http://allaboutcookies.org or http://www.cookiecentral.com.
How we use the collected information
Any personal data that the individual provide to us will be treated with the utmost care and security. The personal data we collect is used to provide the individual with the service, that the individual have requested or to respond to an enquiry that the individual have made.
WWW.COMPUTER2000.BG utilizes Users’ personal information we have collected for the following purposes:
Users’ right to Opt-out
If you do not want to continue to receive any e-mail communications from us, please let us know by sending an e-mail to unsubscribe@computer2000.bg. Should you request that we amend or suppress records containing your personal data we will endeavor to do so as promptly as practical. However, you may receive communications for a transitional period whilst we process your records.
How we protect your information
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Website.
Sensitive and private data exchanged between the Website and its Users happens over a SSL secured communication channel and is encrypted and protected with digital signatures. Our Website is also in compliance with PCI vulnerability standards in order to create as secure of an environment as possible for the Users.
Sharing your personal information
Unless we are given explicit permission to do so; we do not sell, trade, or rent Users personal information. We may, without given consent, share generic aggregated information not linked to any personal identification information regarding visitors and users with our business partners and trusted software vendors for the purposes outlined above. We may use third party service providers to help us operate our business and the Website or administer activities on our behalf, such as sending out newsletters or surveys.
Third party websites
Users may find advertising or other content on our Website that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and we are not responsible for the practices employed by websites linked to or from our Website. In addition, these websites or services, including their content and links, may be constantly changing. These websites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to our Website, is subject to that website’s own terms and policies.
Advertising
Ads appearing on our Website may be delivered to Users by advertising partners, who may set cookies. These cookies allow the ad server to recognise your computer each time they send you an online advertisement to compile non personal identification information about you or others who use your computer. This information allows ad networks to, among other things, deliver targeted advertisements that they believe will be of most interest to you. This privacy policy does not cover the use of cookies by any advertisers.
Changes/Updates to our Privacy Policy
In order to keep up with changing legislation and best practices, we may revise this privacy policy at any time. When we do, we will post a notification on the main page of our Website. We encourage Users to check frequently this page for any changes to stay informed about how we are helping to protect the personal information we collect. Individuals acknowledge and agree that it is their responsibility to review this privacy policy periodically and become aware of modifications.
Your acceptance of these terms
By using this Website, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our Website. Your continued use of the Website following the posting of changes to this policy will be deemed as your acceptance of those changes.
Contact us
If you have any questions about this Privacy Policy, the practices of this Website, or your dealings with this Website, please contact us at software@computer2000.bg or alternatively:
Data Protection Officer
COMPUTER 2000 Bulgaria EOOD
63 Shipchenski Prohod Blvd.
Sofia 1574
Bulgaria