InfoSecurity Russia 2017 held on September 19-21 in Moscow, Russia has been a smashing success with 6445 visitor registrations and over 11500 pre-arranged meetings.

Their team was pleased to gather a professional club of executives and technical specialists, manufacturers of profile products and developers of unique software, representatives of state regulatory bodies and leading enterprises of the country under one roof.

The festive atmosphere of communication and business cooperation was created by the sponsors and partners: CROC, Norilsk Nickel, RNT, Rostelecom, UTsSB, FinCERT of The Russian Central Bank, Aquarius, Avast Software, Cisco, Citrix, Hewlett Packard En-terprise, Radware, STEP LOGIC, SuperWave.

Expert panel discussions

InfoSecurity Russia conference sessions have been extremely popular these three days. An outstanding line-up of experts addressed the industry's hottest challenges and topics. The programme featured various conferences, round tables, plenary sessions, workshops and seminars in four different conference rooms.

At the Technology Day professional society spoke about investment in technology, SOC vs SIEM and modern firewalls

Industrial sector day was devoted to the protection of infrastructure of the critically important facilities, industrial Internet of Things, modern processing infrastructures and data protection.

Financial security

Among the hottest topics and discussions of the Financial security day were: the suppression and investigation of incidents in the credit and financial sphere, the counteraction to DDoS attacks, the evolution of security: from natural exchange to blockage, the Internet of Things on financial markets, information security at retail enterprises & biometric technologies.

At the Technology Day professional society spoke about investment in technology, SOC vs SIEM and modern firewalls. New at InfoSecurity Russia: leading manufacturers from China demonstrated innovative solutions and shared the experience of Asian brands.

Workshops from global experts:

  • Pseudonymisation, Easier Said than Done? Simon Keates, THALES
  • Cybersecurity Getting the Business Engaged, Allan Boardman
  • Analytics of cybercrime: algorithms, Manjula Sridhar, ArgByte
  • Live Hacking: how hackers hack your systems, Sebastian Schreiber, SySS
  • DDoS-attacks and cybercrime Allan Guillen, Level 3 Communications

Video interviews with the industry's leading specialists and thought-leaders will be available very soon.

Download PDF version Download PDF version

In case you missed it

SHIELD certification: enhancing security and stakeholder collaboration
SHIELD certification: enhancing security and stakeholder collaboration

In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certifi...

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Quick poll
Which feature is most important in a video surveillance system?