EXATEL Security Days 2018: five post-conference conclusions

July 7, 2018
/
News

EXATEL Security Days is a very important event for us. Enough time has passed since it ended to be able to look back at it with a cold eye and an analytical mind-set. We had set ourselves an objective – the topics addressed at ESD were to reflect the current practical issues and the hottest cybersecurity-related problems, and so we have decided to collect and put to print the five most important issues we learned during the last edition of our conference. Without a particular agenda, these are:

Number of participants

The turnout proved that cybersecurity has become an extremely welcomed topic. Until recently, even industry events attracted at most several dozen people. Cybersecurity used to be a niche topic, important to a handful of specialists. Today, the community has grown significantly, and cybersecurity has become a topic of interest for virtually everyone associated with IT.

Highly rated most substantive presentations

This proves that participants no longer need information about IF, but want to know WHAT and HOW. The survey we conducted straight after the conference clearly shows what content is favoured. It turned out that neither the format of the speaker, nor catchy slogans or currently trending issues stand a chance against a well-prepared practical presentation. Our slogan: Cybersecurity in practice is still valid.

Purchasing more boxes and licenses has less and less sense

The outcome of the event was the recognition that users have to utilize what they have or implement solutions directly translatable into a permanent service. Cyberthreats of today adopt many forms and are constantly changing. Believing in a magical solution that can be simply purchased is fatal. Tools are important, but the awareness of the objectives and measures have even more value.

You need a trusted partner

Educating company personal, creating original procedures and systems is too time- and resource-consuming when it passes a certain magnitude. A trusted external cybersecurity provider is a salvation to people too busy with running a business and to IT specialists swamped with daily activities.

The people

In the end, the quality of cybersecurity services is always determined by the involved people. If there is no ready-made solution – it will be found. If there is a new threat, unrecognisable to machines – humans will understand it first. People are, ironically, the most powerful cybersecurity tool and one of the most vulnerable attack vectors.

We invite you to next year’s conference! Finally, a brief summarizing video has been prepared by the editors of Rzeczpospolita.

 Published by: Piotr Mierzwiński