GDAYS
Presentation ea CIBER 2015 | le)
elo 07|08 OCTOBER
— SoExecutive Summary
The National Cybersecurity Center (CNCS), as an entity with a central role
POMC eneke act iae ee sl urls arte d
everyone's active participation and open discussion around these themes
ema salle ele .
Embracing the will for such participation and active discussion, the CNCS has
Pee eu ncn ee net ecco
addressed transversely to all civil society and to specific groups with special
eeeaiRe ese sms
The C-Days 2015 event, that the CNCS seeks to boost in October 2015, aims
Co Mee MEUaT Marea a nsec
cooperation bonds and institutional and business relationships, which are
essential for the implementation of the National Strategy for Security in
Cee emu esc)
This document describes the C-Days event for the year 2015, highlighting
Tee eee cee iam ene cence Cs
sponsorship, partnership and support.Scope and objectives
Cee EEO ce ua acu ure Mu teu)
impact and is a result of the National Cybersecurity Centre's attributions, in
particular the one’s regarding to awareness-ralsing, prevention and training
towards a national cybersecurity culture.Description
Peete Rar eur al ects ae
objectives (where CNCS plays an active and
Rene eet se ne
ce Ee esse lates
all issues related to cybersecurity (Strategic,
Oe ea eu rates /arc te)
Raper small rts ne ete s
cement)
international partners from industry,
academia and State. These partnerships are
eee ORR Reece Kola Us
themes presented and the discussions at the
event, but also to find sponsorship and
appropriate financial support for the event.
Marketing and Publicity
Deir acura Racer a)
DP Eseree(a-ttO mec eR RTS
Un eC UD
Seeman el mule ger ter ad
ee rec esi
Invitations will be addressed to entities or
ee Sa gee
cybersecurity, in a predefined format and
Benet cence
Organization
By the National Cybersecurity Center in
partnership with ISCTE-Lisbon University
Institute (ISCTE-IUL), partners and sponsors
es ne eeDates for C-Days 2015
RU laa oR aC
CMa Nn ca ka
PSR aU RL Ac eo
ome Cee cede sa uni
Neue eee ies
EEE
Place for C-Days 2015
Runa oi uC]
Perel eather aeee
Pee cee ee ue aces
partners and the industry in areas related to
Vetere coment aie cased
Reis lea tS Brea O em eseLer ce
(ISCTE-IUL) made available its main
Ete eu an ACen
3 meeting rooms with capacity for 20 people
BIE ounce eau
Sees Ut hue OR aceon
Eric Rehan aturesParticipants Profile — Target EWeltcutacd 2
The event is directed to the whole
OMe eRe nrc elas
eeu eae cc
Officers (ClO), Chief Information Security
Officers (CISO), other ICT directors and
DUE MN ena aac ee
teams and other ICT security professionals,
eet Seal eae)
technological education institutions, and
aera ecu ars
themes of ICT security and cybersecurity.Options for sponsorship, partnership and support
MUO Role Mae kes sec Re ea ee
eer EL neh renee ules ue Ce ie ae Reet cr eon ad
NAW ase) Un ale
marketing and publcty mates
fll pula
+€5.000,00 €2500,00 ¢500,00Options for sponsorship, partnership and support A
eae ua ea ieee lcs cela teas ol Cu a Cue ase oa
is to be addressed.
CORRE MT aed rel Mee a ect oes to nae eee
eee meen aT ee au ar eels ak cues ae
er ieee asc ure eco oe ett ne uc emcee ee
Pee sneha eines mares cn ce aera
format pretends to enable formality and in-depth discussion of strategic, organizational, doctrinal
Purest eased oncogene eu oscar scope kay
audiences with specific interests in cybersecurity aspects (workshops, hand-on Labs).
‘Aiming a national and international audience, thus featuring national and international speakers,
moderators and international industry, part of the event may occur in English language (except the
opening and closing of the event), hence real-time translation services will be available.——
Draft of the event’s program
Considering the focus and topics of interest, the program reflects cybersecurity's training and
Teme e Masur mie one as i hace eae ae eu saih ame led
one en rarer chee
The program, necessarily subject to amendments in the light of future organizational aspects (such
Pecan Rue ee dele ca ae Oe ae eee eectCreare
Event type Topic
eee cco Cybersecurity Center
18:00 coffee trek
conference stay safe, be aware, keep cool a
Conference Privacy Rights forthe Right Privacy| Malware detection
36:30 Coffee Oreak
am, Wisk Management & Poles - No
om shorevtefor securConference cyber sit
Coffee Brest
Tacting oa and tomarow/e
ina
ES Incidents Cnabities
Conference Situational Aereness in complex
Coffee Break
Whisper talk, SHOUT. st
Tople
spear phishing