Open stage: Cybersecurity for high-risk systems [ukr]

A discussion with representatives of high-risk systems about why security architecture should be incorporated at the design and development stage, rather than added after release into production. We will talk about the risks of delayed implementation of controls, common security illusions, and practical approaches to integrating security practices into the work of product teams.

Anastasiia Voitova
Head of security engineering, Cossack Labs
  • Builds security tools for protecting data during the whole lifecycle (encrypt everything!)
  • Shares a lot about "boring cryptography", end-to-end encryption, data security, zero knowledge / zero trust systems, software security architecture
  • Speaks on international conferences, conducts workshops and training for developers, and co-organizes cybersec events
Yuriy Fedorenko
Engineering manager, MacPaw
  • He has been working in IT for 15 years, but that's how you count it.
  • Serving in the army
  • Creates the YouTube channel UT-2
  • X
Artem Martynenko
Center of innovations
  • Chief Strategy Officer on the Delta team
  • Over 10 years of experience in developing combat information systems
  • Throughout his career, Delta has served as a backend engineer and architect.
  • Participated in the implementation of security controls, system scaling, and new product rollouts
  • LinkedIn
Oleh Shemetov
CISO Міноборони
  • Over 15 years in information and cybersecurity
  • Worked his way up from security administrator to deputy director of information security in both the public and private sectors
  • State expert on technical information protection
  • PECB Certified Chief Information Security Officer
Vitaly Balashov
Deputy Minister, Ministry of Digital Transformation of Ukraine
  • Previously worked at EPAM Digital and the Kharkiv Research Institute of Forensic Expertise
  • Vitaly is involved in cyber protection of state IT infrastructure, digital service security, and cloud technology implementation
  • His areas of expertise include security standards (including AI), cyber diplomacy, transparent policy in the field of cloud solutions, and the development of partnerships between the state and business in the field of security.
Sign in
Or by mail
Sign in
Or by mail
Register with email
Register with email
Forgot password?