XIX Integrity Partners Security Days
September 18-19, 2025
Marina Club Hotel near Olsztyn

How to secure an organization when the user is a human, an app, an AI bot? See how to build a comprehensive strategy to protect your organization from cyber threats, taking into account all types of digital identities.
Grand
Threat
Alert
Introduction to the mission
This is not another theoretical briefing. This is a conference for IT professionals, security managers and technology leaders who are looking for concrete solutions, not empty slogans. We share practical knowledge, show real threat scenarios and inspire action in a digital world full of dangers.
Flashback
from a previous mission
A year ago, our mission was held at the Grand Hotel TIFFI in Ilawa, where an attendance record was set in terms of both participants and technology partners. The theme was LEGO Masters - a symbol of precision security strategy building. The focus was on cyber security transformation, with artificial intelligence playing a key role.
agenda
Day 1 - September 18 (Thursday)
10:30 - 10:50
Welcome - official opening of the conference
10:50 - 11:20
Remember! The City Never Sleeps – access control and identity compliance in the pulsating Cloud-First era
Jakub Dudek
CyberArk
Piotr Pietras
SailPoint
11:20 - 11:50
CyberArk City: DevOps Edition, humans and AI agents – secure access, no secrets, no waiting.
Michal Kudela
Integrity Partners
Luke Przybylski
CyberArk
11:50 - 12:20
Grand Theft Identity: Silverfort Mission.
Secure identities before they are seized.
This session will introduce detection mechanisms and secure service accounts. We will also demonstrate how Silverfort enforces MFA everywhere, even in places where it was previously impossible, e.g. legacy apps, RDP, remote powershell, OT.
Pawel Jakacki
Silverfort
Jakub Banaszek
Integrity Partners
12:20 - 12:40
From a Flood of Alerts to a Sharp Response: Practical Application of AI in Incident Analysis with Elastic
Piotr Karpinski
Integrity Partners
Pawel Krześniak
Elastic
Every day, SOC analysts are drowning in a sea of false positives and repetitive tasks. How can you regain control? In this presentation, we'll demonstrate how Elastic Attack Discovery, powered by AI Assistant, filters the noise and automatically correlates events that truly matter.
We will focus on real-world scenarios, showing how Machine Learning and GenAI reduce analysis time from hours to minutes, allowing teams to focus on strategic defense rather than firefighting.
12:40 - 13:00
Coffee Break
13:00 - 13:20
OPSWAT CASINO invites you:
FILE Security UseCase BINGO
How many ways to avoid file-derived threats can you fit on one BINGO game board?A combination of well-known engines and lesser-known patented technologies minimize the risks that files bring to your organizations processes -> no patient zero, almost in real time. What can come out of this, and how to incorporate security into your journey to digitize your processes and share information, you will find out if you let yourself be invited to my "table" for 20 minutes and play with OPSWAT.
Lukasz Okólski
OPSWAT
13:20 - 13:40
Mission Ivanti MDM - the security of your phone
Criminal activities, ransomware attacks, data theft and phishing. What dangerous things can happen on your phone and how to protect yourself from them?
Bartłomiej Cholewa
Ivanti
13:40 - 14:40
Lunch break
14:40 - 15:20
Panel discussion - "Journey to Identity Security Maturity: From Foundations to Leadership". - GTA Edition
Join us for an inspiring panel where experts - long-time practitioners will talk about their journey
- from the first steps and foundations to mature, comprehensive Identity Security strategies.
Pawel Mosurek
Head of Office
Production Security
BNP Paribas
The panel will include:
Maciej Gdyk
IAM Lead
KRUK S.A.
Joanna Chomyszyn
Delivery Manager
Integrity Partners
Artur Wrześniewski
Identity Security
Delivery Director
Integrity Partners
Dariusz Dylski
Global IT IAM & PAM
Solution Architect
JTI
15:20 - 15:40
Attention this is an attack! How to prepare a data protection strategy in case of a cyber attack?
Your data is a safe full of treasure - the target of any cyber attack. During the presentation, we will present the Thales Data Security Platform solution, which combines encryption, key management and access control to create an impregnable protective shield.
Jaroslaw Ulczok
Thales
15:40 - 16:00
Coffee break
16:00 - 16:20
Has SIEM really died? Or has it just advanced to the next level? Singularity AI SIEM - the next stage of the game from SentinelOne
In this presentation, you'll get into the world of cyber security like an open city in GTA.🚦
Instead of stolen furs and chases, you'll be faced with Singularity AI SIEM from SentinelOne - technology,
that changes the rules of the game and gives you full control over the map of your IT infrastructure.
Seweryn Jodlowski
SentinelOne
You'll learn how artificial intelligence acts as the ultimate "chit" in the fight against cyber criminals - detecting and neutralizing threats in real time, before they can do damage. You'll learn how to automate security analysis and take full visibility, like a "god mode" in the IT world.
16:20 - 16:40
NDR - Nitro and a sixth sense for networks.
When detection becomes strategy
Jaroslaw Chodkiewicz
Greycortex
Monika Bakura
Greycortex
NDR is no longer just an "intrusion detector." In a modern approach, it becomes a strategic sense of the organization that:
- senses subtle anomalies,
- understands context,
- gives an information advantage before serious threats materialize.
16:40 - 17:00
MDR: San Securo - the cyber security mission
Adam Brzozowski
Cyberoo
The year is 2025 and the digital streets are teeming with criminals - ransomware, phishing, attacks without warning. Traditional security can't keep up, and IT teams are drowning in alerts. It's time to turn on survival mode with real support. MDR (Managed Detection and Response) is an external patrol that monitors, detects and responds 24/7 - before the damage is done. Instead of patching holes on your own - you get into the game with security that really embraces the subject. MDR - security that acts before you panic.
17:00
Conclusion of Day 1 of the conference
17:00 - 19:00
Check-in and free time
19:00
Gala dinner
Day 2 - September 19 (Friday)
10:00 - 10:30
Grand Threat Analytics - patrolling the digital streets looking for attacks and scams and setting traps. It's time to show who rules the city with traps.
Bartosz Krupowski
Integrity Partners
Robert Dabroś
Fidelis
Welcome to Cyber Vice City - a city where the artistry of attacks has more horses than sporting furies, phishing is a modern form of pickpocketing, and cameras don't look at the streets, but at network sessions.
In this talk, we'll take a ride through the dangers of the modern online world, show how to detect the illegal "quests" of cyber crooks, and how to ensure digital visibility before someone steals a save from your server.
10:30 - 10:50
Jump on SASE: a discussion on taking control of the network and its security
In an era of increasing cyber threats, distributed work environments and the growing importance of the cloud, traditional network security models are no longer sufficient. Our presentation will focus on the SASE (Secure Access Service Edge) concept - an approach that combines network and security functions in a single, centralized architecture delivered from the cloud.
Andrzej Kroczek
Zscaler
10:50 - 11:20
Klasycznie czy dynamicznie? – systemy cyber ochrony, a analiza dynamiczna ataków wg. Trellix.
Łukasz Gliński
Arrow
Świat pędzi, AI za każdym zakrętem, ale na końcu to Analityk SOC potrzebuje konkretnego raportu popartego odpowiednim Threat Intelem na temat incydentu, który został wykryty.
11:20
Conclusion of the second day of the conference
panel discussion
Imagine that building an identity security strategy is not an office procedure, but a mission in the open world. You start from scratch, as a novice taking the first steps, and over time you gain the experience, contacts and tools to ascend to the level of a leader who controls the entire field.
Join us for an inspiring panel where experts - long-time practitioners - will talk about their journey - from the first steps and foundations to mature, comprehensive Identity Security strategies.
This meeting is an opportunity to see what the real battle for identity security looks like - not on virtual streets, but in the world of business and technology. Join and play this mission together with us.
Dariusz Dylski
Global IT IAM & PAM Solution Architect
JTI
Maciej Gdyk
IAM Lead
KRUK S.A.
Joanna Chomyszyn
Delivery Manager / Integrity Partners
Artur Wrześniewski
Identity Security Delivery Director / Integrity Partners
Paweł Mosurek
Director of Production Security Office
BNP Paribas
The panel will include:
Journey to Identity Security Maturity: From Foundations to Leadership
Day 1 of the conference (September 18)
14:40 - 15:20
Allies on the mission
Every mission counts on the support of trusted allies - that's why proven providers of cutting-edge cyber security technologies are joining our operation. These are the leaders with whom we jointly build effective strategies to protect against threats. The list of event partners will be updated on an ongoing basis.
Sitemap
Your operational zone: the Marina Club Hotel***** - an exclusive mission base on Lake Vulpinskie, located just 9 km from the center of Olsztyn. Surrounded by forest and water, the facility offers ideal conditions for relaxation after intensive operations and full conference facilities for the most demanding agents. This is where your mission will begin - with a view of the lake, full comfort and silence that promotes concentration.
Logistics of the mission
You can get to the place on your own - the map is yours, the direction is set. For qualified participants we also have organized transportation - we will reveal the details when you contact us by phone.
briefing before the action
The mission is strictly stationary. We do not anticipate online participation, and the number of places is limited to a select group of participants. Each application goes to our headquarters and is subject to individual verification - the safety of the operation is a priority. If your application is qualified, we will provide details, including information on organized transportation, during a phone call.
It is not possible to attend an online meeting.
Each application is individually reviewed by us.
The number of places is limited.
XIX Integrity Partners
Security Days
Grand threat alert
Date: 18-19.09.2025
Location: Marina Club Hotel near Olsztyn