XIX Integrity Partners Security Days

September 18-19, 2025

Marina Club Hotel near Olsztyn

Image

How to secure an organization when the user is a human, an app, an AI bot? See how to build a comprehensive strategy to protect your organization from cyber threats, taking into account all types of digital identities.

Grand

Threat

Alert

Introduction to the mission

This is not another theoretical briefing. This is a conference for IT professionals, security managers and technology leaders who are looking for concrete solutions, not empty slogans. We share practical knowledge, show real threat scenarios and inspire action in a digital world full of dangers.

Flashback

from a previous mission

A year ago, our mission was held at the Grand Hotel TIFFI in Ilawa, where an attendance record was set in terms of both participants and technology partners. The theme was LEGO Masters - a symbol of precision security strategy building. The focus was on cyber security transformation, with artificial intelligence playing a key role.

Click to play video
Integrity Partners Security Days 2024Integrity Partners Security Days 2024Integrity Partners Security Days 2024Integrity Partners Security Days 2024
Integrity Partners Security Days 2024Integrity Partners Security Days 2024Integrity Partners Security Days 2024Integrity Partners Security Days 2024

agenda

Day 1 - September 18 (Thursday)

10:30 - 10:50

Welcome - official opening of the conference

ImageImage

10:50 - 11:20

Remember! The City Never Sleeps – access control and identity compliance in the pulsating Cloud-First era

Image

Jakub Dudek

CyberArk

ImageImage

Piotr Pietras

SailPoint

11:20 - 11:50

CyberArk City: DevOps Edition, humans and AI agents – secure access, no secrets, no waiting.

Image

Michal Kudela

Integrity Partners

ImageImage

Luke Przybylski

CyberArk

11:50 - 12:20

Grand Theft Identity: Silverfort Mission.

Secure identities before they are seized.

Image

This session will introduce detection mechanisms and secure service accounts. We will also demonstrate how Silverfort enforces MFA everywhere, even in places where it was previously impossible, e.g. legacy apps, RDP, remote powershell, OT.

Image

Pawel Jakacki

Silverfort

Jakub Banaszek

Integrity Partners

Image

12:20 - 12:40

From a Flood of Alerts to a Sharp Response: Practical Application of AI in Incident Analysis with Elastic

Image

Piotr Karpinski

Integrity Partners

ImageImage

Pawel Krześniak

Elastic

Every day, SOC analysts are drowning in a sea of false positives and repetitive tasks. How can you regain control? In this presentation, we'll demonstrate how Elastic Attack Discovery, powered by AI Assistant, filters the noise and automatically correlates events that truly matter.

We will focus on real-world scenarios, showing how Machine Learning and GenAI reduce analysis time from hours to minutes, allowing teams to focus on strategic defense rather than firefighting.

12:40 - 13:00

Coffee Break

13:00 - 13:20

OPSWAT CASINO invites you:

FILE Security UseCase BINGO

Image

How many ways to avoid file-derived threats can you fit on one BINGO game board?A combination of well-known engines and lesser-known patented technologies minimize the risks that files bring to your organizations processes -> no patient zero, almost in real time. What can come out of this, and how to incorporate security into your journey to digitize your processes and share information, you will find out if you let yourself be invited to my "table" for 20 minutes and play with OPSWAT.

Image

Lukasz Okólski

OPSWAT

13:20 - 13:40

Mission Ivanti MDM - the security of your phone

Image

Criminal activities, ransomware attacks, data theft and phishing. What dangerous things can happen on your phone and how to protect yourself from them?

Image

Bartłomiej Cholewa

Ivanti

13:40 - 14:40

Lunch break

14:40 - 15:20

Panel discussion - "Journey to Identity Security Maturity: From Foundations to Leadership". - GTA Edition

Join us for an inspiring panel where experts - long-time practitioners will talk about their journey

- from the first steps and foundations to mature, comprehensive Identity Security strategies.

Pawel Mosurek

Head of Office

Production Security
BNP Paribas

The panel will include:

Maciej Gdyk

IAM Lead
KRUK S.A.

Joanna Chomyszyn

Delivery Manager

Integrity Partners

Artur Wrześniewski

Identity Security

Delivery Director

Integrity Partners

Dariusz Dylski

Global IT IAM & PAM

Solution Architect
JTI

15:20 - 15:40

Attention this is an attack! How to prepare a data protection strategy in case of a cyber attack?

Image

Your data is a safe full of treasure - the target of any cyber attack. During the presentation, we will present the Thales Data Security Platform solution, which combines encryption, key management and access control to create an impregnable protective shield.

Image

Jaroslaw Ulczok

Thales

15:40 - 16:00

Coffee break

16:00 - 16:20

Has SIEM really died? Or has it just advanced to the next level? Singularity AI SIEM - the next stage of the game from SentinelOne

Image

In this presentation, you'll get into the world of cyber security like an open city in GTA.🚦


Instead of stolen furs and chases, you'll be faced with Singularity AI SIEM from SentinelOne - technology,

that changes the rules of the game and gives you full control over the map of your IT infrastructure.

Image

Seweryn Jodlowski

SentinelOne

You'll learn how artificial intelligence acts as the ultimate "chit" in the fight against cyber criminals - detecting and neutralizing threats in real time, before they can do damage. You'll learn how to automate security analysis and take full visibility, like a "god mode" in the IT world.

16:20 - 16:40

NDR - Nitro and a sixth sense for networks.
When detection becomes strategy

Image
Image

Jaroslaw Chodkiewicz

Greycortex

Monika Bakura

Greycortex

NDR is no longer just an "intrusion detector." In a modern approach, it becomes a strategic sense of the organization that:


- senses subtle anomalies,

- understands context,

- gives an information advantage before serious threats materialize.

16:40 - 17:00

MDR: San Securo - the cyber security mission

Image
Image

Adam Brzozowski

Cyberoo

The year is 2025 and the digital streets are teeming with criminals - ransomware, phishing, attacks without warning. Traditional security can't keep up, and IT teams are drowning in alerts. It's time to turn on survival mode with real support. MDR (Managed Detection and Response) is an external patrol that monitors, detects and responds 24/7 - before the damage is done. Instead of patching holes on your own - you get into the game with security that really embraces the subject. MDR - security that acts before you panic.

17:00

Conclusion of Day 1 of the conference

17:00 - 19:00

Check-in and free time

19:00

Gala dinner

Day 2 - September 19 (Friday)

10:00 - 10:30

Grand Threat Analytics - patrolling the digital streets looking for attacks and scams and setting traps. It's time to show who rules the city with traps.

Image

Bartosz Krupowski

Integrity Partners

ImageImage

Robert Dabroś

Fidelis

Welcome to Cyber Vice City - a city where the artistry of attacks has more horses than sporting furies, phishing is a modern form of pickpocketing, and cameras don't look at the streets, but at network sessions.


In this talk, we'll take a ride through the dangers of the modern online world, show how to detect the illegal "quests" of cyber crooks, and how to ensure digital visibility before someone steals a save from your server.

10:30 - 10:50

Jump on SASE: a discussion on taking control of the network and its security

Image

In an era of increasing cyber threats, distributed work environments and the growing importance of the cloud, traditional network security models are no longer sufficient. Our presentation will focus on the SASE (Secure Access Service Edge) concept - an approach that combines network and security functions in a single, centralized architecture delivered from the cloud.

Image

Andrzej Kroczek

Zscaler

10:50 - 11:20

Klasycznie czy dynamicznie? – systemy cyber ochrony, a analiza dynamiczna ataków wg. Trellix.

Image

Łukasz Gliński

Arrow

Image

Świat pędzi, AI za każdym zakrętem, ale na końcu to Analityk SOC potrzebuje konkretnego raportu popartego odpowiednim Threat Intelem na temat incydentu, który został wykryty.

11:20

Conclusion of the second day of the conference

panel discussion

Imagine that building an identity security strategy is not an office procedure, but a mission in the open world. You start from scratch, as a novice taking the first steps, and over time you gain the experience, contacts and tools to ascend to the level of a leader who controls the entire field.


Join us for an inspiring panel where experts - long-time practitioners - will talk about their journey - from the first steps and foundations to mature, comprehensive Identity Security strategies.

  • We'll show why a solid assessment is the foundation without which any action will quickly go awry.
  • You'll hear stories from organizations that got in the game and developed Identity Security programs - including what went wrong and what lessons they learned.
  • You'll learn about the journey from the first, chaotic efforts to mature, coherent strategies.
  • We'll talk about the role of a partner who brings experience and helps you move through the stages.
  • We'll look at upcoming trends and changes that could completely change the rules of the game in the coming years.

This meeting is an opportunity to see what the real battle for identity security looks like - not on virtual streets, but in the world of business and technology. Join and play this mission together with us.

Dariusz Dylski

Global IT IAM & PAM Solution Architect
JTI

Maciej Gdyk

IAM Lead
KRUK S.A.

Joanna Chomyszyn

Delivery Manager / Integrity Partners

Artur Wrześniewski

Identity Security Delivery Director / Integrity Partners

Paweł Mosurek

Director of Production Security Office
BNP Paribas

The panel will include:

Journey to Identity Security Maturity: From Foundations to Leadership

Day 1 of the conference (September 18)

14:40 - 15:20

Allies on the mission

Every mission counts on the support of trusted allies - that's why proven providers of cutting-edge cyber security technologies are joining our operation. These are the leaders with whom we jointly build effective strategies to protect against threats. The list of event partners will be updated on an ongoing basis.

BMC Software logo
Elastic logoImage
ImageF5 logoF5 logo

Sitemap

Your operational zone: the Marina Club Hotel***** - an exclusive mission base on Lake Vulpinskie, located just 9 km from the center of Olsztyn. Surrounded by forest and water, the facility offers ideal conditions for relaxation after intensive operations and full conference facilities for the most demanding agents. This is where your mission will begin - with a view of the lake, full comfort and silence that promotes concentration.

Image

Force 100, 11-036 Gietrzwałd

Marina Club Hotel near Olsztyn

Marina Club koło OlsztynaMarina Club koło OlsztynaMarina Club koło OlsztynaMarina Club koło Olsztyna

Logistics of the mission

You can get to the place on your own - the map is yours, the direction is set. For qualified participants we also have organized transportation - we will reveal the details when you contact us by phone.

Train

Car

Coach

Organized transportation

Get in touch with us!

marketing@integritypartners.pl.

CHECK THE ROUTE

210 km from the center of Warsaw,

about 2,5 hours driving

On your own

briefing before the action

The mission is strictly stationary. We do not anticipate online participation, and the number of places is limited to a select group of participants. Each application goes to our headquarters and is subject to individual verification - the safety of the operation is a priority. If your application is qualified, we will provide details, including information on organized transportation, during a phone call.

It is not possible to attend an online meeting.

Each application is individually reviewed by us.

The number of places is limited.

XIX Integrity Partners

Security Days

Image

Grand threat alert

  • The number of seats is limited.
  • Each application is individually reviewed by us.
  • It is not possible to attend the meeting online.

Date: 18-19.09.2025

Location: Marina Club Hotel near Olsztyn

© Copyright 2025 Integrity Partners

Privacy policy