BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.devconf.info//devconf-cz-2026//talk//BW7YKY
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-devconf-cz-2026-BW7YKY@pretalx.devconf.info
DTSTART;TZID=CET:20260618T105500
DTEND;TZID=CET:20260618T111000
DESCRIPTION:Insider threats remain one of the most complex security challen
 ges because they originate from trusted identities with legitimate access.
  Traditional perimeter-based controls and static rule engines are no longe
 r sufficient to detect subtle misuse\, compromised accounts\, or risky beh
 avior.\n\nThis session explores how to build a unified behavioral view of 
 users by correlating identity context\, access patterns\, device posture\,
  network activity\, and sensitive data interactions. It demonstrates how A
 I-driven models create dynamic baselines of normal behavior and detect ano
 malies in real time.\n\nAttendees will learn how to reduce false positives
 \, move from reactive incident response to proactive risk management\, and
  design people-centric security monitoring architectures suitable for mode
 rn engineering environments.
DTSTAMP:20260430T125242Z
LOCATION:A113 (capacity 64)
SUMMARY:Secret Tips to Reduce Insider Threat Risks with Behavioral AI - Kar
 el Kotoun
URL:https://pretalx.devconf.info/devconf-cz-2026/talk/BW7YKY/
END:VEVENT
END:VCALENDAR
