Time | Network Management | Legislation and Regulation |
|---|---|---|
09:00 | Registration |
|
10:00 | Intro to non-WiFi wireless protocolsTomáš Kirnak | NetCore j.s.a. (Unimus) WiFi is far from the only wireless protocol that sees mass adoption today. In this presentation, we look at other protocols that exist across the wireless spectrum. HaLow, LoRa, Z-Wave, Zigbee and Thread will be discussed, and you will learn about the use-cases and differences across these protocols. |
|
11:00 | Optical Foundations for IP Engineers: From Fiber Basics to CWDM/DWDM and Link BudgetingAndreas Glatz | Flexoptix This talk provides a concise introduction to essential optical fundamentals for IP networking professionals, covering topics such as single-mode and multi-mode fiber and their structural and operational differences, common connector types and their usage, and a detailed look at optical losses. |
|
11:40 | DNS PATROL (Safe DNS Project for Vysočina Region)Miroslav Hampl | CZ.NIC The Safe DNS project for Vysočina Region represents a modern approach to protection against DNS threats. The aim is to increase security and provide an effective tool for managing and monitoring DNS traffic. |
|
12:00 | Lunch |
|
13:00 | Welcome |
|
13:10 | DNS Under Control: How to Build a Modern Secure Resolver for an ISPTomáš Hála, Lukáš Vacek | CZ.NIC We will present an approach to designing and operating a secure DNS resolver for an ISP. We will discuss the principles of a robust high-availability architecture, DNSSEC validation, and the use of RPZ zones to effectively block malicious domains. We will go through practical procedures and configurations from real-life operations. | Challenges for the Regulator in 2026Marek Ebert | ČTÚ The presentation focuses on the challenges of regulating the digital space in the Czech Republic in 2026. It introduces the audience to the regulator's current responsibilities, which now extend beyond the telecommunications sector to include information society services. The presentation will also briefly review 2025, including the oversight of election fairness in the digital space. |
13:30 | DNS4EU from the RIPE Atlas perspectiveAlex Semenyaka | RIPE NCC In 2025, Europe launched a regional competitor to projects such as Google DNS and Cloudflare DNS: DNS4EU. For two months, I conducted DNS measurements from European, almost-European, and completely-non-European countries to the servers of this project, and in this talk I would like to present some preliminary results. | Incident Reporting Under the New Cybersecurity ActJiří Valtr | NÚKIB The new Cybersecurity Act fundamentally changes the way cyber incidents are reported and evaluated in the Czech Republic. The presentation will provide a clear overview of the main differences from the existing legislation, introduce new obligations resulting from the implementation of the NIS2 Directive and show how the whole process of incident reporting and handling of incidents by CERT works in practice. |
13:50 | Evolution of DNS – The New DELEGationPetr Špaček | Internet Systems Consortium A brief introduction to the newly proposed delegation mechanism in DNS, known as DELEG. We will explain how it differs from the current delegation process and demonstrate what the future capabilities of DNS could be. | The New National Cyber Security StrategyPetr Procházka | NÚKIB This presentation will introduce the National Cyber Security Strategy, approved in September 2025, which sets out the vision and goals of the Czech Republic in this area for the coming years. |
14:10 | Post-quantum Cryptography for DNSSECOndřej Surý | ISC & Ostravská Univerzita The deployment of quantum computing-resistant cryptography for DNSSEC is fraught with pitfalls due to the limitations of the DNS protocol. This talk will present current and future possibilities of using post-quantum cryptography for DNS security. | Challenges Faced by NÚKIB PortalPetra Kajánková | NÚKIB The launch of the National Cyber Security Agency (NÚKIB) portal has brought a new way for entities to comply with their obligations under the Cybersecurity Act and the NIS2 Directive. The aim of this presentation is to assess how the portal has performed in the first months of operation – what has been achieved, what challenges the team has encountered and what lessons can be taken forward to the next phase of development. The talk will offer an "inside" view of the preparation and launch of the system, including technical, procedural and usability aspects. |
14:30 | Coffeebreak |
|
15:00 | The Future of Whois - RDAPUlrich Wisser | ICANN Although RDAP is not a new protocol, most people still use whois. Starting in January this year the first top level domains have switched off their whois servers. In this talk I try to give an overview of RDAP, its deployment and usage. | Attention, AI Regulation!Marek Vrbík | ČTÚ The European Artificial Intelligence Act ushers in a new era of digital technology regulation. The Czech Telecommunications Office will become one of the key supervisory authorities overseeing compliance with AI rules. The talk will outline our preparations for this role and what it will mean for those subject to the standards. |
15:20 | How to draw network maps with NetboxLadislav Loub | CESNET At last year’s CSNOG, we showed our way to the open-source network management tool Netbox. This year, we’ll follow up and present all the things you can save in Netbox and then display, for example, in a map format. | Alice in Darknetland, a Place That Would Terrify Even the Hatter...David Malaník | Univerzita Tomáše Bati ve Zlíně Let’s take a look at the ways attackers can get around the rules for blocking “interesting” data sources. How to conduct Darknet reconnaissance safely, and what we’ll have to learn to reckon with when it comes to anonymizing services on the network. Presentation: 60 minutes |
15:40 | Defending Against IP SpoofingZbyněk Pospíchal | Quantcom Tools to protect network infrastructure against IP spoofing have been stagnant for many years. However, RFC 8704 introduces EFP-uRPF and other options that can change the current situation. And beyond that, there are things that can be done today. |
|
16:00 | The Evolution of Network Defense at CESNETTomáš Košňar | CESNET CESNET has long been developing a set of tools for monitoring, managing, and regulating traffic, detecting attacks and mitigating them. These tools can be used independently of each other, but they can also be assembled into modular units for automatic defense of the network and its users, even in combination with self-service traffic management by the users themselves. The aim of the talk is to show the development and variants of the architecture of this solution, as well as lessons learned from some stages of development as inspiration for others. |
|
16:20 | Matrix: An Open Standard for Secure CommunicationMarian Rychtecký | NIX.CZ Matrix has become one of the fastest growing open communication protocols in the field of secure, decentralized, and scalable team communication. The presentation will show why Matrix is attracting the attention of companies, government agencies, and security communities, how end-to-end encryption (Olm/Megolm), federation, and identity work, and how it can be integrated into existing infrastructure. |
|
16:50 | End of Day 1 |
|
19:00 | Transfer to the social event |
|
19:00 | Social Event |
|
Time | Network Management | Academic Projects |
|---|---|---|
09:30 | Registration |
|
10:00 | Segment Routing in BIRDMatyáš Kroupa | Masarykova univerzita In this presentation, I’ll show you how I implemented the initial Segment Routing support in the Bird routing daemon as part of my thesis and what problems I encountered in the process. | A software tool for implementing an ISMS in an academic environmentJakub Sauer | Masarykova univerzita The contribution introduces a software tool developed within the FR Cesnet project that facilitates the implementation of an Information Security Management System (ISMS) at public universities. We will focus on the key principles on which the solution is built and show how it supports effective risk management in an academic environment. The goal is to demonstrate how this approach simplifies ISMS implementation while also contributing to the development of competencies in the field of information security. |
10:20 | Multipath Route DiagnosticsAlexander Zubkov | Qrator Labs CZ It is not uncommon for transit ISPs to use multipath routing in their networks. However, sometimes one of these paths can fail in an unusual or unpredictable way. In this presentation, I will share examples from my experience and demonstrate the tools I use to diagnose such situations. | Methodological Support for Organizational Log ManagementStanislav Špaček | Masarykova univerzita The talk will show real-life applications of EVPN and the cases when a simple factory built on EVPN/VXLAN is quite sufficient. |
10:40 | Updates on bgproutes.io, and How It Can Expand Internet Routing Visibility with BMPThomas Holterbach | University of Strasbourg In this talk, we will introduce bgproutes.io, a new BGP data collection platform, highlight how it differs from other collection platforms and explain how the community can use the data or the analytic dashboards. | Making full use of virtualization – the NetLAB virtual laboratory systémJaroslav Burcik, Marcel Poláček | ČVUT v Praze Introduction of the NetLAB project and its development over the past year. |
11:00 | BGP EVPN – One Control Plane to Rule Them AllRadim Roška | ALTEPRO solutions BGP EVPN can now completely replace the previously used MP-BGP and can serve as a universal control plane over MPLS, VXLAN and Segment Routing (SR-MPLS, SRv6). | Using the Digital Europe Programme to Fund Operational Cybersecurity at UniversitiesMartin Laštovička | Masarykova univerzita The Digital Europe Programme offers a unique opportunity to obtain funding for development and operational security, but navigating its terms and conditions is not always easy. This talk will therefore present the programme’s objectives, its structure and areas of support, as well as the current project calls and conditions of participation, including funding details. |
11:20 | Coffeebreak |
|
11:40 | ASPA: A New Way to Secure BGPOndřej Caletka | RIPE NCC RPKI allows the exchange of routing information to be secured using cryptographically verifiable databases of IP address holders and autonomous system numbers. Until now, it has only been used for autonomous system source control (Route Origin Authorization). The new application also adds partial route checking (Autonomous System Provider Authorization). | Automated Security Data Analytics at ScaleDaniel Tovarňák, Matúš Raček | Masarykova univerzita In this talk, we will share our experience with the development, maintenance, and operation of a modern security data automation platform at a large scale. We will discuss security telemetry data as well as contextual data that we use in our environment to support our security team. Multiple analytical scenarios with varying level of automation will be discussed, including the ultimate use-case – building huge knowledge graphs for cyber situation awareness. |
12:00 | When It Can’t Be Done by Hand – Automated Network OS Upgrades in Datacenters with AnsibleTomáš Procházka | Seznam.cz How to upgrade hundreds of network devices without turning it into an endless and exhausting marathon? In this talk, we'll look at the practical deployment of automation for mass upgrades in a datacenter and at upgrading a redundant network layer without administrator intervention. | Cyber situational awareness and resilience in the Resilmesh projectMartin Husák | Masarykova univerzita In the ever-evolving cybersecurity landscape, the Resilmesh project stands out as a pioneering initiative focused on the holistic protection of critical infrastructures. |
12:20 | Precise Time and Frequency Transmission with White RabbitVladimír Smotlacha | CESNET White Rabbit technology, which is based on the PTP protocol, allows time to be transmitted in an optical network with an uncertainty of less than 1 ns. It thus significantly outperforms GNSS-based methods (GPS, Galieleo etc.) and is also suitable for atomic clock comparison and other applications in time and frequency metrology. | Who is attacking the Turris routers?Michal Hrušecký | CZ.NIC A few statistics from attacks on Turris routers. Which services are popular targets? How do attackers behave? And are attackers already capable of attacking over IPv6? |
12:40 | Closing |
|
12:45 | Lunch |
|
Registration
Register early, as the number of spots is limited!
The price for a two-day ticket is 2,299 CZK, including VAT, and covers access to the conference and refreshments throughout the event.
Registration is available through the registration form of the CZ.NIC Academy, operated by the CZ.NIC association.
Student discount
We offer a limited number of tickets with a 50% discount (1,150 CZK) for students.
If you would like to take advantage of this offer, please write to info@csnog.eu and attach a valid confirmation of study or a copy of your student ID. Students who meet these requirements will receive a discount code that reduces the price of their registration by 50%.
Accommodation
The organizers of CSNOG 2026 do not provide accommodation.
For event participants, a limited number of rooms have been reserved at the Interhotel Zlín.
Single room:
2 120 CZK/night including breakfast and VAT
Double room:
2 380 CZK/night including breakfast and VAT
Business Suite:
2 990 CZK/night including breakfast and VAT
Please make your accommodation reservation via email at recepce@interhotelzlin.cz .
In the email subject line, please indicate the information about CSNOG 2026, and in the email, please provide:
- the dates of your stay
- the names of the guests
- billing details (if you require an invoice for your company)
Social event
Mařatice Wine Cellars
The CSNOG social evening will take place on Wednesday, January 21, from 19:00 at the Mařatice Wine Cellars – Vinohradská 379, Uherské Hradiště (map).
According to legend, Mařatice has been producing wine since the time of St. Cyril and Methodius and for the nearby pilgrimage monastery in Velehrad. The unique complex of local burgher wine cellars was once a favorite of notable figures in Czech history, such as Joža Uprka, Alois Jirásek, and Mikoláš Aleš. From the historic burgher cellars, a unique cellar labyrinth 250 meters long was created.
You can look forward to an evening filled with excellent wines from the Slovácko wine sub-region, a hearty traditional Slovácko dinner, and folk songs accompanied by a cimbalom. All of this will be complemented by a selection of beer and non-alcoholic beverages.
Transportation
Departure to Mařatice
18:30 PM – buses depart from the Congress Center in Zlín (map).
Return to Zlín
Buses from Mařatice to the Congress Center in Zlín (times will be specified).
Entry to the social evening is included in the conference ticket price.
Conference badges must be presented at the entrance.