CP4 Conference

About the CP.4 Conference

Cybercrime.4 – Technologies (CP.4) is the fourth edition of an international conference dedicated to the use of modern technologies in the prevention, detection and combating cybercrime. The conference, initiated by PPHS, took place on 24–26 March 2026 at the Police Academy in Szczytno, Poland.

In the era of rapid digital transformation and the continuously growing scale and complexity of threats in cyberspace, cybercrime is evolving towards increasingly advanced, automated and organised forms of activity. Cybercrime is more frequently conducted as organised criminal activity, often operating under crime-as-a-service models, including financial crime, large-scale fraud schemes and attacks targeting information and communication systems.

At the same time, the ability to efficiently collect and analyse digital data, as well as to effectively use electronic evidence in investigative and judicial proceedings, has become increasingly critical. Equally important is the capability to continuously identify, monitor and analyse cyber threats, supporting timely responses and well-informed decision-making by law enforcement and security institutions.

The CP.4 Conference serves as a platform for the exchange of knowledge and operational experience between representatives of law enforcement agencies, public administration, the scientific and research community, and the technology sector. The primary objective of the event is to support the development of law enforcement capabilities in combating cybercrime, enhance interinstitutional and cross-border cooperation, and identify technological and organisational solutions addressing both current and emerging cyber threats.

The conference programme included plenary sessions, hands-on practical workshops, and a technology presentation and exhibition area, providing participants with the opportunity to directly explore innovative tools and solutions supporting the fight against cybercrime, digital investigations and cyber threat mitigation.

Key Objectives of CP.3

Focusing on the real needs of the services and emphasising the role of digital competencies in the training of officers. Particular emphasis will be placed on the skills necessary for the effective securing of digital evidence.

Industry leaders will present innovative technologies supporting investigative processes. Experts will demonstrate effective methods of data analysis and the practical application of these tools in everyday work.

Umożliwienie budowania relacji pomiędzy przedstawicielami służb, osobami decyzyjnymi,  światem nauki oraz sektorem technologicznym. Wspólna dyskusja pozwoli wypracować skuteczne strategie dostosowane do aktualnych potrzeb.

Summary Report

As every year, we have prepared a report summarising the conference. We encourage you to read it to learn more about the details and outcomes of the event.

Thematic Areas

Modern technologies and tools supporting the fight against cybercrime

Cybercrime – threat identification, analysis and forecasting

Interinstitutional and cross-border cooperation in countering cybercrime

Development of competencies, procedures and operational capabilities of law enforcement agencies

Organisers & Patrons

Registration

As the maximum number of participants has been reached, registration for the CP.4 conference is now closed. If you wish to be placed on the waiting list, please contact us at: cp@ppbw.pl.

Participant registration is open until 16 March or until all available places are filled. Completion and submission of the registration form does not constitute confirmation of participation in the conference. Each application is reviewed individually, and participation is determined by the order of registration. The Organizer reserves the right to refuse participation in the conference. Any matters not regulated in this registration form will be agreed individually.
Payment entitles participants to attend the open conference sessions held on 24–26 March 2026, includes conference lunches, and provides the opportunity to participate in the networking event on 24 March. The Organizer reserves the right to limit access for business participants to selected sessions, including 30-minute presentations and 60-minute workshops. Closed sessions will be clearly marked in the conference programme.
Settlement for accommodation and meals will be carried out directly with the Police Academy based on an invoice issued by the Academy. Invoices will be available for collection on site. PPHS as a co-organiser of the conference, collects the above information solely for organisational purposes. A detailed price list for accommodation and meals will be provided to participants after approval by the Police Academy. Accommodation is available in a limited number of single or shared rooms.
Przetwarzanie danych*
Regulamin*
MailerLite Zgoda
Participation Option / Package Selection*
The participation of company representatives is included in the package price (2 participants for Premium and Standard packages, 1 participant for the Enter package). It is possible to register an additional participant for an extra fee – detailed costs will be provided by the organizer via email.
Titles of presentations and workshops, as well as details regarding exhibition stand equipment, will be agreed after the registration has been completed and confirmed.
Przetwarzanie danych*
Regulamin*
MailerLite Zgoda

Business Participants

Time left until CP 4:
00

days day

00

hours hour

00

minutes minute

00

seconds second

Venue

Police Academy in Szczytno
Marszalka Jozefa Pilsudskiego 111 Street
12-100 Szczytno, Poland
CP.3 Conference / Konferencja CP.3

Contact

Malgorzata Wolbach

Junior Business Technology Manager
Polish Platform for Homeland Security
e-mail: cp@ppbw.pl

Check the Previous Editions

ul. Slowackiego 17/11, 60-822 Poznan, Poland
ul. Slowackiego 17/11
60-822 Poznan, Poland
Tax ID: 7831618232
REGON No: 300294630
KRS No: 0000251345
Join our Newsletter!
Stay up to date with important news.
MailerLite*
SHIELD4CROWD has received funding from the European Union's Horizon Europe research and innovation programme under grant agreement No 101121171

Dołącz do naszego Newslettera!

Dołącz do PPBW

    MailerLite Zgoda

    Join our Newsletter!

    PPHS's Trainings Contact Form

    MailerLite Zgoda

    Join Our Team

      Consent*
      MailerLite Zgoda
      Logo creotech GEO

      Company profile

      CreoTech Geo P.S.A. develops advanced drone and satellite-based applications. The company specializes in airspace management systems, including solutions for managing drone traffic (DTM) and General Aviation (GA) operations. It also develops drone mission simulators and counter-UAS systems. The company possesses strong competencies in both hardware and software design and development, working closely with its parent company, Creotech Instruments S.A., and leveraging its technological and engineering resources.

      Elephantastic

      Company profile

      Elephantastic: OSINT investigation platform. Our platform enables the collection, normalization, and indexing of mixed data from multiple sources. With a range of powerful features and capabilities, Elephantastic empowers users to make sense of complex data sets and uncover valuable insights. Our technology is mainly used by Law enforcement and Intelligence services.

      Searchlight Cyber

      Company profile

      Searchlight Cyber provides advanced intelligence platforms such as Cerberus and DarkIQ, which offer continuous monitoring of current content as well as access to an archive of historical information from the Dark Web. Cerberus is a powerful, world-leading platform for conducting investigations and securing evidence in the “Dark Web”, the criminal underground of the internet. The platform is used by law enforcement agencies and government institutions around the world, helping to identify and secure evidence related to, among others, drug trafficking, human trafficking, arms trading, CSEA material, and ransomware group activity. Thanks to this platform, perpetrators involved in the largest Dark Web investigations have been brought to justice. The Assetnote product – for attack surface management – and DarkIQ – for continuous monitoring of threats in the Dark Web – further strengthen these capabilities by providing automated, hourly scanning to detect and verify vulnerabilities, including zero-day vulnerabilities. Through Searchlight Cyber products, a proactive approach to cybersecurity helps law enforcement agencies, government institutions, and companies move from reactive incident response to a threat intelligence-driven defence strategy.

      Team Cymru

      Company profile

      Team Cymru is the trusted intelligence partner to the world’s most targeted organizations, transforming unmatched global visibility into actionable insights that protect nations, businesses, and communities. Powered by Pure Signal™, the largest source of context-rich telemetry beyond the network edge, Team Cymru empowers defenders by reducing noise, accelerating decision-making, and driving real-world outcomes. From threat hunting and CTI to third-party risk and national defense, our solutions provide instant clarity and unmatched visibility. Through our Community Services, we also deliver no-cost threat detection, DDoS mitigation, and intelligence to over 177 CSIRTs across 85+ countries.

      You Control Logo

      Company profile

      YouControl is an online analytical system for comprehensive due diligence of companies and individuals. The platform aggregates data from official registers, sanctions lists, court decisions, media sources, and international databases to help businesses identify risks, ensure compliance, and make informed decisions when working with partners, clients, and suppliers.

      Cyberium

      Company profile

      CYBERIUM specialises in network segmentation for critical entities, with strong expertise in the areas of industrial/OT networks, government agencies and Cloud infrastructures. Our innovation allows manufacturers to adopt advanced solutions such as unidirectional Data Diodes, compliant with strict market standards (ANSSI, CCEAL7+, etc.): while preserving their usual data flows and protocols, they can take advantage of the whole data from their infrastructures, even highly sensitive ones. Customers thus meet security directives such as NIS2, while continuing their digital transformation.

      Cellebrite

      Company profile

      Cellebrite technology enables rapid processing and analysis of large volumes of digital data from multiple sources. The system automatically identifies relationships between individuals, events, and data, reconstructs timelines, and consolidates information from multiple extractions into a unified analytical view. This solution significantly reduces analytical workload, minimizes manual tasks, and ensures full evidentiary integrity in criminal and financial investigations.

      Logo ENIGMA

      Company profile

      This solution significantly reduces analytical workload, minimizes manual tasks, and ensures full evidentiary integrity in criminal and financial investigations.

      NUIX

      Company profile

      Nuix is an Australian company providing advanced solutions for working with large and complex datasets. Nuix Neo is a modern central platform for digital evidence analysis, supported by artificial intelligence and automation. The system can operate without an Internet connection, supports custom scripting, and offers a wide range of analytical modules and collaborative features. The platform is designed to combat cybercrime and support digital investigations by enabling rapid detection of patterns, anomalies, and relationships within massive datasets.

      Recorded Future

      Company profile

      Recorded Future provides a leading Threat Intelligence Cloud solution that leverages advanced data analytics and machine learning to transform fragmented information into actionable operational intelligence. The platform supports the proactive identification of threats and the mitigation of digital risk through, among others, the following capabilities:

      • Automated collection and correlation of data from open sources (OSINT), the darknet, and closed sources in order to detect anomalies and planned hacking campaigns.
      • Prioritization of vulnerabilities based on the actual degree of their exploitation by criminal groups, which optimizes the patching process.
      • Early detection of compromised credentials of employees and consumers.
      • Continuous monitoring of an organization’s digital exposure, including the detection of typosquatting, intellectual property leaks, and unauthorized use of trademarks.
      • Dynamic assessment of the risk profile of entities within the supply chain, enabling immediate response to incidents affecting third parties.
      Revel.io

      Company profile

      REVEL·IO is a new European alternative of Mobile Device Forensic Access Tool enabling to unlock more quickly and extract mobile devices for digital evidence.