Cybersecurity Metatrack 1

  •  TYPE: Track   DATES: November 13 - November 14, 2018
Conference Tracks

Tracks:

Zero Trust: Introducing a New Way of Thinking Into Your Cyber Strategy

Sessions:

From Network Protection to Data Security

Date: Tuesday, November 13, 2018 Time: 11:10-12:10 Location: Historische Kassenhalle

From Network Protection to Data Security
"Zero Trust" is the latest security buzzword from the vendors marketing department; but what it actually means for you means should vary depending on your business requirements. Properly aligning security architecture to enable the business strategy of the organisation is the key to deliver a Zero Trust architecture. But the solution could be anything from implementing identity-aware firewalls to the extremes of "BeyondCorp"; Google's firewall-less global network when the security posture...

Predictive Governance – Leveraging the Power of Identity Analytics
In this presentation, SailPoint will explain why Identity Analytics will change the way companies will think about CyberSecurity, by adapting ‘Predictive Governance’. Predictive Governance will enable organizations to be more effective and efficient at governing access without increasing the risk.

Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional

Date: Tuesday, November 13, 2018 Time: 12:10-13:10 Location: Historische Kassenhalle

Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional
Businesses are more data-driven than ever, but inaccurate and manipulated information threatens to compromise the insights that companies rely on to plan, operate, and grow. Unverified digital resource is a new type of vulnerability - one that is  chronically overlooked by digital enterprises. With autonomous, data-driven decision making, the potential harm from unverified digital resources become an enterprise-level existential threat. And then, there's a wider cybersecurity aspect...

Panel - Risk Assessment and Security Design
Zero Trust Security assumes that nothing in a companies ITinfrastructure like including users, endpoint devices, networks, and resources, is ever trusted. All interactions must be verified to decrease the chance of a security breach. Zero Trust Security ensures secure access to resources while significantly reducing the possibility of access by bad actors. In this paneldiscussion we will discuss the considerations companies should make before implementing Zero Trust Security...

Social Engineering: Threats and Prevention

Sessions:

Evolution of Social Engineering Tactics and Defenses

Date: Tuesday, November 13, 2018 Time: 11:10-12:10 Location: Carl von Gontard

Evolution of Social Engineering Tactics and Defenses
Social engineering strategies and tactics have changed over the years. When cyber defenses are deployed, sometimes the weakest link is in between the chair and the keyboard.  Fraud vs. erroneous acts, and why bad guys are motivated to social engineer victims: for example, criminals hijack dormant accounts, and trick victims into putting money into them, then it is immediately transferred out; these usually happen near close of business before a weekend. We will look at past and recent...

Social Engineering: Attack Techniques and Prevention
Social engineering attacks are becoming ever-more common and sophisticated, using manipulation through communications to lure victims into revealing sensitive information, click a malicious link or download a malicious file. Richard De Vere consults with organisations to analyse the risks and help improve defences against common social engineering attacks, he will be sharing some common techniques used by attackers and the best prevention measures to minimise successful attacks and...

What is Safe? Baby Don't Hack Me, Don't Hack Me, No More!
Topics include: - Defining penetration testing - Demystifying Hackers  - Social engineering for good and evil  - Identifying how to incorporate malicious views, marvelously (i.e. for good). 

Panel - Combating Social Engineering

Date: Tuesday, November 13, 2018 Time: 12:10-13:10 Location: Carl von Gontard

Panel - Combating Social Engineering
Using Social Engineering attacks cyber-criminals can get obtain confidential information from a private person or an employee of a company.  In this panel discussion speakers will discuss the current social engineering challenges and attack techniques. Panellists will focus on the ways companies can better prepare the employees for these threats and comment about the necessity of specific tools.

The Evolution of Social Engineering 2.0 and Its Role in the Modern Cybercrime. The Experience of the Project DOGANA
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. However, using Social Engineering to attack enterprises is not new – the presentation will show and explain which is the new level of sophistication, why SE is nowadays used in more than 92% of the successful attacks and what is the so called Social Engineering 2.0. This new evolution in cybersecurity can be called...

Cyber Threat Intelligence: Importance & Effective Use

Sessions:

Panel - Operationalizing Threat Intelligence

Date: Tuesday, November 13, 2018 Time: 14:10-15:10 Location: Carl von Gontard

Panel - Operationalizing Threat Intelligence
Cyber Threat Intelligence is being more widely used to gain better and deeper understanding of increasing number of cyberthreats. In this  discussion, the panellists will discuss the role of intelligence and the ways businesses can adjust and improve security operations. We will go through the steps which a company needs to follow to implement CTI. 

Information, Intelligence, and Human Factors
In this talk, the focus will be on differentiating between information sharing and intelligence sharing; why they're not the same and why that's important. Also creation of intelligence requirements that result in actionable intelligence reports. Thebackground of US ISACs and the sharing process will also be discussed. 

Panel - Cyber Threat Intelligence Best Practices

Date: Tuesday, November 13, 2018 Time: 15:10-16:10 Location: Carl von Gontard

Panel - Cyber Threat Intelligence Best Practices
In some cases, more data and information does not necessarily result in more clarity. In this session we will discuss the difference between more information and real intelligence. We will hear about the successful implementations of Cyber Threat Intelligence. 

Contextualising Cyber Threat Intelligence
Cyber Threat Intelligence is a hot topic. So much so, that attacks are constantly in the news and most medium to larger companies / organisations will have had some level of consultancy or internal development of a response or strategy. Ammi and John will use their experience as Intelligence Professionals to draw parallels with other types of crime and how contextualising Cyber Threat Intelligence enables the provision of wider [holistic] uses, including operational, tactical and...

Security as a Requirement for Governance & Privacy

Sessions:

Three Factors Marginalising the Historical Role of the CISO

Date: Wednesday, November 14, 2018 Time: 14:10-15:10 Location: Carl von Gontard

Three Factors Marginalising the Historical Role of the CISO
Far from being reinforced by the constant avalanche of cyberattacks and data breaches of the past few years, the CISO role is still rarely a true C-level function and is being marginalised by a number of long term trends: Is the CISO an outdated concept? And what to do about it?

Panel - Life Under GDPR and Its Implications on Cybersecurity
Security professionals are facing increasing challenges, even more so after General Data Protection Regulation (GDPR) came into force in May this year. In this panel we will discuss if the companies can really be fully compliant and the panellists will make predictions on the expected enforcement activities.  ePrivacy regulation will need to be accounted for as well in close future. 

Balkanization and IT Business Risk - How to Engage with a Divided Internet
"Balkanization of the Internet". A growing seclusion of regional parts from the general connectivity and access to information of the world, leading to tensions between internationally engaged companies that serve customers worldwide and their workforce and operations that  is  bound by local laws (or the laws of the country in which they store data). It is not only in the big headlines of Russian authorities attempting to ban a messaging app (leading to the indiscriminate...

Protecting What Matters (and Knowing How Well You Are Doing It…..!)

Date: Wednesday, November 14, 2018 Time: 15:10-16:10 Location: Carl von Gontard

Protecting What Matters (and Knowing How Well You Are Doing It…..!)
This presentation will address how an effective cybersecurity programme underpins and enables all areas of a business to be successful. It will provide tips and techniques on how to embed and implement security practices as business as usual, with a governance programme that enables you to meet your compliance requirements.

GDPR as a Driver for Business Process Security
With the GDPR starting May 25 th  2018, business processes face numerous challenges when transforming to meet required measures. Not only process managers, also compliance officers and IT specialists need to make sure that their processes are compliant. Technical and organizational measures have to address the entire enterprise and its process landscape. With the implementation of process automation supported by human workflows, compliance of the actual fulfillment of a process can be...

Customer Data Management: Strategic Challenges and Solutions
Digital transformation, new digital business models, and technological trends such as artificial intelligence will revolutionize customer relations. It becomes indispensable to personalise communication to the customer and to address him always in the right context. Integrated customer data management forms the basis for this, opening up new sales potential and improving the customer experience. In this talk, you will learn more about the strategic challenges that come with the...


Stay Connected


Berlin, Germany

Conference

Cybersecurity Leadership Summit 2018 Europe

Language:
English
Registration fee:
€1200.00 $1500.00 S$1920.00 13200.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 12 - 14, 2018 Berlin, Germany

Partners

The Cybersecurity Leadership Summit 2018 Europe is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00