Cybersecurity Metatrack 2

  •  TYPE: Track   DATES: November 13 - November 14, 2018
Conference Tracks

Tracks:

The New World of Security: User Behaviour Analytics

Sessions:

User Behavior Analytics: Can We? Should We? Must We? And if, How to Do It Right?

Date: Tuesday, November 13, 2018 Time: 14:10-15:10 Location: Historische Kassenhalle

User Behavior Analytics: Can We? Should We? Must We? And if, How to Do It Right?
User Behavior Analytics (UBA) or UEBA (User & Entity Behavior Analytics) is an important capability of a variety of products: Specialized solutions for UBA; IAM tools with built-in UBA capabilities; and various cyber-security products that also come with built-in UBA capabilities. The question to start with is: What is UBA really and how does it differ from e.g. Threat Analytics, SIEM, Access Governance, and other capabilities? Where is the benefit of UBA? Is it a nice-to-have or...

User Behaviour Analytics (UBA) - The Enterprise Value Proposition
This session explores what UBA is and the value it brings to enterprise security in context of other common controls and tools.  Chris will give some history of how user activity monitoring has changed, and its challenges, and the state today. Finally, we will discuss how this is changing and what to look out for as organisations are consuming more cloud-based services.

Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber Leadership

Date: Tuesday, November 13, 2018 Time: 15:10-16:10 Location: Historische Kassenhalle

Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber Leadership
The aim of this presentation is to map the comprehensive human factor and cybercrime landscape categories (Motivations, the category of the perpetrator, category of the targets and victims, opportunistic and targeted attacks, the jurisdiction of the target, technology versus social engineering). Mapping these two pillars provides indicators that can be integrated in AI cybercrime predictive analysis, construct a model of the man-cognitive system and a cyber leadership network based on the...

Panel - AI and the Future of Cybersecurity
 Advanced analytical technologies will help organizations in their fight against cyber-attacks. These technologies assist in detecting potential attacks at an earlier stage, as well as enabling the identification of complex attack patterns that span various systems. In this panel we will discuss the role of AI in the future of cybersecurity, possibilities of using it as a weapon by adversaries and the possibility of developing preventing techniques using Machine Learning and Deep...

IoT and Industrial IoT: Risks and Concerns

Sessions:

The Sorry State of Consumer IoT Security and How Can We Possibly Fix it

Date: Wednesday, November 14, 2018 Time: 11:10-12:10 Location: Historische Kassenhalle

The Sorry State of Consumer IoT Security and How Can We Possibly Fix it
The Internet of Things has already become an integral part of our daily lives, whether we like it or not. In the office, at home, and even in the street, we are surrounded by a multitude of smart devices ranging from smart TVs and fridges to network routers, voice assistants and parking meters. No matter how different their functionality is, however, all these “things” share two major common traits: they are all connected to the public Internet and they lack the most basic...

Cyber Security as Part of Industry 4.0
 - More aggressive, complex and well organized: Cyber threat landscape on the rise - Cyber Security – added value for industry 4.0? - Industry 4.0 needs company-specific security strategies

Effective Countermeasures For Securing Critical Infrastructure – A View On The Human Aspect

Date: Wednesday, November 14, 2018 Time: 12:10-13:10 Location: Historische Kassenhalle

Effective Countermeasures For Securing Critical Infrastructure – A View On The Human Aspect
When we think of security in the OT / IoT space, we are very focused on technological measures and controls. However, the recent incidents in this field showed that security events are not only based on a failure of technical controls. The 2017 Triton malware attack on SaudiAramco is a good example of what can happen based on human behaviour. While the attacked Triconex SIS controller is protected by a physical switch, it seems that this switch has been left in program mode. The ongoing...

Panel - Future of Critical Infrastructure Security
More often we hear about the devastating effects the attack on critical infrastructure can have on the citizens of an affected city or a country. Yet we don't see large scale attacks yet being conducted. Panellist will discuss possible threats in todays world as well as the ways private sector and governments can collaborate to prevent such assaults on critical infrastructure.

Endpoint Management & Security: Getting It Right

Sessions:

The State of the Art of Anti-Malware Protection

Date: Wednesday, November 14, 2018 Time: 11:10-12:10 Location: Carl von Gontard

The State of the Art of Anti-Malware Protection
The volume and complexity of malware attacks continues to increase. Old style anti-virus doesn’t suffice. Everyone – companies large and small, government agencies, and home users – need anti-malware solutions today more than ever.  We’ll discuss the new forms of malware, including ransomware, file-less, and cryptojacking.  We will describe the major approaches to malware detection and prevention.

Outsmarting Malware: The Big (Data) Picture
The evasiveness of modern malware is forcing the security industry to find new ways for threat identification while maintaining the balance between business and security needs. The decreasing costs of hardware, the availability of cloud infrastructure, and evolving large scale data processing frameworks, have made big data analytics and machine learning, an affordable technology to be used for cyber defense. The presentation will cover key definitions, main technologies and cyber...

Panel - Case Studies on Endpoint Management

Date: Wednesday, November 14, 2018 Time: 12:10-13:10 Location: Carl von Gontard

Panel - Case Studies on Endpoint Management
In this session we will discuss malware concerns of various companies, important characteristics of endpoint security solutions and endpoint protection failures which were later discovered using other tools. Furthermore, the state of patch management evolution after various notable attacks will be examined.

Improving Your Mobile Threat Defense Strategy

Security Challenges in Mobile Networks

Application Security, Agility & Development

Sessions:

Containers, Microservices, APIs: The Latest DevOps Security Trends

Date: Wednesday, November 14, 2018 Time: 14:10-15:10 Location: Historische Kassenhalle

Containers, Microservices, APIs: The Latest DevOps Security Trends
To stay competitive during the times of digital transformation, when business models and technology landscapes change daily, enterprises must reinvent many of their business processes to achieve new levels of agility and flexibility, and nowhere else this is more evident than in software development. As the demand for faster design, development and delivery of software is growing, organizations are adopting the DevOps methodology that fundamentally changes the ways software is produced....

Beyond OAuth: Securing APIs with Policies & Attribute-Based Access Control
Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive access control for applications that are built using microservice and API approaches. -API security basics -Avoiding bad security practices -Overcoming OAuth limitations -Managing authorization as a microservice

Application Security - Achieving Security at Speed and Scale

Date: Wednesday, November 14, 2018 Time: 15:10-16:10 Location: Historische Kassenhalle

Application Security - Achieving Security at Speed and Scale
Modern software development for cloud-native world requires continuous application security to go along with continuous integration, continuous delivery, and continuous deployment. Sadly, even well-established application security programmes often can’t operate at the speed and scale required. We will look into the ways of rethinking legacy security infrastructure and processes and how to adapt in the complex world of digital business and advanced attacks.

Panel - Achieving Consistent Enterprise Security
In this discussion the panellists will speak about the types of attacks which enterprises should expect in coming years. The ways of DevOps integration into an enterprise security program will also be discussed together with best practice highlights.


Stay Connected


Berlin, Germany

Conference

Cybersecurity Leadership Summit 2018 Europe

Language:
English
Registration fee:
€1200.00 $1500.00 S$1920.00 13200.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 12 - 14, 2018 Berlin, Germany

Partners

The Cybersecurity Leadership Summit 2018 Europe is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00