Endpoint Security
Facebook Twitter LinkedIn

Endpoint Security

Combined Session
Wednesday, November 10, 2021 14:00—15:00
Location: Wilhelm von Humboldt

Panel: Redefining Endpoint Security - The Role of AI & Machine Learning

The dark side of the digital world is professionalizing its malicious activities at an amazing speed, launching sophisticated, AI powered cyberattacks to compromise endpoints and sell stolen access credentials through Initial Access Brokers (IABs) to others who then launch ransomware attacks or steal and sell internal information. “We are entering the age of a well-orchestrated bad-actor-industry causing damage of unprecedented scale,” says Thom Langford, Global Security Advocate, SentinelOne. AI and Machine Learning are becoming a requirement to battle against increasingly automated attacks,” he continues. In this panel, we will look at the status of AI powered endpoint security and how to adapt our current strategy to the new risk level.

Thom Langford
Thom Langford
SentinelOne
In December 2020 Thom joined SentinelOne as a global Security Advocate. Thom established himself as CISO at large global organisations, having founded their security teams and services from the...
Dr. Carsten Stöcker
Dr. Carsten Stöcker
Spherity
Dr. Carsten Stöcker is co-founder and CEO of Spherity. Spherity is building decentralized digital identity management solutions to power the fourth industrial revolution.Carsten...

Endpoint Security in US Pharma Supply Chain

In order to improve safety and security in pharma supply chain new regulatory requitements are evolving for preventing data breaches and securing access to enterprise resources. These requirements for counterparty authorization are often based on Zero Trust Architecture (ZTA) principles such as “Enhanced Identity Governance” and “Network Infrastructure and Software Defined Perimeters”. Diffuse trust perimeter-less security regards the idea of authorized identifiers, authorizations are conveyed via signed statements in the form of verifiable credentials for a cross-enterprise scenario. The approach of combing ZTA principles with digital identity and credentialing unlocks new Endpoint Security for open supply chain systems: Endpoint Look-up, Message Routing, Authentication and Authorization. It will be shown how these principles are working in a real life implementation of the “Open Credentialing Initiative” for Authorized Trading Partner (ATP) Verification in the US Drug Supply Chain Security Act (DSCSA). Case Study: Open Credentialing Initiative, OCI – Open Credentialing Initiative (oc-i.org)

Dr. Carsten Stöcker
Dr. Carsten Stöcker
Spherity
Dr. Carsten Stöcker is co-founder and CEO of Spherity. Spherity is building decentralized digital identity management solutions to power the fourth industrial revolution.Carsten...

Practical Approach to End Point Protection and end2end Encryption for Space and Drone Applications

In today race to conquer the space by launching thousands of small satellites with the intention to provide a wide selection of Earth Observation services, we need to ensure the data and space assets are properly protected. In the near future our sky might get full of flying drones delivering food, medicines and other goods or carrying people. Are we ready for it? Are we sure all those entities are cyber protected and cannot be unlawfully intercepted? What can we do to feel safer?

Stefano Alberico
Stefano Alberico
Skudo OÜ
Stefano is technology visionary with 25 years of international experience (starting at Nokia and continuing in other international ventures), with an understanding of diverse cultural and business...

Tickets

On-Demand Access
Re-live CSLS 2021
€100
 
Watch more than 90 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address