Enterprise Cyber Resilience
Facebook Twitter LinkedIn

Enterprise Cyber Resilience

Combined Session
Thursday, May 12, 2022 11:00—12:00
Location: A03-04

Cyber Security Architectures in a Hybrid World

A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after all cloud services are adding another dimension of complexity. We will take a short look at the security basics, compare some outdated, updated and up-to-date security models finding suitable models for IT-security, OT-security and cloud-security. Finally we will put it all together in combined scenarios. This presentation will focus on practical security architecture rather than on formal compliance.

 

Key Topics:

* IT-security, OT-security, cloud-security

* Cyber security: from basics, perimeter, air gap to zero trust

* Hybrid world: isolation or integration

* Tops and flops in practical cyber security

Cyber Security Architectures in a Hybrid World
Event Recording
Cyber Security Architectures in a Hybrid World
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Cyber Security Architectures in a Hybrid World
Presentation deck
Cyber Security Architectures in a Hybrid World
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Eleni Richter
Eleni Richter
EnBW
Eleni Richter is working as chief architect of the identity and organizational data management at a large German energy supplier (EnBW AG) and as part-time lecturer in IAM and Cyber Security...

Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience

This presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience (in case the garlic, crosses, and wooden stakes are not effective). We will discuss whether you should invite attackers into your network. Much like with vampires, inviting attackers in can have serious repercussions. However, unlike vampires, cyber attackers do not need an invitation. Fortunately, deception within our networks can aid in identifying, delaying, and evicting unwanted guests, including insider threats (or vampires already amongst us). We will explore several deception use cases  that can dramatically increase cyber resilience without attracting more attackers.

Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
Event Recording
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
Presentation deck
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Donnie Wendt
Dr. Donnie Wendt
Mastercard
Dr. Donnie Wendt is a Principal Security Researcher for Mastercard. In this role, Donnie researches the latest security threats, technologies, products, services, and innovations to drive the...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address