R.O.N. - Return on Negligence – The Impact of Cybercrime
Facebook Twitter LinkedIn

R.O.N. - Return on Negligence – The Impact of Cybercrime

Combined Session
Wednesday, November 09, 2022 15:00—16:00
Location: Historic Kassenhalle

R.O.N. - Return on Negligence – The Impact of Cybercrime

The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the connected areas that are impacted by Cybercrime.  There is more at risk than what can be solved by technology.

R.O.N. - Return on Negligence – The Impact of Cybercrime
Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
R.O.N. - Return on Negligence – The Impact of Cybercrime
Presentation deck
R.O.N. - Return on Negligence – The Impact of Cybercrime
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Denny Prvu
Denny Prvu
Royal Bank of Canada
Denny Prvu has been fortunate enough to work around the world with public and private sector organizations as a strategist, architect, and communicator on identity, security, and privacy topics for...

Lessons Learned: Responding to Ransomware Attacks

The last year has seen almost two-thirds of mid-sized organizations worldwide experiencing an attack. Managing ransomware attacks requires significant patience, preparedness and foresight – Stefan shares his experience managing the ransomware attack on Marabu Inks, his key learnings from the attack and how they have shaped the organization’s response capabilities.

Lessons Learned: Responding to Ransomware Attacks
Event Recording
Lessons Learned: Responding to Ransomware Attacks
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Lessons Learned: Responding to Ransomware Attacks
Presentation deck
Lessons Learned: Responding to Ransomware Attacks
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Stefan Würtemberger
Stefan Würtemberger
Marabu Inks
Stefan Würtemberger is employed at Marabu GmbH & Co. KG, where he is Vice President Information Technology and responsible for Global IT. Previously, he was Chief Digital Officer and CIO...

Quantum computers: the ultimate opponent for data protection

The development of quantum computers is rapidly advancing. The threat this technology poses to existing encryption systems is becoming more and more concrete, even catching interest with the political world: Institutions such as the American NIST or the German BSI are looking for encryption standards for the quantum era. However, our data is already at risk today: Attackers can intercept and keep encrypted data until they have access to the technology to hack the cryptography ("harvest now, decrypt later"). Protection of our data is still not advanced: the end-to-end encryption most messengers offer only applies to the content of messages, not to their metadata. Nevertheless, metadata is crucial when it comes to creating personality profiles, recognizing behavioral patterns and being able to manipulate them. The NSA , for example, has described the collection of metadata as one of its "most useful tools." Indeed, the combination of inadequate encryption and the threat of quantum computing creates the perfect storm for data protection. Companies would therefore be well advised to address the issue today and seek solutions.

Quantum Computers: The Ultimate Opponent for Data Protection
Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Quantum computers: the ultimate opponent for data protection
Presentation deck
Quantum computers: the ultimate opponent for data protection
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
David Chaum
David Chaum
xx network, Elixxir.io
David founded xx network, a lead blockchain platform supporting secure, private decentralized messaging and payments. Designed to address public concern for user privacy and the threat of quantum...

Tickets

On-Demand Access
Re-live CSLS 2022
€100
 
Watch more than 90 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address