Cyber Hygiene and Awareness
Facebook Twitter LinkedIn

Cyber Hygiene and Awareness

Combined Session
Thursday, November 10, 2022 11:00—12:00
Location: Historic Kassenhalle

How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend

Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this challenge and delivered numerous software and hardware solutions, design and development principles, policies and process controls.

However, as most successful cyber-attacks in recent time have started by targeting users with phishing emails or social engineering, raising awareness of their role in increasing cyber resilience is at least as important as providing “just a technical solution”.

This presentation will – based on example of a famous real robbery in Berlin – show how user awareness can become an important line of defence in cyber security.

How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Presentation deck
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Kashif Husain
Kashif Husain
Nomura
In 2019 Kashif Husain joined the Frankfurt office of Nomura, a Japan headquartered financial services group present in over 30 countries. In addition to his role as Information Security...

Cyber Hygiene is the backbone of an IAM strategy

When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security means, above all, good, clean and clear security practices that happen before-hand and all day, everyday. This is particularly true for Identity and Access Management, which is a component of every domain within Cyber Security, and it's identified as a cause for more than 80% of data breaches. IAM is rarely about white-hat hackers counter-attacking an ongoing intrusion. It's mainly about a set of good practices, clearly defined processes and, overall, good hygiene in the way we manage our identities, our resources, our entitlements, and the way they relate to each other.

Cyber Hygiene Is the Backbone of an IAM Strategy
Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
Click here to watch the recording of this session. You can watch it even without a KuppingerCole account!
Cyber Hygiene is the backbone of an IAM strategy
Presentation deck
Cyber Hygiene is the backbone of an IAM strategy
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Manuel Garat Loureiro
Manuel Garat Loureiro
Booking.com
After being a software developer for 10 years, Manuel realised that his focus on value delivery, product vision and strategic significance was pulling him towards a new and exciting role. As an IAM...

Best Practices to Protect your APIs and Accelerate your DevOps Journey.

The growing prevalence of APIs presents security teams with an all-too-familiar problem - development can outpace security processes and protections, creating vulnerabilities that needs to be addressed. In this session, we will discuss how the security team can implement a phased plan to introduce visibility into your APIs, determine which APIs expose sensitive data and finally to build processes around how APIs are managed. In particular, we will discuss best practices, illustrated with real-world use cases for securing APIs without slowing down the speed of development.

Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Presentation deck
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Julian Iavarone
Julian Iavarone
Imperva
Julian Iavarone has been Senior Sales Engineer for the DACH region at Imperva since May 2018 and has developed a strong expertise in Advanced Bot Protection and API Security over the last 15+...

Tickets

On-Demand Access
Re-live CSLS 2022
€100
 
Watch more than 90 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address