Exercising your cyber crisis plans
Facebook Twitter LinkedIn

Exercising your cyber crisis plans

Combined Session
Thursday, November 10, 2022 12:00—13:00
Location: Historic Kassenhalle

Exercising your cyber crisis plans

What are the various types of exercises drills tabletop exercise functional exercise


Provide safe space

Enhance operational resilience

Buys time and mental capacity


first takeover after implementation of tools

change in threat level where presentations style sand box / cyber range production systems






Lester Chng
Lester Chng
Bank of Montreal
Lester Chng is a cybersecurity practitioner and his work focuses on running cybersecurity and crisis exercises. He currently runs an exercise program for a large North American Financial...

Panel - Cyber Hygiene Best Practices: Why does it Matter?

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Warwick Ashford
Warwick Ashford
Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist...
Boris Beuster
Boris Beuster
Boris studied economics with a wholesale/resale focus and gained experience as project manager for process optimisation and IT. Since 2011 he has been working on cyber security topics and made it...
Noam Green
Noam Green
Noam Green is VP of Product at Cyolo. He joined the company after holding multiple executive product positions in a variety of cybersecurity companies, including Forescout Technologies and...
Christoph Kumpa
Christoph Kumpa
Christoph Kumpa is Regional Director at Axonius. His previous roles include Sales and Consulting responsibilities at HP, Computacenter, and Dimension Data. Kumpa is an Information Security and Data...
Manuel Garat Loureiro
Manuel Garat Loureiro
After being a software developer for 10 years, Manuel realised that his focus on value delivery, product vision and strategic significance was pulling him towards a new and exciting role. As an IAM...

Awareness?! How to make it work in a Low-Tech Environment

Keeping employees engaged with regards to Information Security is a challenge. Even though the industry has plenty of innovative and seemingly fun training programs to offer it seems that the desired effects do not materialize. Information Security is a complex topic that overwhelms especially those colleagues in a low-tech environment – making it fun, easy to understand and more transparent by involving the employees themselves is key.

Alina Smith
Alina Smith
After completing an MBA in General Management and gathering experience as a Product Manager of an ERP system, I was given the opportunity to lead all Information Security Governance initiatives of...


On-Demand Access
Re-live CSLS 2022
Watch more than 90 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address