Prime Discount
expires in
Register Now

Agenda

Cybersecurity Fabric

Cybersecurity Fabric

Session
Wednesday, November 15, 2023 14:30—15:30
Location: Satelit
Log in to download presentations

Navigating the Complex Landscape: Challenges in Applying AI for Government Security
14:30—14:50

Watch the video

 

As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted landscape of applying AI to secure government operations.

Mohamad Easawy
Head of IT Excellence, Independent Advisor
Dubai Customs
Mohamad is a visionary with more than 28 years of experience in the technology, leadership, strategy and digital transformation domains. He achieved diverse successes in key industry...
Risk assessment the attacker way! How secured are your assets in reality?
14:50—15:10

Watch the video

 

Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive approach of detecting someone in our network and then moving into the proactive way of security. Using the same tools for asset discovery, risk assessment and automatic checks for compliance of the customers environment.

So the solution should not just stop the attack, but before check automatically how an attacker possibly could come in and have a full overview of the environment including automatic risk factors for assets and overview combined with integrations with other solutions.

Additionally the task of risk management is stated in the new NIS2 directive and should be clearly a topic for all companies that are affected.

Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various organizational areas work hand in hand starting from the information security strategy, over architecture, engineering, operations and the business side. This needs to be embedded in an according information security framework that defines the rules and requirements based on which the vulnerability management service is operated. However, this approach is only complete with an according target operating model that defines the various building blocks that contribute to a successful end-to-end service.

 

Aris Koios
Technology Strategist - Central Europe
CrowdStrike
Aris Koios is a trusted leader with over 16 years of experience in the cybersecurity industry in Europe, ANZ and Asia. As a Technology Strategist for CrowdStrike, he is part of the CTO...
Building a successful vulnerability management service concept
15:10—15:30

Watch the video

 

Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various organizational areas work hand in hand starting from the information security strategy, over architecture, engineering, operations and the business side. This needs to be embedded in an according information security framework that defines the rules and requirements based on which the vulnerability management service is operated. However, this approach is only complete with an according target operating model that defines the various building blocks that contribute to a successful end-to-end service.

 

Dr. Ing. Sibylle Hick
Head of Section Cyber Protection
Deutsche Börse
Starting 2022 she joined Deutsche Börse AG as the Head of Section Cyber Protection . 2011 Sibylle worked at German Bank as technical expert to design and develop a Data Leakage Protection...
Michal Rudolf
Head of Unit – IT Security Operations
Deutsche Börse
Almost Ready to Join the cyberevolution 2023?
Reach out to our team with any remaining questions
Get in touch