Early-bird Discount
expires in
Register Now


Track III: Together

Track III: Together

Wednesday, November 15, 2023 14:30—16:30
Location: Satelit

A cybersecurity fabric refers to an integrated security architecture that promotes comprehensive protection across all endpoints, networks, applications, and cloud environments. A cybersecurity fabric should be designed as a unified framework that combines different security solutions and technologies, allowing for centralized visibility, control, and responses to potential threats. This fabric approach aims to provide complete security coverage, leveraging interconnected security tools. By integrating a wide range of security components, such as firewalls, network detection and response, endpoint protection/detection/response, data leakage prevention, security information and event management, cyber threat intelligence, and all other components into a single cohesive system, a cybersecurity fabric enhances the overall security posture of an organization, facilitating quick detection and mitigation of sophisticated cyber threats. With a cybersecurity fabric, security professionals can establish a robust defense infrastructure that not only provides enhanced protection but also streamlines security management, reducing complexity and improving operational efficiency. Additionally, the fabric approach enables better coordination between different security teams, facilitating collaborative efforts to ensure a consistent and unified response to potential security incidents across all enterprise IT assets.

This track will investigate some of the components and approaches to developing the cybersecurity fabric architecture.

Detection and response are in the name of many cybersecurity tools today. Both are key concepts for threat prevention and risk mitigation. Detection means identifying threats, while response mitigates damage. These vital approaches enable timely intervention, reducing the impact of cyberattacks, safeguarding systems, and data.

This track is designed to provide attendees with insights into site assessments, ethical hacking, and new ransomware tactics. The track will feature expert speakers who will delve into these critical areas, offering practical advice and real-world examples to empower the audience with the knowledge and skills needed to strengthen their cybersecurity defenses.



Lead Analyst


November 15, 2023
14:30 - 14:50
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted landscape of applying AI to secure government operations.

Dubai Customs

November 15, 2023
14:50 - 15:10
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive approach of detecting someone in our network and then moving into the proactive way of security. Using the same tools for asset discovery, risk assessment and automatic checks for compliance of the customers environment. So the solution should not just stop the attack, but before check automatically how...


November 15, 2023
15:10 - 15:30
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various organizational areas work hand in hand starting from the information security strategy, over architecture, engineering, operations and the business side. This needs to be embedded in an according information security framework that defines the rules and requirements based on which the vulnerability management...

Deutsche Börse
Deutsche Börse

November 15, 2023
15:30 - 15:50
Lessons Learned from Site Security Assessments
The presentation is crafted based on stories from industrial sites of different sectors in Sweden and abroad where overlooked mistakes, handy solutions or understudied decisions could have potentially become a reason for an incident. The findings are brought to you by experience of a team that together performed numerous site security assessments over the past years. You will be presented with cases where you will be able to find similarities with your work environment starting from...

November 15, 2023
15:50 - 16:10
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets. Testing frequency does not keep pace with development, is very noisy, and more than one-third of an organization’s attack surface is unknown to the organization.  Autonomous ethical hacking  powered by hackers and AI,  can help tech teams to identify and mitigate vulnerabilities...


November 15, 2023
16:10 - 16:30
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest developments and trends in this ever-evolving threat landscape is crucial. Florian and Stefan explore the modern nuances of ransomware attacks in this panel. Discussions will revolve around cutting-edge techniques such as double extortion, where attackers deny access to data and threaten its public...

Marabu Inks
Vorwerk SE & Co. KG

Almost Ready to Join the cyberevolution 2023?
Reach out to our team with any remaining questions
Get in touch