Agenda

Track II: Innovate

Track II: Innovate

Track
Thursday, November 16, 2023 11:15—13:15
Location: Sirius

The "Innovate" track is a deep dive into the latest strategies and lessons in safeguarding digital and physical assets against the backdrop of an increasingly complex threat landscape. This track will feature a panel discussion on the vulnerabilities within supply chains and the importance of establishing trust in software supply chains. It will address the modernization of asset management, emphasizing the need for automation and data-driven solutions to secure environments against evolving cybersecurity challenges.

Participants will also gain firsthand insights from post-incident reports on ransomware attacks, learning about the resilience and trust-building required to recover and fortify against future threats. The track concludes with a focus on protecting critical transportation infrastructure, examining the unique challenges of Operational Technology (OT) security within Germany's railway system and the application of established solutions to meet stringent regulatory standards. This track is designed to equip attendees with the innovative tools and knowledge to build robust security strategies that are squared against the threats of today and tomorrow.

Alexei Balaganski
Lead Analyst & CTO
KuppingerCole
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API...
Read Bio
Christopher Sch├╝tze
Cybersecurity Practice Director & CISO
KuppingerCole
Christopher Schütze has been working as Director Practice Cyber Security and Lead Analyst for KuppingerCole Analysts AG since 2019. Prior to that, he was Head of Cloud Security at an auditing...
Read Bio

Sessions
November 16, 2023
11:15 - 11:35
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Paul Fisher delves into the multifaceted approach required to foster trustworthiness within complex software supply chains. This discussion begins by delineating the critical components of software supply chains and the potential risks associated with each link—from development and deployment to maintenance and decommissioning. Key to establishing a chain of confidence is the adoption of transparent processes and tools that provide verifiable evidence of security at each step. The...


November 16, 2023
11:35 - 11:55
Secure Data Sharing in a Zero-Trust World
Zero trust is being embedded into law across the world enforcing privacy, data residency and consent. How do companies and governments share patient data global during a pandemic to measure the efficacy of a vaccine? How do financial services organisations share intelligence on suspected terrorist funding, money laundry or sanctions evasion? How is this achieved in the emerging world of data nationalism? Developing a secure data sharing service is a complex proposition that need to embed...


November 16, 2023
11:55 - 12:15
Hunt the Shadows: Attack Surfaces and Entry Points!
Security should cover more than just what we know. As a common practice, we define the scope of assessment including the systems, networks, applications, and data that will be assessed. Hackers, by their very nature, have no predefined scope. They often seek to exploit any entry points they can find, those we may consider less significant or even we aren't aware of yet. Unknown threats are lurking in the shadows! This talk will delve into how attack surface discovery and management contribute...


November 16, 2023
12:15 - 12:35
Anchors of Trust - Lessons learned from a Ransomware attack
The word no company wants to hear became an unfortunate reality for one of the world’s largest independent development partners to the automotive and aviation industries — ransomware. The EDAG Group fell victim to an encryption Trojan that shut down their business-critical systems and IT systems. During this session Maria will be sharing her lessons learned and will be explaining her strategy that helped EDAG successfully restore their systems by leaning on Vectra AI as one...


November 16, 2023
12:35 - 12:55
Asset Management for Cybersecurity: A Modern Solution for An Age-Old Challenge
Asset management used to be easy, but not anymore. Where and how we work, the types and amount of devices we use, and the ways and places we store information have all changed. What’s stayed the same, though, is the fact that knowing what’s in our environment is absolutely essential to securing it. So, it’s time we say goodbye to manual asset inventory approaches, and hello to a modern approach to asset management — one that leverages existing data and automation to...


November 16, 2023
12:55 - 13:15
Building Security - SQUARED! Securing critical transportation infrastructure in Germany
The German railroad system is part of the national Critical Infrastructure, and hence all major train stations are fall under the KRITIS regulation. Recently, OT-(in)Security has drawn the attention of Threat Actors, and it is due time, to focus on securing Building Automation and Control system. The talk introduces to the challenges of managing a diverse and distributed technology landscape and how established solutions can help protect the infrastructure - or not...


Almost Ready to Join the cyberevolution?
Reach out to our team with any remaining questions
Get in touch