Event Recording

Panel: AI Governance & Regulation

Show description
Speakers
Sray Agarwal
Senior Director
Fractal AI
Sray Agarwal
Sray Agarwal has applied AI and analytics from Financial Services to Hospitality and has led the development of Responsible AI framework for multiple banks in the UK and the US. after completing his Data scientist with merit (dean's list) he joined ecommerce company to spearhead their AI...
View profile
Dr. Scott David, LL.M.
Executive Director - Information Risk and Synthetic Intelligence Research...
University of Washington - APL
Dr. Scott David, LL.M.
Scott David, J.D., LL.M., is the Executive Director - Information Risk and Synthetic Intelligence Research Initiative (IRSIRI) at the University of Washington Applied Physics Laboratory and was formerly the Executive Director of the Law, Technology and Arts Group at UW School of Law. Scott...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Playlist
cyberevolution
Event Recording
The Next Generation of Secure Access with Zero Trust
Nov 15, 2023

Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.

Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
Nov 16, 2023

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his perspectives on how Decentralized IDs can improve the cybersecurity posture of organizations for different use cases, including workforce, business partners, customers, and citizens.

Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
Nov 16, 2023

IT Security – In a General Perspective:

  • Security Investment vs. Success
  • New Goals, Rediscovering Old Objectives

Closing the Gap with HP Wolf Security

Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Nov 15, 2023
Event Recording
Beware of Easy Paths: The Journey Towards NIS2 Compliance
Nov 15, 2023

Matthias offers a critical analysis of the EU's NIS2 Directive's intricate demands, drawing attention to the limitations of one-size-fits-all solutions. He advocates for customized compliance plans, underscoring the unique challenges across various entities, with special attention to the constraints faced by SMEs. And obviously the future interpretation of this EU directive into national regulation adds another layer of complexity.

Essential strategies such as comprehensive risk evaluations, continuous educational efforts, and advanced incident management protocols are emphasized as crucial for effective compliance, integrating cybersecurity deeply into the organization's core values beyond just adherence. The talk concludes with a perspective that views NIS2 compliance as a dynamic goal necessitating enduring dedication and flexible approaches. 

Event Recording
Implementing Zero Trust Principles: Crafting Your Cybersecurity Fabric
Nov 14, 2023

This interactive workshop will provide a practical approach to understanding and applying Zero Trust principles in creating your cybersecurity architecture.

We will focus on transitioning from traditional security perimeters to an identity-driven Cybersecurity Mesh, acting as the backbone for implementing the Zero Trust model. A detailed case study will guide you through the initial stages of incorporating Zero Trust principles into your current security landscape, identifying potential challenges, and offering methodical solutions.

The session will center on active learning through real-world examples, where participants will gain hands-on experience in shaping a resilient Cybersecurity Fabric. The workshop will conclude with participants developing a personalized roadmap to integrate Zero Trust principles into their cybersecurity systems seamlessly.

Join us to kickstart your Zero Trust journey, navigate its intricacies, and move towards a secure future with real-world applications and interactive problem-solving guidance.

Event Recording
Panel | Forging Stronger Shields - Collaborative Strategies to Defend Against Cyber Criminals
Nov 15, 2023

In the fast-paced and intricate world of cyber defense, the challenges are numerous and ever-evolving. Our "Forging Stronger Shields"  panel convenes a group of esteemed Chief Information Security Officers who dive deep into the complexities of this digital age, drawing from their hands-on experiences and daily challenges. These seasoned professionals will delve into the nuances of the present-day cyber threat landscape, from advanced persistent threats to state-sponsored cyberattacks. They'll emphasize collaboration's crucial role in establishing effective defense strategies.

As they share tales from the trenches, the CISOs will explore the blend of human expertise and cutting-edge technology required to construct formidable barriers against cyber threats. Furthermore, they will shed light on fostering a pervasive culture of cybersecurity, emphasizing that this responsibility doesn't just lie with the IT department but spans from the boardroom to the break room.

This session will be an engaging dialogue as these experts navigate the intricate cybersecurity maze, reiterating that our collective strength and unity are vital in defending against sophisticated cyber adversaries. Be part of this conversation that aims to inform and catalyze a united front against cyber threats.

Event Recording
Operational concepts with the WALLIX tiering model
Nov 15, 2023

Lack of control and controllability is increasingly a problem in many internal IT departments today. The complexity of the solutions used has steadily increased. It is therefore all the more important that information security systems are optimally set up and easy to operate and administer.

Establishing a risk class-based access management system makes sense for many reasons. In addition to meeting compliance requirements such as ISO27001, BSI IT-Grundschutz or industry standard 62443 and integrating seamlessly into a risk-based approach followed in the information security management system, this approach promotes the regaining of control over all possible accesses to company or organisational systems, regardless of these requirements.

Event Recording
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Nov 16, 2023

In a world where everything and everyone is interconnected, traditional cybersecurity is outdated.

Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the future.This presentation, "Zero Trust in a World of Everything, Everyone, Everywhere, All at Once," explores the fundamentals of Zero Trust and its relevance to our hyperconnected world.

Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
Nov 15, 2023

In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber resilience. With GenAI, we're in a new era of software industrialisation. Let's explore how crucial secure software engineering is in this new wave and what lessons we can learn from the past to avoid repeating our mistakes.

Event Recording
Protect APIs Everywhere with Modern Solutions
Nov 15, 2023

Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud that can devastate your business. To effectively prevent these attacks, you need  comprehensive, consistent security that protects your entire digital footprint.

F5 solutions reduce complexity in a hybrid and multi-cloud world so you can deliver secure digital experiences at scale—in the architecture you have now, and for the architecture you aspire to evolve your business into.

Event Recording
Upcoming changes in IT-Security from an Airline perspective
Nov 15, 2023

Time is moving fast in the IT-Security industry. The rise of AI brings new attacks for example as new and better redacted phishing emails. What are the risks and chances for Security Operations? What is the impact on identity and access management. How can AI be used to improve threat hunting. These are some of the topics presented here.