Event Recording

H. Huetter, B. Peeters and D. Roeper - Managing Complexity in a CIAM Migration Project - A Case Study of the ‘Steinberg ID’ Project

Show description
Speakers
Heiko Hütter
CEO of Service Layers
Service Layers
Heiko Hütter
Heiko Hütter is CEO of Service Layers, which provides a globally distributed, highly scalable Identity & Access Management Platform in a Private Software as a Service Model. This platform allows for complex, individual use-cases and at the same time enabling an...
View profile
Bernd Peeters
Head of Services / Digital Unit
Steinberg Media Technologies GmbH
Bernd Peeters
Bernd Peeters leitet das Services Team der Digital Unit bei der Steinberg Media Technologies GmbH. Er ist das technische Mastermind hinter Steinbergs eLicenser-Technologie und verfügt über jahrzehntelange Erfahrung in der Führung eines eigenen Unternehmens. Seit 2009 ist er bei...
View profile
Daniel Röper
Director of Digital
Steinberg Media Technologies GmbH
Daniel Röper
Daniel Röper leitet die Digital Unit bei Steinberg Media Technologies GmbH. Mit einem Werdegang in E-Commerce und Direktmarketing kam er 2007 zu Steinberg, um dort das Online-Geschäft aufzubauen. Seit 2014 entwickelt er Strategien für Steinbergs Digitale Transformation. Ein Ergebnis...
View profile
Playlist
Cybersecurity Leadership Summit 2018 Europe
Event Recording
Yaniv Avidan - AI Powered Data Herding in Hybrid Cloud Environments
Dec 18, 2018

Having cloud software tools and services entering our core business processes, it becomes even more critical that we govern information across platforms, the diverse forms of data and at scale. Artificial Intelligence plays a significant role in enabling companies keep their business running faster, more protected in hybrid cloud environments, while optimizing the Hardware and Software stack.

Event Recording
Peter Dornheim - Build Up a Security Operation Center and Provide Added-Value to Business Operations
Dec 18, 2018

Make or buy? Budget annihilator or business driver? Only 2 questions which must be answered when building up a Security Operation Center. How to address these questions and how to start a project to establish a Security Operation Center in a traditional German manufacturing company is content of this session.

- Start small, think big: Understand how to start a SOC project and deliver an added-value fast - Think big: Identify a SOC target vision which maps to your individual company situation - Be prepared: Learn about typical challenges during the SOC ramp-up process

Event Recording
Dimitri Chichlo - What is the Role of a CISO in 2020?
Dec 18, 2018

In the past years, a CISO would mainly be chosen among the IT staff who expressed his interest for information security or by arbitrarily promoting someone from the inside to please the auditors with filling a headcount gap. Tasks and skills were mainly technical, focusing on patching, administering firewalls and installing antiviruses. With the years though, companies have made their IT systems the backbone of their businesses. Similarly, criminality has shifted to exploit online systems. Combination of both realities now requires that CISOs possess and demonstrate core competencies that allow them transforming the essence of their job from infrastructure protector to business enabler. In this keynote, we will explore how and why CISOs should now focus on value creation instead of value protection, getting from a defensive to a proactive approach.

Event Recording
Martin Zeitler - Your Move to “the Cloud” Secured
Dec 18, 2018

There is a tremendous amount of business value that you can get from “the cloud”. But, there are a lot of challenges in adopting these services securely. The real question is how we can approach “the cloud” from a security perspective in order to really get that full benefit of the offerings.

Event Recording
Dr. Frank Dudek - Accelerating Cybersecurity – Is Your Information Security Program Up to Speed?
Dec 18, 2018

Internet content providers rely on fast, modern webapps and feature-rich web frameworks to drive customers to their sites. In a landscape of accelerating change and continuous code deployment, my keynote will discuss how a company’s cybersecurity program must evolve to remain effective in such fast-paced environments. 

Event Recording
Panel - Risk Assessment and Security Design
Dec 18, 2018

Zero Trust Security assumes that nothing in a companies ITinfrastructure like including users, endpoint devices, networks, and resources, is ever trusted. All interactions must be verified to decrease the chance of a security breach. Zero Trust Security ensures secure access to resources while significantly reducing the possibility of access by bad actors. In this paneldiscussion we will discuss the considerations companies should make before implementing Zero Trust Security and Zero Trust Security by Design.

Event Recording
Gal Helemski - How a Policy Based Approach Dramatically Improved Access Control and Authorization
Dec 18, 2018

Hear how a leading multinational Financial institution was able to evolve from Role Based Access Control (RBAC) to the new paradigm, Policy Based Access Control (PBAC), and learn what challenges this solved, and the ROI they were able to see from using PBAC.

Event Recording
Klaus Hild - Predictive Governance – Leveraging the Power of Identity Analytics
Dec 18, 2018

In this presentation, SailPoint will explain why Identity Analytics will change the way companies will think about CyberSecurity, by adapting ‘Predictive Governance’.

Predictive Governance will enable organizations to be more effective and efficient at governing access without increasing the risk.

Event Recording
John Tolbert - Defense-in-Depth: New Kinds of Tools for All the Layers
Dec 18, 2018

The principle of defense-in-depth remains a key design element for enterprise organizations. Although many have said that perimeters are going away, or identity is the new perimeter, the fact is that almost all enterprises still have perimeters. The names may have changed, and components may be declared “next-gen”, but there are still firewalls, VPNs, intrusion detection and prevention systems, etc. We will look at how new kinds of tools have become available to help protect against attacks from the application to the network layers.

Event Recording
Martin Kuppinger - User Behavior Analytics: Can We? Should We? Must We? And if, How to Do It Right?
Dec 18, 2018

User Behavior Analytics (UBA) or UEBA (User & Entity Behavior Analytics) is an important capability of a variety of products: Specialized solutions for UBA; IAM tools with built-in UBA capabilities; and various cyber-security products that also come with built-in UBA capabilities.

The question to start with is: What is UBA really and how does it differ from e.g. Threat Analytics, SIEM, Access Governance, and other capabilities? Where is the benefit of UBA? Is it a nice-to-have or must-have in these days of ever-increasing cyber-threats? And if we go for UBA: How do we do it right? As a separate tool or built-in capability? As an IAM capability, where identities and user accounts are managed, or as a SOC (Security Operations Center) capability? And what about privacy?

This session will look at the state of UBA and how to do it right to leverage the potential of UBA for increasing your cyber-attack resilience in your Enterprise Security initiative.

Event Recording
Dragan Pendic - Application Security - Achieving Security at Speed and Scale
Dec 18, 2018

Modern software development for cloud-native world requires continuous application security to go along with continuous integration, continuous delivery, and continuous deployment. Sadly, even well-established application security programmes often can’t operate at the speed and scale required. We will look into the ways of rethinking legacy security infrastructure and processes and how to adapt in the complex world of digital business and advanced attacks.

Event Recording
Cybersecurity Innovation Night 2018 - Machine Learning & Deep Learning for Secure Future
Dec 20, 2018

Every year the number of cyber attacks is increasing. The types of targets include just about everyone, ranging from Fortune 500 companies, small and medium-sized businesses, critical infrastructure, and government agencies.

Cyber-attacks are becoming more sophisticated as well as growing in frequency. Up to a million new malware variants are created every day. Each new threat group can be significantly different from previous ones and can be used in damaging attacks around the world.

The Cybersecurity Innovation Night will focus on cutting-edge approaches and advanced solutions in the various areas of cybersecurity by utilizing Machine Learning (ML) and Deep Learning (DL) technologies. ML and DL have had many successful applications in image recognition and language processing, and now these techniques are the fastest growing trends in cybersecurity. These tools are gaining more traction in cybersecurity because they facilitate more efficient analysis and allow faster, automated responses to various threats.

The slam-style talks will present various approaches of combating cyber attacks and cybercrime using ML and DL techniques. Slammers will entertain and at the same time, try to convince the crowd that the world will be a safer place with their contribution.