Event Recording

Dr. Heiko Klarl - Everything as Code – Ensuring Compliance and Governance for IAM

Speaker
Dr. Heiko Klarl
Chief Marketing and Sales Officer
iC Consult
Dr. Heiko Klarl
Dr. Heiko Klarl has been in Identity and Access Management for more than fifteen years. He is driven by the motivation to bridge the gap between business and IT in order to create holistic solutions spanning from the customer’s strategy to the technological implementation. He successfully...
View profile
Playlist
Cybersecurity Leadership Summit 2019
Event Recording
Ola Sergatchov - Beyond Cloud - the Place Where Security, DevOps and Business Meet
Dec 04, 2019

As a result of the continous evolution of IT platforms, new environments and applications show up to simplify our lives. Some receive them with suspicion, others embrace them. But security challenges don't change, they just multiply. Visibility and segmentation cannot be a roadblock on the never-ending quest for innovation and business agility.  

Ola Sergatchov, Vice President of Corporate Strategy at Guardicore, in her presentation, will explore how we can deliver more with less. How to accelerate while reducing security risks, and most importantly, align security, DevOps and business objectives without major IT overhaul.

Event Recording
René Grob - Migration to a Modern IAG Solution - Experiences of Helsana Versicherungen AG
Dec 12, 2019

For over 12 years, Helsana used an IAM solution based on NetIQ Identity Manager, which was extended and adapted to individual needs. Not only did the system's maintainability suffer as a result, but its usability also no longer met today's expectations. A new, leaner and more modern system with SailPoint IdentityIQ should not only help to standardize the processes, but also offer the possibility to tackle old and new challenges in the field of IAM/IAG. It shows where Helsana was at the beginning of the project, where she is today and what the company has learned along the way.

Event Recording
Dr. Heiko Klarl - Challenges of a Global IAM
Dec 04, 2019

Globalisation has spread business and production sites all over the world. Companies are faced with distributed IT systems as well as with different and demanding regulations in various countries, spanning from USA through to Europe and Asia, especially China and Russia. For many businesses IAM is a central part when it comes to managing employees, partners, customer, things and APIs in a secure and reliable way.

Event Recording
Benjamin T. Schlabs - Embracing the Human Factor
Dec 12, 2019

IT security departments are no longer just responsible for securing digital assets and appliances. They must - with equal priority - help create a secure environment that inspires productivity and empowers employees to innovate.

In this talk, we discuss challenges faced by large enterprises around embracing the Human Factor (security awareness, phishing / social engineering, password hygiene/policies, etc.). We also share insights into how key security indicators such as overall vulnerability levels and basic security hygiene can be measured and compared across organizations, industries, and countries.

We introduce our approach to prioritizing IT security initiatives that have the most valuable immediate impact on hackability and discuss some common mistakes that can be easily fixed at little or no cost

Event Recording
Assaf Pilo - AI as an Enabler for Detecting PI Across Large Data Infrastructures
Dec 12, 2019

Using intelligent insights on the readiness of data to move to the cloud and a dynamic catalog ready to manage it, companies can accelerate migration with both confidence and control.

Event Recording
Klara Jordan - Operationalizing Election Security Guidance
Dec 12, 2019
Event Recording
Panel - The Future of AI in Cybersecurity
Dec 04, 2019

Numerous malware variants are being created daily. To adjust to this evolution, machine learning tools are being utilized by security companies to detect the novel threats and new attack vectors. Same for the threat hunting, where the ML helps in proactively and iteratively parsing through networks detecting the advance threats. Important question is where we want to apply these advanced techniques. The technology should be applied in a smart way to tackle specific problems. In this panel we will discuss the current state of AI in cybersecurity and what the future will hold.

Event Recording
Francisco Z. Gaspar - The Unpatchable Element
Dec 12, 2019
Event Recording
Jean-Christophe Gaillard - The Language of Security
Dec 12, 2019

How the way we talk about information security has changed over the last 2 decades, based on a quantitative analysis of 17 Global Information Security Surveys by EY (2002-2019)

Event Recording
Max Heinemeyer - AI vs. AI - On The Next Paradigm Shift in Cyber Security
Dec 04, 2019

This talk intents to provide thought leadership on how AI & ML is currently being used for defensive purposes and will soon be used for offensive purposes. It covers both sides, defence and offence, and provides examples of how AI either is currently used to augment defensive measures or how AI will be used to augment cyber offence.

On the defensive side we have seen an explosion in the vendor landscape using narrow AI to varying levels of success. What is undeniable is that there is improvements in blue teaming & cyber defence thanks to AI. Max will give a handful of practical examples of where AI has caught and stopped extremely sophisticated cyber attackers. AI in defence is already a reality.

On the other hand, cyber attacks are becoming increasingly fast and sophisticated. WannaCry & NotPetya denominated a first paradigm shift - from low & slow attacks to fast-moving, spreading & destructive malware. 
Relying on signature-based / hard-threshold-based & maintaining the mentality of 'keeping bad out' instead of 'assuming breach' is not adequate in today's threat landscape any more.

Event Recording
John Tolbert - The Information Protection Lifecycle
Dec 12, 2019

Too often those of us in the cybersecurity space get wrapped up in comparing, deploying, and managing point solutions. While this is a necessary consequence of both the fragmented nature of the market and the highly specialized nature of our work, sometimes we need to step back and look at the big picture. What kind of information am I charged with protecting? How can I discover and keep track of it all? What kinds of controls can I apply? How can data be protected in different environments, on different platforms, etc? We'll look at the various stages in the life and death of information and how to best manage and protect it.

Event Recording
Dr. Mariarosaria Taddeo - The Risk of Trusting AI in Cybersecurity
Dec 04, 2019