Event Recording

Panel - Secure Work Anywhere: The New Normal from Corporate Policies to Security Practices

Speakers
Scott Bridgen
GRC Consulting Director
OneTrust
Scott Bridgen
Scott Bridgen serves as a GRC Consulting Director for OneTrust GRC– a purpose-built software designed to operationalise integrated risk management. In his role, Scott is responsible for driving the development and delivery of OneTrust's integrated risk management product as well as driving...
View profile
Steffen Minkmar
Head, IT Security
European Investment Bank
Steffen Minkmar
Head of IT Security of the European Investment Bank (EIB), the biggest multilateral financial institution in the world and one of the largest providers of climate finance. Close to 20 years of experience in the areas of IT security, risk management, and IT governance. I started my career in IT...
View profile
Playlist
Cybersecurity Leadership Summit 2020
Event Recording
Ana Isabel Ayerbe Fernández-Cuesta: Security by Design IoT Development and Certificate Framework
Nov 13, 2020

Next-generation of Smart IoT Systems needs to manage the closed loop from sensing to actuation with safe operational boundaries and the need to be distributed across IoT, Edge and cloud infrastructures with complex and heterogeneous systems, connectivity and failures, as well as being able to operate in an unpredictable physical world facing situations that have not been fully understood or anticipated in the software development process.

In this context, it is necessary to support the continuous delivery of trustworthy Smart IoT Systems, to support their agile operation, to support the continuous quality assurance strengthening their trustworthiness, and to leverage the capabilities of existing IoT platforms and fully legacy, proprietary and off-the-shelf software components and devices. In this talk, it will be explained how to facilitate the development, operation and quality assurance of trustworthy and resilient Smart IoT systems.

Event Recording
Paolo Comi, Nadia Fabrizio: Quantum Secured Blockchain
Nov 13, 2020

This talk aims to share the experience achieved during Q-Secure Net, a 2020's project co-financed by the European Institute of Technology (EIT) and Italtel, Cefriel, Politecnico di Milano, CNR, UPM and Telefonica. Q-Secure Net will provide a cost-effective and flexible network solution for unconditionally secure communication services based on Quantum Key Distribution (QKD) thought for fiber-optic networks.

The talk will also present an application of Blockchain Atomic Swaps for the exchange of securities and cryptocurrencies, developed in the project and based on QKD. Atomic Swaps have great potentials for financial scenarios regarding securities, crypto exchanges and cryptocurrencies but have specific security threats.

The QKD market is expected to grow over $980 million by 2024. In the long term, the QKD will be strategic for the design of new architectures in many sectors like telco, defence and transports and 5G sectors. QKD's infrastructural security and its ability to mitigate cyber-risks, also allow a whole new class of approaches and applications for Decentralised Finance.

 

 

Key Takeaways:

-          QKD Features

-          Capabilities for Fintech applications

-          Atomic Swap and Crypto Exchanges

-          How QKD can mitigate risk in applications like smart contracts for Decentralised Finance Scenarios (for example in the Atomic SWAP use case)

Event Recording
Hila Meller: Covid 19 - Adapting to the New Normal
Nov 13, 2020

In her key note Hila Meller will explain how the new normal impacted by the Covid-19 global pandemic is reflected in the Cyber Security Space.

She will explain the changing threats in this new reality as well as the steps and strategies used by BT to globally adapt to the news ways of working, combined with a wider global view based on inputs and collaboration with large multi-national organizations.

Event Recording
Flavio Aggio: COVID-19 Cybersecurity Attacks
Nov 11, 2020

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and It is not only about training and awareness. It is about the way users must behave online and IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

Event Recording
Mario van Riesen: The Evolution of Application Security
Nov 16, 2020

Cyberattacks have rapidly evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their evasion techniques. While organisations and individuals continue to mobilise in an attempt to mitigate the global disruptions taking place around them, cybercriminals have wasted no time in exploiting the COVID-19 pandemic. Today, attackers and fraudsters call upon a sophisticated suite of tools, including human-powered click farms, social engineering, and malware – all designed to defeat traditional defenses such as WAFs & CAPTCHAs. 

This session will dive deeper into how organisations can keep pace with this precipitate shift and adjust their security postures accordingly, to more accurately reflect the realities of an ever-evolving threat landscape. 

Discussion Points:  

  • Attack Evolution - navigate the automated application attack-roadmap as it has progressed from the commodification of Credential Stuffing and ATO schemes to some of the most cutting-edge examples of Manual Fraud capability. 
  • Countermeasure Efficacy - discover how F5’s Application Fraud portfolio addresses the whole spectrum of eCrime attacks deterring cybercriminals who continually retool to circumvent traditional countermeasures. 
  • Inverting Friction - understand how organisations can protect their customers and brand without compromising user experience or collecting PII. 
Event Recording
Christopher Schuetze: Safer With Security - How Fabrics Can Be Used to Manage the Complexity of Your Enterprise Security
Nov 13, 2020

A flexible architecture is an absolute must in order to keep pace with new challenges within a constantly evolving landscape. Christopher Schütze, Cybersecurity Practice Director and Lead Analyst at KuppingerCole, will look at methodologies that help to structure, reorganize, and extend the existing Cybersecurity landscape within your organization. He will examine current topics such as “Information is the new oil” and “Trust only with verification – Zero Trust” and how you can integrate this into your strategy. Information security and ensuring a high level of trust must be a fundamental part of Cybersecurity strategies in the years to come. This will help you to make the right choices and improve overall security, and learn how to be safer with security.

Event Recording
Jan Tietze: Minimising Risk from Cyber Threats: Focus on Reducing Time to Containment
Nov 13, 2020
Event Recording
Matt Berzinski: Choosing the Right IAM solution to secure your Hybrid Cloud Environment
Nov 12, 2020

In 2020 organizations have been forced to accelerate their digital transformation plans to meet the needs of a more digital engaged end user. From remote workforces to shifts to online commerce, nearly every industry has had to adopt to this new reality. This has resulted in rapid cloud service adoption and a need for integration of existing on-premises investments with them. But today's Hybrid Cloud reality needs a comprehensive security policy that encompasses newly acquired cloud technologies all the way down to legacy on premises applications which provide business critical capabilities. In this presentation, we will discuss the characteristics needed in an Identity and Access Management platform that will allow organizations to quickly get address new security issues while allowing for a smooth digital transformation at their own pace.

Event Recording
Markus Malewski, Joerg Hesske: No Chance for Hackers and Spies. Why Thyssenkrupp Takes a Completely Different Approach to Security
Nov 20, 2020

Markus Malewski, Head of SOC / SIEM at thyssenkrupp gives an insight how thyssenkrupp re-formed the Security division after the Winnti attack in 2016, why the company is so well prepared for current and future challenges and how the solutions of Elastic help to achieve those. Jörg Hesske, AVP CEMEA at Elastic shows how Elastic Security helps SecOps teams to protect their company against threats quickly and precisely with an integrative security approach.

Event Recording
Panel - Accelerating Digital Transformation with Secure Cloud Access
Nov 12, 2020
Event Recording
Stefan Romberg: Regulatory Compliance Challenges in 2020
Nov 11, 2020

How do you prepare for the increasing regulatory challenges in a time of ongoing cloud migrations with global service providers? The invalidation of the EU-US privacy shield and the enforcement of the NDAA Section 889 will require a thorough review of existing controls and a swift management of stakeholder interests. This key note will provide practical experiences and guidance to ensure you meet your compliance goals.

Event Recording
Bryan Christ: Improving Operational Maturity with an Automation First Strategy
Nov 16, 2020

In his keynote, Bryan will talk on how automating Identity and Access Management can evolve your operational maturity and strengthen your security programs.