Event Recording

Espen Otterstad: Social Engineering - Exploiting the Human Factor

Speaker
Espen Otterstad
Head of IT and Cybersecurity
ABAX
Espen Otterstad
Espen Otterstad is the Global Head of IT and Cybersecurity at the Norwegian telematics company ABAX, the leading company in tracking of vehicles, equipment, plants, and tools. His current focus on security culture and the understanding of how the human factors impact the security posture of his...
View profile
Playlist
Cybersecurity Leadership Summit 2020
Event Recording
Hila Meller: Covid 19 - Adapting to the New Normal
Nov 13, 2020

In her key note Hila Meller will explain how the new normal impacted by the Covid-19 global pandemic is reflected in the Cyber Security Space.

She will explain the changing threats in this new reality as well as the steps and strategies used by BT to globally adapt to the news ways of working, combined with a wider global view based on inputs and collaboration with large multi-national organizations.

Event Recording
Ammar Alkassar: Cybersecurity and Digitisation within the Corona Crisis – First Experiences and Initial Conclusions
Nov 12, 2020

Within the Corona Crisis, IT and digitisation have proven their essential role for state administration, economy, as well as society. These techniques are not only the backbone for our highly-industrialized countries, but now also recommended as such.

The keynote will reflect the first months of the Corona Crisis with a focus on digital administration and IT as backbone. In this context, aspects of project management, management culture, and risk tolerance will be addressed. Last, but not least the keynote will present theses on experiences and future do’s and don’ts, especially focussing on cybersecurity and data protection in digital project management.

Event Recording
Panel - Accelerating Digital Transformation with Secure Cloud Access
Nov 12, 2020
Event Recording
Matt Berzinski: Choosing the Right IAM solution to secure your Hybrid Cloud Environment
Nov 12, 2020

In 2020 organizations have been forced to accelerate their digital transformation plans to meet the needs of a more digital engaged end user. From remote workforces to shifts to online commerce, nearly every industry has had to adopt to this new reality. This has resulted in rapid cloud service adoption and a need for integration of existing on-premises investments with them. But today's Hybrid Cloud reality needs a comprehensive security policy that encompasses newly acquired cloud technologies all the way down to legacy on premises applications which provide business critical capabilities. In this presentation, we will discuss the characteristics needed in an Identity and Access Management platform that will allow organizations to quickly get address new security issues while allowing for a smooth digital transformation at their own pace.

Event Recording
Markus Malewski, Joerg Hesske: No Chance for Hackers and Spies. Why Thyssenkrupp Takes a Completely Different Approach to Security
Nov 20, 2020

Markus Malewski, Head of SOC / SIEM at thyssenkrupp gives an insight how thyssenkrupp re-formed the Security division after the Winnti attack in 2016, why the company is so well prepared for current and future challenges and how the solutions of Elastic help to achieve those. Jörg Hesske, AVP CEMEA at Elastic shows how Elastic Security helps SecOps teams to protect their company against threats quickly and precisely with an integrative security approach.

Event Recording
Ana Isabel Ayerbe Fernández-Cuesta: Security by Design IoT Development and Certificate Framework
Nov 13, 2020

Next-generation of Smart IoT Systems needs to manage the closed loop from sensing to actuation with safe operational boundaries and the need to be distributed across IoT, Edge and cloud infrastructures with complex and heterogeneous systems, connectivity and failures, as well as being able to operate in an unpredictable physical world facing situations that have not been fully understood or anticipated in the software development process.

In this context, it is necessary to support the continuous delivery of trustworthy Smart IoT Systems, to support their agile operation, to support the continuous quality assurance strengthening their trustworthiness, and to leverage the capabilities of existing IoT platforms and fully legacy, proprietary and off-the-shelf software components and devices. In this talk, it will be explained how to facilitate the development, operation and quality assurance of trustworthy and resilient Smart IoT systems.

Event Recording
Elastic Security Workshop Part I - Unified Protection for Everyone
Nov 19, 2020

Learn how the latest security capabilities in the Elastic Stack enable interactive exploration, incident management and automated analysis, as well as unsupervised machine learning to reduce false positives and spot anomalies — all at the speed and scale your security practitioners need to defend your organization. Additionally, we'll be talking about the new protection and detection capabilities of the free Elastic Endpoint, now also part of Elastic Security, as well as EQL - the event query language, which brings new query and detection capabilities to Elastic Security.

Event Recording
Panel - Assuring the Security of Your Enterprise - Social Engineering and Pentesting
Nov 13, 2020
Event Recording
Brennan Lodge: Home Grown Machine Learning Implementation for the SOC
Nov 12, 2020

The machine learning deployment, integration, and release pipeline is unique and unlike any typical software, application or detection life cycle. A SOC has a blend of infrastructure, team dynamics, disparate logs and data sets, a SEIM, ticketing systems and a need for analytics to better serve and improve their defenses, cyber security posture and incident response. Proper implementation of using machine learning for cyber security defenses can be done with both team and engineering integrations. This talk will walk through an example of machine learning implementation for the SOC in an enterprise environment with lessons learned and best practices. 

Event Recording
Jochen Fischer: A Small Leak Can Sink A Great Ship - Cybersecurity Warfare & SAP
Nov 13, 2020

Security is Culture – and culture starts with people (not technology!) The complex topic of SAP-security is a massive challenge for the almost 500.000 companies worldwide using SAP. The challenges are the same for everyone, and it is the combined corporate responsibility of the C-Level and all employees to protect the enterprise from threats. These core applications can be secured by focusing on the 3 main attack vectors: People, Processes, and Technology. Within this keynote, Jochen Fischer shares what needs to be done to define clear ownership and responsibilities for SAP-security. Enabling people to understand the risk in SAP is fundamental to design a sustainable strategy that is based on the individual risk profile of each individual company. It is time to stop the monkey business when it comes to mission-critical topics like security. As independent expert, Jochen Fischer provides state-of-the-art methodologies to deliver the right people the suitable skills required to protect SAP without burning money on tools that have no or limited effect on corporate cyber resilience.

Event Recording
Flavio Aggio: COVID-19 Cybersecurity Attacks
Nov 11, 2020

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and It is not only about training and awareness. It is about the way users must behave online and IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

Event Recording
Bryan Christ: Improving Operational Maturity with an Automation First Strategy
Nov 16, 2020

In his keynote, Bryan will talk on how automating Identity and Access Management can evolve your operational maturity and strengthen your security programs.