Event Recording

Jan Tietze: Minimising Risk from Cyber Threats: Focus on Reducing Time to Containment

Speaker
Jan Tietze
Director Security Strategy, EMEA
SentinelOne
Jan Tietze
Before joining Sentinel One in 2020, Jan Tietze served in senior technical and management roles ranging from engineering to CIO and CTO roles for global IT and consultancy organizations. With a strong background in enterprise IT and an early career in senior field engineering roles in Microsoft...
View profile
Playlist
Cybersecurity Leadership Summit 2020
Event Recording
Elastic Security Workshop Part I - Unified Protection for Everyone
Nov 19, 2020

Learn how the latest security capabilities in the Elastic Stack enable interactive exploration, incident management and automated analysis, as well as unsupervised machine learning to reduce false positives and spot anomalies — all at the speed and scale your security practitioners need to defend your organization. Additionally, we'll be talking about the new protection and detection capabilities of the free Elastic Endpoint, now also part of Elastic Security, as well as EQL - the event query language, which brings new query and detection capabilities to Elastic Security.

Event Recording
Jean-Christophe Gaillard: The Cyber Security Skills Gap: Real Problem or Self-inflicted Pain?
Nov 12, 2020

You don’t have to go far these days to find security professionals complaining about skills shortages, and countless media outlets relaying their views. But there are at least two sides to this argument and the situation requires a more balanced approach. The security industry needs to rebuild its narrative to attract more raw talent at all levels.

Event Recording
Enrico Frumento: IT-OT Convergence of Security
Nov 12, 2020

Experts define Operational Technology (OT) as «hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.»

OT differs from IT, in terms of functionalities, the culture of operators and threats. In recent months, we witness an increasing convergence of IT and OT systems. This area is a novel and rapidly expanding one for both cybercrime and industry. Recent IBM’s 2020 X-Force Threat Intelligence Index summarizes that attacks targeting operational technology (OT) infrastructure increased by over 2000 per cent in 2019 compared to the previous year. The COVID-19 pandemic accelerated these trends: it is the digital accelerant of the decade and accelerated companies’ digital transformations by approximately a global average of 6 years.

For example, one of the impacts of COVID-19 –at least until a vaccine is discovered– is the reduction of on-site staff. In the case of OT systems, this put a strain on the already limited resources and required an increase in external connectivity. The result is the numerous industrial plants exposed to, for example, ransomware attacks.

 

From a bird-fly point of view, IT and OT are still missing a holistic approach that includes cybersecurity, physical security and cyber-physical security, an integrated cyber-risk estimation and governance models able to span across IT and OT domains. Overall the primary need concentrates around as reconciliation of IT Security (typically built on Confidentiality-Integrity-Availability paradigm) with OT Cybersecurity (which fundamental properties are instead Safety-Reliability-Productivity).

 

 

Key Takeaways:

-          Status of IT and OT security

-          long term impacts of the pandemic on the digital transformation agenda of industry

-          Main challenges and trends for the IT and OT security

-          Some possible solutions

Event Recording
Brennan Lodge: Home Grown Machine Learning Implementation for the SOC
Nov 12, 2020

The machine learning deployment, integration, and release pipeline is unique and unlike any typical software, application or detection life cycle. A SOC has a blend of infrastructure, team dynamics, disparate logs and data sets, a SEIM, ticketing systems and a need for analytics to better serve and improve their defenses, cyber security posture and incident response. Proper implementation of using machine learning for cyber security defenses can be done with both team and engineering integrations. This talk will walk through an example of machine learning implementation for the SOC in an enterprise environment with lessons learned and best practices. 

Event Recording
Christopher Schuetze: Safer With Security - How Fabrics Can Be Used to Manage the Complexity of Your Enterprise Security
Nov 13, 2020

A flexible architecture is an absolute must in order to keep pace with new challenges within a constantly evolving landscape. Christopher Schütze, Cybersecurity Practice Director and Lead Analyst at KuppingerCole, will look at methodologies that help to structure, reorganize, and extend the existing Cybersecurity landscape within your organization. He will examine current topics such as “Information is the new oil” and “Trust only with verification – Zero Trust” and how you can integrate this into your strategy. Information security and ensuring a high level of trust must be a fundamental part of Cybersecurity strategies in the years to come. This will help you to make the right choices and improve overall security, and learn how to be safer with security.

Event Recording
Stefan Würtemberger: The Road to Zero Trust After a Cyber-Incident
Nov 12, 2020
Event Recording
Panel - Zero Trust Paradigm for the Future of Security
Nov 12, 2020
Event Recording
Flavio Aggio: COVID-19 Cybersecurity Attacks
Nov 11, 2020

Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and It is not only about training and awareness. It is about the way users must behave online and IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

Event Recording
Sergej Epp, Ashley Ward: Need for Speed: How DevOps is Changing Cybersecurity
Nov 12, 2020

Is your cybersecurity as fast as your business? Finding the right strategy to secure the growing speed and diversity of DevOps driven application development and dynamic infrastructures is hard. To master this journey, organisations have not only to adapt new security controls but in most cases to redefine their cybersecurity strategy and traditional approaches such as Defence-in-Depth and Zero Trust Architectures from scratch.
In this session, you will learn the FIRST PRINCIPLES how to align the pace of your cybersecurity to your business speed from both perspectives: a cybersecurity expert and a former developer.

Event Recording
Panel - Assuring the Security of Your Enterprise - Social Engineering and Pentesting
Nov 13, 2020
Event Recording
Ioannis Chrysakis: The CAP-A Best Practice: Towards Enabling a Privacy-Friendly Apps Market by Applying a Crowdsourcing-Based Evaluation Approach
Nov 16, 2020
Event Recording
Markus Malewski, Joerg Hesske: No Chance for Hackers and Spies. Why Thyssenkrupp Takes a Completely Different Approach to Security
Nov 20, 2020

Markus Malewski, Head of SOC / SIEM at thyssenkrupp gives an insight how thyssenkrupp re-formed the Security division after the Winnti attack in 2016, why the company is so well prepared for current and future challenges and how the solutions of Elastic help to achieve those. Jörg Hesske, AVP CEMEA at Elastic shows how Elastic Security helps SecOps teams to protect their company against threats quickly and precisely with an integrative security approach.