Event Recording

Microshard Technology: An Enabler for GDPR/Schrems II Compliance

Show description
Speaker
Pascal Cronauer
Head of EMEA
ShardSecure
Pascal Cronauer
Pascal has worked in the cybersecurity industry for over +20 years,  both in technical & commercial roles with numerous years focusing on security operations in particular SIEM. Pascal has developed a wealth of knowledge around cybersecurity incidents, remediation and also European and other...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Nov 10, 2022
Event Recording
Security Automation Strategies to Succeed or Fail: You Choose
Nov 10, 2022

This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and doctoral research into security automation, the presenter will examine the keys to successful security automation, including how to prioritize use cases and build enterprise support. This session will look at how to decide what to automate (and what not to automate), strategies to help ensure a successful security automation program, and lessons learned from success and failure, including worst reason to pursue security automation.

Event Recording
CSLS Wrap Up and Closing Keynote
Nov 10, 2022
Event Recording
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
Nov 09, 2022

The old saying goes, ‘The more things change, the more they stay the same”. This has never been more true than today in the modern CTO and CISO’s life. As technology evolves, the attack surface and actors adapt. Are they really different? Or are they the same vulnerabilities that have always existed, surfacing in new vectors in the infrastructure? Here are five new fundamental areas to keep in mind as you fend off the modern attacks of old.

Event Recording
On the Charge: Securing the Energy Sector
Nov 10, 2022

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.

Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Nov 09, 2022
Event Recording
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Nov 10, 2022

Imagine deepfake footage of a CEO engaging in bribery, a politician committing a sexual assault just a few days before an election, or soldiers committing atrocities on foreign soil. In our current environment, where conspiracy theories thrive, deepfakes could lead to catastrophic consequences. We are at an inflection point. Soon, deepfakes will move from being an oddity to possibly becoming a destructive social and political force. This presentation will discuss how deepfakes are made using deep learning methods and explore the possible impacts to society and to cybersecurity with some recent examples. The presenter will also discuss some of the latest research into deepfake detection.

Event Recording
Pools of Identity: Best Practices Start With Personal Password Behavior
Nov 09, 2022
Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
Nov 10, 2022

When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security means, above all, good, clean and clear security practices that happen before-hand and all day, everyday. This is particularly true for Identity and Access Management, which is a component of every domain within Cyber Security, and it's identified as a cause for more than 80% of data breaches. IAM is rarely about white-hat hackers counter-attacking an ongoing intrusion. It's mainly about a set of good practices, clearly defined processes and, overall, good hygiene in the way we manage our identities, our resources, our entitlements, and the way they relate to each other.

Event Recording
Debunking Common Myths About XDR
Nov 10, 2022
Event Recording
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
Nov 09, 2022

The role of a CISO has expanded beyond technical competence and compliance – an uncertain threat landscape calls for a technically competent leader with strategic oversight across the board, from engaging with multiple stakeholders to manage and get buy-in for cyber resilience programs to communicating cyber strategies to the board.

Join Christoph Hagenbuch and Alexander Silhavy in this session as they share proven strategies to help you make critical cybersecurity decisions and provides best practices on effective stakeholder management and communication.

 

Event Recording
Software Bill of Material - a Way to Prevent Black Swan Events?
Nov 09, 2022

SBOM offers multiple ways of getting under the covers of your and other provider's software resilience. Implemented properly, SBOM not only increases code and library transparency with a a much better chance to catch hidden software flaws much more quickly and potentially ahead of your adversaries, but is it worth the pain coming with it?