Event Recording

Software Bill of Material - a Way to Prevent Black Swan Events?

Show description
Speaker
Frank Fischer
Group CISO, Head of Cyber Security
DHL Group
Frank Fischer
Frank is the Group CISO and Head of Cyber Security at DHL Group. Previously he was CISO and global head of Information Security at Deutsche Bahn (German Railways) with more than 300000 employees. He is also program manager of the CyberSecurity@DB transformation program since 2018. In...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Resilience and the Need for Privacy
Nov 09, 2022

This presentation will explore the role of privacy in building enterprise resilience.

Event Recording
Awareness?! How to Make It Work in a Low-Tech Environment
Nov 10, 2022
Event Recording
Government's Role in Providing a Secure Framework for Digital Transformation
Nov 09, 2022

This keynote will explore the role of government in providing a secure framework for digital transformation.

Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Nov 09, 2022

Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises that, if not properly managed, can endanger and even kill organizations as a whole.

Assessing and understanding key assets and the threats towards them is true, applied, real-life risk management. Acting and reacting in the crisis needs to be based on a proper preparation. Service continuity and IT service continuity do not happen out of the blue but out of business-informed planning, and preparation.

Christopher Schuetze, Matthias Reinwarth and Kai Boschert will highlight the most important steps of an organization's journey to prepare for and even embrace disruptive events and circumstances as part of a holistic, sustainable business approach.

They will provide guidance and, even more importantly, challenge the audience with collaborative exercises for understanding and applying key methodologies to converge business resilience management and cybersecurity into a single, tailored, yet agile survical strategy. Five building blocks will be outlined that form the foundation of a unified strategy to achieve the common goals of resilience and recovery while limiting the impact of cyber attacks on business operations.

Event Recording
How the Current Crisis could become a Catalyst for Various Transformations
Nov 10, 2022
Event Recording
Protecting Infrastructure in an Exposed Environment
Nov 10, 2022
Event Recording
NIS2 Directive – What It Is and Why You Need to Prepare
Nov 10, 2022
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
Nov 09, 2022

In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and transparency in your own organization. All the necessary rules and templates (e.g., for password management, connection guidelines for protocols used and authorizations) are based on best practices, the BSI risk class model and the requirements of ISO27001.

Event Recording
CSLS Wrap Up and Closing Keynote
Nov 10, 2022
Event Recording
Security Automation: Realizing Business Benefits, Without Adding Headcount
Nov 09, 2022

The next generation of cyber threats have arrived and there aren’t enough security people or budgets to handle the growing volume and complexity. This presentation will explore why organizations — and not just their security teams — need security automation. We will look at the reasons why security teams utilize SOAR (Security Orchestration, Automation, and Response) to keep pace with threats and technological innovations, without their organizations needing to add headcount. Learn how when the security team automates traditional Tier 1 work, the entire organization benefits - from upskilling staff to eliminating spend on managed services. This session draws from real-world European enterprises whose adoption of NextGen SOAR was the catalyst for fundamental security and organizational improvements.

Event Recording
Enterprise Access Control for Zero Trust
Nov 09, 2022

With many privileges to manage within an organization, authorization within an Enterprise can be a challenge. As capabilities in any organization are often in a state of constant change and growing complexity, implied trust can easily creep into authorization frameworks and policies leading to an overly-permissive environment. Learn how an organization can layer and support Role, Attribute, and Policy-Based Access Control methodologies to avoid these pitfalls and while also preventing entitlement duplication leading to a more secure Identity perimeter for your users. 

Event Recording
Only Those Who Know the Dangers Can Protect Themselves
Nov 10, 2022

How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers and social engineers work with social pentester Graham Stanforth.