Event Recording

How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend

Show description
Speaker
Kashif Husain
Vice President, Information Security Officer
Nomura
Kashif Husain
In 2019 Kashif Husain joined the Frankfurt office of Nomura, a Japan headquartered financial services group present in over 30 countries. In addition to his role as Information Security Officer, Kashif has also taken over Technology Governance responsibilities for the Continental European...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Nov 09, 2022

Building and running cyber security in both worlds modern cloud security in combination and legacy on premises introduces extra complexity.  Some of the well known security patterns and models are not applicable in cloud systems while the modern security models like zero trust barely  fit in legacy systems. Based on a model for security classification we will explore some does and don’ts in modern cyber security.

Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Nov 10, 2022

Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of data, and the interruption or alteration of services. However, what happens if we have humans instead of IT systems? Given that the scope of an attacker is always the same, as aforementioned, attacking a human is an entirely different process, and the attack tactics must change. This well-known fact involves social engineering and human sciences (e.g., psychologists or behavioural sciences instead of informatics). However, from the cyber security side of the coin, what does it imply dealing with humans? What does it mean, for example, to perform convincing penetration testing or vulnerability scanning to deeply test human weaknesses: it is not merely a problem of sending a phishing email and waiting for clicks. How can be done a threat analysis or threat intelligence on humans? Moreover, how can a company calculate the cyber risk that a human represents and how many effective ways to reduce it? If we fully put humans (either as employees or IT security operators) at the centre of cybersecurity, the questions become several.

The problem is complex because, by its nature, it is multicultural and requires different non-technical competencies. It includes experts in philosophy, political science, cyber sociology, pedagogy, acting performance, etc., collaborating with cybersecurity experts. Facing the human element of security is a genuinely multicultural and interconnected approach. Furthermore, humans are coincidentally “human” and not machines: there are also ethical and legal issues to consider, and their reactions change during the day. The talk will explore and present a comprehensive view of what happens when there are not the IT systems but the humans at the centre of cybersecurity.

Event Recording
Debunking Common Myths About XDR
Nov 10, 2022
Event Recording
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
Nov 09, 2022

The role of a CISO has expanded beyond technical competence and compliance – an uncertain threat landscape calls for a technically competent leader with strategic oversight across the board, from engaging with multiple stakeholders to manage and get buy-in for cyber resilience programs to communicating cyber strategies to the board.

Join Christoph Hagenbuch and Alexander Silhavy in this session as they share proven strategies to help you make critical cybersecurity decisions and provides best practices on effective stakeholder management and communication.

 

Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Nov 10, 2022
Event Recording
SASE v/s Zero Trust: Going Beyond Buzzwords
Nov 09, 2022

The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in prominence.  

As organizations seek to improve their security capabilities, many are evaluating Zero Trust and SASE to determine whether to adopt either, one, or both.  Join this session to understand what each can potentially deliver and the exact nature of the relationship between them.

 

Event Recording
Effects of Malware Hunting in Cloud Environments
Nov 10, 2022
Event Recording
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
Nov 09, 2022

In this exclusively curated panel session, top CISOs from across the world reflect on where they find themselves today, explore trends that will define the cyber ecosystem over the next decade and highlight the core attributes required for future CISOs to maneuver through the challenges brought about by the digital enterprise.

Event Recording
Why Threat Intelligence is Losing its Edge and How to Overcome Noise Overload
Nov 09, 2022
Event Recording
Microshard Technology: An Enabler for GDPR/Schrems II Compliance
Nov 09, 2022

This session will examine the ruling of 16 July 2020, where the Court of Justice of the European Union (the Court) in its Case C-311/18 Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (called “Schrems II case”) invalidated the EU-US Privacy Shield adequacy decision.

  • GDPR / Schrems II - Cloud challenges companies facing day by day 
  • Where innovation bridges the gap required for cloud adoption/migration
  • How these new tools compliment and elevate existing standards in encryption/sensitive data transit/storage
  • Microsharding - The answer to all hybrid and multi cloud challenges? 

How and why Microsharding was developed as a concept and a short summary of ShardSecure by Co-founder & CEO, ShardSecure - Bob Lam

Event Recording
On the Charge: Securing the Energy Sector
Nov 10, 2022

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.

Event Recording
Exploring the Impact of Cybersecurity Regulations in the Digital World
Nov 09, 2022

The European Commission is working on various legal initiatives for the European Union related to the digitial world, and they are in various states of being adopted. This presentation gives an overview on these, and a looks into the content matter they cover. What are the most important imminent EU acts, how are they related, and what could be the impact?