Event Recording

Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism

Show description
Speaker
Connie McIntosh
Head of Security - Market Area
Ericsson
Connie McIntosh
Named top 100 women in Cybersecurity worldwide by Cyber Defense Magazine. An International speaker, presenter, CTF judge and mentor in cybersecurity. Connie is a Product Security Leader in Ericsson and has over 20 years’ experience in Network and Cyber Security. Connie is passionate about...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
CSLS Wrap Up and Closing Keynote
Nov 10, 2022
Event Recording
Risk-Based Cyber Reporting Best Practices
Nov 09, 2022

Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the Board. Yet, reporting today is far from being a formality and does not comprehensively highlight an organization's exposure to cyber threats. Join this session to understand the factors that drive the effectiveness of a risk-based cybersecurity report and get access to best practices on communicating actionable metrics within a specific context.

Event Recording
Building Resilience After a Major Incident
Nov 09, 2022

This presentation will explore resilience measures to be taken immediately after a major incident.

Event Recording
How the Current Crisis could become a Catalyst for Various Transformations
Nov 10, 2022
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Nov 09, 2022

From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and requirements of European institutional cybersecurity architectures and how such architectures should be equipped to address current and future threats .

Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Nov 09, 2022

Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises that, if not properly managed, can endanger and even kill organizations as a whole.

Assessing and understanding key assets and the threats towards them is true, applied, real-life risk management. Acting and reacting in the crisis needs to be based on a proper preparation. Service continuity and IT service continuity do not happen out of the blue but out of business-informed planning, and preparation.

Christopher Schuetze, Matthias Reinwarth and Kai Boschert will highlight the most important steps of an organization's journey to prepare for and even embrace disruptive events and circumstances as part of a holistic, sustainable business approach.

They will provide guidance and, even more importantly, challenge the audience with collaborative exercises for understanding and applying key methodologies to converge business resilience management and cybersecurity into a single, tailored, yet agile survical strategy. Five building blocks will be outlined that form the foundation of a unified strategy to achieve the common goals of resilience and recovery while limiting the impact of cyber attacks on business operations.

Event Recording
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Nov 09, 2022

Even though MDM has had a long history during war and times of high tension,  the digital era has been increasing reach and potential impact of weaponized misinformation. Sophisticated tools such as machine learning mechanisms and software bots is opening a huge battlefield for creating and spreading manipulated information at scale even for those with limited technical skills. From nation state attacks through organized crime down to that one single customer who feels treated unwell – they all can use such tools. What does this trend mean for your organization and what ist he CISO´s role combating MDM attacks? In this extra-long panel session we will try to find answers on how MDM will affect our organizations and how we can increase antoi-MDM resilience.

Event Recording
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Nov 10, 2022

Implementing digital solutions enabling only using validated digital identities as the foundation for all other IAM and cybersecurity measures is the prerequisite to establish an agile ecosystem of commerce and corporation governed by security, protection, management of threats and ultimately trust. 

For more than 15 years, Denmark has provided public access to eID. 3. generation is now available delivering one unified system giving both citizens, employees, public authorities, and businesses easy access to solely accepting and using validated digital identities. Ensuring compliance within the framework of eIDAS and ultimately NIS2.

Bjarke Alling - current member and prior co-chair of the Danish National Cyber Security Council, founder and Group Director of the IT cybersecurity software company Liga, and a key contributor to the development of the Danish eID solution, will share insights into the solution and put it into a broader broader-crossing perspective.

Event Recording
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Nov 10, 2022

Imagine deepfake footage of a CEO engaging in bribery, a politician committing a sexual assault just a few days before an election, or soldiers committing atrocities on foreign soil. In our current environment, where conspiracy theories thrive, deepfakes could lead to catastrophic consequences. We are at an inflection point. Soon, deepfakes will move from being an oddity to possibly becoming a destructive social and political force. This presentation will discuss how deepfakes are made using deep learning methods and explore the possible impacts to society and to cybersecurity with some recent examples. The presenter will also discuss some of the latest research into deepfake detection.

Event Recording
Let’s Think Zero Trust – for IT, OT and Products
Nov 09, 2022

Over the past two years, Siemens has been on a mission to protect a global enterprise through the highest Zero Trust standards, and this journey is far from over.

In this session, program lead Thomas Müller-Lynch share his experiences on the road to Zero Trust readiness of all assets from IT and OT.

Event Recording
The European Cybersecurity Competence Center (ECCC) and the Future of Cybersecurity in Europe
Nov 09, 2022
Event Recording
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
Nov 09, 2022

The role of a CISO has expanded beyond technical competence and compliance – an uncertain threat landscape calls for a technically competent leader with strategic oversight across the board, from engaging with multiple stakeholders to manage and get buy-in for cyber resilience programs to communicating cyber strategies to the board.

Join Christoph Hagenbuch and Alexander Silhavy in this session as they share proven strategies to help you make critical cybersecurity decisions and provides best practices on effective stakeholder management and communication.