Event Recording

Panel | Cyber Hygiene Best Practices: Why Does It Matter?

Show description
Speakers
Warwick Ashford
Senior Analyst
KuppingerCole
Warwick Ashford
Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist and editor since 2003, specialising in cybersecurity and privacy since 2012. Warwick has also...
View profile
Boris Beuster
Cyber Security - Head of Governance, Risk & Compliance
E.ON SE
Boris Beuster
Boris studied economics with a wholesale/resale focus and gained experience as project manager for process optimisation and IT. Since 2011 he has been working on cyber security topics and made it his profession 2014 at innogy. After leading the Information Security Officers at innogy, Boris...
View profile
Noam Green
VP Product
Cyolo
Noam Green
Noam Green is VP of Product at Cyolo. He joined the company after holding multiple executive product positions in a variety of cybersecurity companies, including Forescout Technologies and Check Point. With more than 20 years of experience in the industry, Noam is a true evangelist of...
View profile
Christoph Kumpa
Regional Director Central and Eastern Europe
Axonius
Christoph Kumpa
Christoph Kumpa is Regional Director at Axonius. His previous roles include Sales and Consulting responsibilities at HP, Computacenter, and Dimension Data. Kumpa is an Information Security and Data Protection enthusiast and also founded a Technology & Management Consulting Company just...
View profile
Manuel Garat Loureiro
Head of IAM (Identity and Access Management) | CISA | PSPO
Booking.com
Manuel Garat Loureiro
After being a software developer for 10 years, Manuel realised that his focus on value delivery, product vision and strategic significance was pulling him towards a new and exciting role. As an IAM (Indentity and Access Management) Product Owner, he brings together his three passions: Software...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
SASE v/s Zero Trust: Going Beyond Buzzwords
Nov 09, 2022

The concepts behind Zero Trust and SASE are not new, but recent developments in technological capabilities, changes in the way people are working, accelerated adoption of cloud and Edge computing, and the continued evolution of cyberthreats have resulted in both rising in prominence.  

As organizations seek to improve their security capabilities, many are evaluating Zero Trust and SASE to determine whether to adopt either, one, or both.  Join this session to understand what each can potentially deliver and the exact nature of the relationship between them.

 

Event Recording
Assessing your Cybersecurity Tools Portfolio: Optimize Cost, Increase Security
Nov 10, 2022

Most organizations don’t suffer from a lack of cybersecurity tools. They suffer from the cost and administrative burden of running too many of these. They suffer from the lack of integration. They suffer from the lack of skills in optimally configuring the tools and analyzing the data.

Couldn’t less be more? But what is the right answer? Just retiring some tools? Consolidating to new solutions such as XDR? Replacing old tools with the newest best-of-breed solutions?

As always, best start with a plan, and with defined methods to evaluate the contribution of the various tools you have to your targets. The plan must help you in understanding which elements you need most for protecting your IT. On the other hand, you must understand how well your existing tools landscape contributes to this.

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will unveil methodologies that can help you in assessing your cybersecurity tools portfolio, and that can help you in deciding about where to invest next.

Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Nov 09, 2022

Building and running cyber security in both worlds modern cloud security in combination and legacy on premises introduces extra complexity.  Some of the well known security patterns and models are not applicable in cloud systems while the modern security models like zero trust barely  fit in legacy systems. Based on a model for security classification we will explore some does and don’ts in modern cyber security.

Event Recording
CISO Talk: Cloud as a Security Enabler
Nov 09, 2022

More organizations are now moving to the cloud.  From a security perspective – refactoring the applications provides a major opportunity to improve security posture.  This session explores how the right approach towards can save time, increase inherent security, and ensure apps are compliant.

Event Recording
Zero Trust Journey, How We Moved from an Immature Organization to Zero Trust
Nov 09, 2022

This is the story of our journey to Zero Trust, from the initial analysis to its technical and effective implementation. As many organizations our starting point was not the best one (lack of proper asset management, mixed permissions, etc) but when we started to work on a Zero Trust implementation we were able to overcome these and also solve some unforeseen problems and offer major security also through Human Factors and Risk Management. The aim of this talk is to inspire security leaders on what is a Zero Trust Architecture (which is not an off-the-shelf solution and desn't require massive initial investments) and how they can reuse their internal knowledge and tools to deliver it.

Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Nov 09, 2022

As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex.

But there's good news: asset management has evolved.

Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps.

Join this workshop to learn: how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Nov 10, 2022
Event Recording
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Nov 10, 2022
Event Recording
Cyber Warfare - A Reality Check
Nov 10, 2022

Cyber Warfare and Disinformation have been heavily weaponized since Russia´s full-scale Invasion of Ukraine and even before, aiming at destabilizing the free part of the world. It is the "synergy of the evil" between cyber warfare and MDM (Misinformation, Disinformation, Malinformation) that is causing the potential for long term damages and risks for critical infrastructures, societies and businesses. What is it that we have to expect in the near and longer future? How can we prepare for the worse to come? Ksenia Iliuk will share with us her insights from now 8 years since the Krim Invasion and 8 months in the general Cyber and Information Warfare in Ukraine.  

Event Recording
Only Those Who Know the Dangers Can Protect Themselves
Nov 10, 2022

How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers and social engineers work with social pentester Graham Stanforth.

Event Recording
Panel | Getting Started on Your Zero Trust Journey
Nov 09, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.

Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Nov 09, 2022

Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises that, if not properly managed, can endanger and even kill organizations as a whole.

Assessing and understanding key assets and the threats towards them is true, applied, real-life risk management. Acting and reacting in the crisis needs to be based on a proper preparation. Service continuity and IT service continuity do not happen out of the blue but out of business-informed planning, and preparation.

Christopher Schuetze, Matthias Reinwarth and Kai Boschert will highlight the most important steps of an organization's journey to prepare for and even embrace disruptive events and circumstances as part of a holistic, sustainable business approach.

They will provide guidance and, even more importantly, challenge the audience with collaborative exercises for understanding and applying key methodologies to converge business resilience management and cybersecurity into a single, tailored, yet agile survical strategy. Five building blocks will be outlined that form the foundation of a unified strategy to achieve the common goals of resilience and recovery while limiting the impact of cyber attacks on business operations.