Event Recording

Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?

Show description
Speakers
Jennifer Hanley-Giersch
Managing Partner
Berlin Risk Advisors GmbH
Jennifer Hanley-Giersch
Jennifer is a co-founder and managing partner of Berlin Risk and ALL AML , and Advisor to Blackdot Solutions . She has been working in investigations and anti-financial crime for twenty two years and is a Certified Anti-Money Laundering Specialist and a Certified Fraud Examiner. Jennifer was...
View profile
Ksenia Iliuk
Head of Research
Detector Media, Ukraine
Ksenia Iliuk
Ksenia Iliuk is Head of Research at Detector Media, Ukraine. She specialises in leveraging the power of artificial intelligence to identify and expose hostile information influence, in particular on social media. Among the key topics, she studies malign information campaigns and computational...
View profile
Dr. Barbara Mandl
Director Cybersecurity
FOSTER FORE
Dr. Barbara Mandl
Dr. Barbara Mandl is a FOSTER FORE Advisor  with a focus on topics related to the CISO role in large enterprises. Her previous role was Group CISO at Daimler until May 2017; She was also responsible for Global Identity and Access Management at Daimler and Security Architecture. Dr....
View profile
Hila Meller
Managing Director Global Sales, Co-Founder Leading Cyber Ladies
BT Security
Hila Meller
Hila has more than 20 years of experience in the security world. During her career, she’s worked with some of the world’s best known brands and international organisations to protect their IT estate and business assets, while taking them through digital transformation initiatives....
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Let’s Think Zero Trust – for IT, OT and Products
Nov 09, 2022

Over the past two years, Siemens has been on a mission to protect a global enterprise through the highest Zero Trust standards, and this journey is far from over.

In this session, program lead Thomas Müller-Lynch share his experiences on the road to Zero Trust readiness of all assets from IT and OT.

Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
Nov 09, 2022

The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the connected areas that are impacted by Cybercrime.  There is more at risk than what can be solved by technology.

Event Recording
The European Cybersecurity Competence Center (ECCC) and the Future of Cybersecurity in Europe
Nov 09, 2022
Event Recording
Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism
Nov 10, 2022

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War

Join this session to gain a deeper understanding of threat actors and the current threat landscape, in order to help you adapt and protect your organisation from cyber warfare. We know adversaries do not rest. Attacks are growing more destructive, causing mass disruption to organisations and society. Take away knowledge of Threat Actors, current attacks, strategies to defend your organisation and understand how your workforce puts you both at risk but can also be leveraged to be your first line of defence.

Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Nov 10, 2022
Event Recording
Effects of Malware Hunting in Cloud Environments
Nov 10, 2022
Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Nov 10, 2022

Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this challenge and delivered numerous software and hardware solutions, design and development principles, policies and process controls.

However, as most successful cyber-attacks in recent time have started by targeting users with phishing emails or social engineering, raising awareness of their role in increasing cyber resilience is at least as important as providing “just a technical solution”.

This presentation will – based on example of a famous real robbery in Berlin – show how user awareness can become an important line of defence in cyber security.

Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Nov 10, 2022

Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of data, and the interruption or alteration of services. However, what happens if we have humans instead of IT systems? Given that the scope of an attacker is always the same, as aforementioned, attacking a human is an entirely different process, and the attack tactics must change. This well-known fact involves social engineering and human sciences (e.g., psychologists or behavioural sciences instead of informatics). However, from the cyber security side of the coin, what does it imply dealing with humans? What does it mean, for example, to perform convincing penetration testing or vulnerability scanning to deeply test human weaknesses: it is not merely a problem of sending a phishing email and waiting for clicks. How can be done a threat analysis or threat intelligence on humans? Moreover, how can a company calculate the cyber risk that a human represents and how many effective ways to reduce it? If we fully put humans (either as employees or IT security operators) at the centre of cybersecurity, the questions become several.

The problem is complex because, by its nature, it is multicultural and requires different non-technical competencies. It includes experts in philosophy, political science, cyber sociology, pedagogy, acting performance, etc., collaborating with cybersecurity experts. Facing the human element of security is a genuinely multicultural and interconnected approach. Furthermore, humans are coincidentally “human” and not machines: there are also ethical and legal issues to consider, and their reactions change during the day. The talk will explore and present a comprehensive view of what happens when there are not the IT systems but the humans at the centre of cybersecurity.

Event Recording
On the Charge: Securing the Energy Sector
Nov 10, 2022

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.

Event Recording
Security Automation: Realizing Business Benefits, Without Adding Headcount
Nov 09, 2022

The next generation of cyber threats have arrived and there aren’t enough security people or budgets to handle the growing volume and complexity. This presentation will explore why organizations — and not just their security teams — need security automation. We will look at the reasons why security teams utilize SOAR (Security Orchestration, Automation, and Response) to keep pace with threats and technological innovations, without their organizations needing to add headcount. Learn how when the security team automates traditional Tier 1 work, the entire organization benefits - from upskilling staff to eliminating spend on managed services. This session draws from real-world European enterprises whose adoption of NextGen SOAR was the catalyst for fundamental security and organizational improvements.

Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Nov 09, 2022

From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and requirements of European institutional cybersecurity architectures and how such architectures should be equipped to address current and future threats .

Event Recording
Panel | Getting Started on Your Zero Trust Journey
Nov 09, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.