Event Recording

Panel | Getting Started on Your Zero Trust Journey

Show description
Speakers
Rainer Enders
VP of Engineering
Keeper Security, Inc.
Rainer Enders
Rainer Enders holds a master’s degree in electrical engineering from RWTH Aachen University and has over 30 years of experience in the data and storage networking and security industry. His current professional role is Vice President of Engineering at Keeper Security. As former CTO at NCP...
View profile
Alejandro Leal
Research Analyst
KuppingerCole
Alejandro Leal
Alejandro joined KuppingerCole as a Research Analyst in December 2021. His main areas of expertise include digital transformation in the public and private sector, managing business in today’s geopolitical context, and governance in artificial intelligence and cyberspace. Background...
View profile
Bryan Meister
Senior Principal Architect
Yahoo
Bryan Meister
Bryan Meister has been with Yahoo since 2011 holding multiple roles throughout the CIO organization including Service Desk Analyst, Technical Program Manager, Business Systems Analyst, and presently Senior Principal Architect. It was through this journey that Bryan experienced first-hand all...
View profile
Raghu Nandakumara
Senior Director, Solution Marketing
Illumio
Raghu Nandakumara
Raghu Nandakumara is a Senior Director Solution Marketing, at Illumio based in London, UK, where he is responsible for helping customers and prospects through their segmentation journeys. Previously, Raghu spent 15 years at Citibank, where he held a number of network security operations and...
View profile
Victoria van Roosmalen
CISO & DPO
Coosto
Victoria van Roosmalen
Victoria van Roosmalen is focused on empowering a brighter future and navigates others towards informed and thoughtful actions by sharing her expertise in IT, cybersecurity, and privacy-related affairs. As a CISO & DPO, she drives the information security and privacy governance at...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Nov 09, 2022

From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and requirements of European institutional cybersecurity architectures and how such architectures should be equipped to address current and future threats .

Event Recording
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
Nov 09, 2022

In this exclusively curated panel session, top CISOs from across the world reflect on where they find themselves today, explore trends that will define the cyber ecosystem over the next decade and highlight the core attributes required for future CISOs to maneuver through the challenges brought about by the digital enterprise.

Event Recording
Resilience and the Need for Privacy
Nov 09, 2022

This presentation will explore the role of privacy in building enterprise resilience.

Event Recording
Assessing your Cybersecurity Tools Portfolio: Optimize Cost, Increase Security
Nov 10, 2022

Most organizations don’t suffer from a lack of cybersecurity tools. They suffer from the cost and administrative burden of running too many of these. They suffer from the lack of integration. They suffer from the lack of skills in optimally configuring the tools and analyzing the data.

Couldn’t less be more? But what is the right answer? Just retiring some tools? Consolidating to new solutions such as XDR? Replacing old tools with the newest best-of-breed solutions?

As always, best start with a plan, and with defined methods to evaluate the contribution of the various tools you have to your targets. The plan must help you in understanding which elements you need most for protecting your IT. On the other hand, you must understand how well your existing tools landscape contributes to this.

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will unveil methodologies that can help you in assessing your cybersecurity tools portfolio, and that can help you in deciding about where to invest next.

Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Nov 10, 2022

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Event Recording
Exploring the Impact of Cybersecurity Regulations in the Digital World
Nov 09, 2022

The European Commission is working on various legal initiatives for the European Union related to the digitial world, and they are in various states of being adopted. This presentation gives an overview on these, and a looks into the content matter they cover. What are the most important imminent EU acts, how are they related, and what could be the impact?

Event Recording
Software Bill of Material - a Way to Prevent Black Swan Events?
Nov 09, 2022

SBOM offers multiple ways of getting under the covers of your and other provider's software resilience. Implemented properly, SBOM not only increases code and library transparency with a a much better chance to catch hidden software flaws much more quickly and potentially ahead of your adversaries, but is it worth the pain coming with it?

Event Recording
Sustainable Vulnerability Management: Case Study by KuppingerCole
Nov 10, 2022

For any large company, regulated or not, it is essential to have a mechanism or process for detecting vulnerabilities. For this purpose, various scanners exist that can automatically scan the company's IT assets for known and new vulnerabilities. However, this is where the big challenge begins: most scanners tend to find a large number of vulnerabilities. This is important and good, but not every vulnerability is equally relevant for every company.

Typically, most organizations drown quickly with the number of vulnerabilities they have. Different specific scanners for compliance, containers, source code, operating systems and applications deliver a hardly manageable number of different potential problems per asset.

For vulnerability management to work, you need to build a sustainable vulnerability management, define intelligent processes and specify intelligent bundling and prioritization.

In this presentation, Christopher Schütze will show how this was achieved in a successful project.

Event Recording
NIS2 Directive – What It Is and Why You Need to Prepare
Nov 10, 2022
Event Recording
Government's Role in Providing a Secure Framework for Digital Transformation
Nov 09, 2022

This keynote will explore the role of government in providing a secure framework for digital transformation.

Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Nov 10, 2022

Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of data, and the interruption or alteration of services. However, what happens if we have humans instead of IT systems? Given that the scope of an attacker is always the same, as aforementioned, attacking a human is an entirely different process, and the attack tactics must change. This well-known fact involves social engineering and human sciences (e.g., psychologists or behavioural sciences instead of informatics). However, from the cyber security side of the coin, what does it imply dealing with humans? What does it mean, for example, to perform convincing penetration testing or vulnerability scanning to deeply test human weaknesses: it is not merely a problem of sending a phishing email and waiting for clicks. How can be done a threat analysis or threat intelligence on humans? Moreover, how can a company calculate the cyber risk that a human represents and how many effective ways to reduce it? If we fully put humans (either as employees or IT security operators) at the centre of cybersecurity, the questions become several.

The problem is complex because, by its nature, it is multicultural and requires different non-technical competencies. It includes experts in philosophy, political science, cyber sociology, pedagogy, acting performance, etc., collaborating with cybersecurity experts. Facing the human element of security is a genuinely multicultural and interconnected approach. Furthermore, humans are coincidentally “human” and not machines: there are also ethical and legal issues to consider, and their reactions change during the day. The talk will explore and present a comprehensive view of what happens when there are not the IT systems but the humans at the centre of cybersecurity.

Event Recording
On the Charge: Securing the Energy Sector
Nov 10, 2022

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.