Event Recording

Germany's Cybersecurity Architecture and How it is Linked to International Actors

Show description
Speaker
Christina Rupp
Project Manager International Cybersecurity Policy
Stiftung Neue Verantwortung
Christina Rupp
Christina Rupp is Project Manager for International Cybersecurity Policy. Her work focusses on issues of cyber diplomacy and cyber foreign policy, especially with regard to international norms for responsible state behavior in cyberspace, as well as Germany’s cybersecurity architecture....
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
On the Charge: Securing the Energy Sector
Nov 10, 2022

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.

Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Nov 09, 2022
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Nov 09, 2022

As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex.

But there's good news: asset management has evolved.

Today’s “asset intelligence” moves from a spreadsheet approach to an API-driven, always up-to-date view into all assets via integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps.

Join this workshop to learn: how asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category improves security hygiene, reduces manual work, and remediates gaps.

Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Nov 09, 2022

From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and requirements of European institutional cybersecurity architectures and how such architectures should be equipped to address current and future threats .

Event Recording
Effects of Malware Hunting in Cloud Environments
Nov 10, 2022
Event Recording
Successfully tackling your Digital Supply Chain Risk
Nov 09, 2022

In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding to software supply chain security and others. He will look at prominent examples and common weaknesses in these areas. He then will provide insight into actions that organizations should and must take, both organizational and technical.

 

Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Nov 10, 2022
Event Recording
Let’s Think Zero Trust – for IT, OT and Products
Nov 09, 2022

Over the past two years, Siemens has been on a mission to protect a global enterprise through the highest Zero Trust standards, and this journey is far from over.

In this session, program lead Thomas Müller-Lynch share his experiences on the road to Zero Trust readiness of all assets from IT and OT.

Event Recording
Resilience and the Need for Privacy
Nov 09, 2022

This presentation will explore the role of privacy in building enterprise resilience.

Event Recording
Panel | Getting Started on Your Zero Trust Journey
Nov 09, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.

Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
Nov 09, 2022

In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and transparency in your own organization. All the necessary rules and templates (e.g., for password management, connection guidelines for protocols used and authorizations) are based on best practices, the BSI risk class model and the requirements of ISO27001.

Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Nov 09, 2022

Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises that, if not properly managed, can endanger and even kill organizations as a whole.

Assessing and understanding key assets and the threats towards them is true, applied, real-life risk management. Acting and reacting in the crisis needs to be based on a proper preparation. Service continuity and IT service continuity do not happen out of the blue but out of business-informed planning, and preparation.

Christopher Schuetze, Matthias Reinwarth and Kai Boschert will highlight the most important steps of an organization's journey to prepare for and even embrace disruptive events and circumstances as part of a holistic, sustainable business approach.

They will provide guidance and, even more importantly, challenge the audience with collaborative exercises for understanding and applying key methodologies to converge business resilience management and cybersecurity into a single, tailored, yet agile survical strategy. Five building blocks will be outlined that form the foundation of a unified strategy to achieve the common goals of resilience and recovery while limiting the impact of cyber attacks on business operations.