Event Recording

A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media

Show description
Speaker
Dr. Donnie Wendt
Principal Security Researcher
Mastercard
Dr. Donnie Wendt
Dr. Donnie Wendt is a Principal Security Researcher for Mastercard. In this role, Donnie researches the latest security threats, technologies, products, services, and innovations to drive the company’s long-range security roadmap. He has worked at Mastercard for 18 years,  including...
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
CISO Talk: Cloud as a Security Enabler
Nov 09, 2022

More organizations are now moving to the cloud.  From a security perspective – refactoring the applications provides a major opportunity to improve security posture.  This session explores how the right approach towards can save time, increase inherent security, and ensure apps are compliant.

Event Recording
Only Those Who Know the Dangers Can Protect Themselves
Nov 10, 2022

How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers and social engineers work with social pentester Graham Stanforth.

Event Recording
Let’s Think Zero Trust – for IT, OT and Products
Nov 09, 2022

Over the past two years, Siemens has been on a mission to protect a global enterprise through the highest Zero Trust standards, and this journey is far from over.

In this session, program lead Thomas Müller-Lynch share his experiences on the road to Zero Trust readiness of all assets from IT and OT.

Event Recording
Germany's Cybersecurity Architecture and How it is Linked to International Actors
Nov 09, 2022
Christina Rupp has co-authored a publication of the Stiftung Neue Verantwortung, a Berlin based Think-Tank exploring the intersection of technology and society, on Germany’s Cybersecurity Architecture. In her introductory talk, she will provide insights into the development and status quo of Germany’s cybersecurity architecture and policy as well as its interplay with international levels such as the European Union.
Event Recording
CSLS Wrap Up and Closing Keynote
Nov 10, 2022
Event Recording
Standards & Regulatory Frameworks Are Static, Security Isn't
Nov 10, 2022

Current frameworks from Cyber Essentials in the UK, to the NIST Cyber Security Framework, HIPPA, PCI-DSS and even ISO27002:2022 often take at least 18-24 months to agree by their governance bodies. The world is much faster moving that that, the fact many regulatory frameworks will take years before the kinks are ironed out demonstrate that they are good for what they were designed for at inception, but after that many of them do not keep up with the changing threats and risks enterprises face, let alone the real controls that are required to protect the enterprise. This is why they are more than often just a tick-box exercise for many enterprises. This session will demonstrate with an analysis of several standards and frameworks, that they are a great starting point if you don't know where to start, but if your really want to protect your enterprise you need to go beyond using controls checklists designed for yesteryear's threats and risks. And what organisations can do to improve security to keep in touch with current threats and risks?

Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
Nov 10, 2022

When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security means, above all, good, clean and clear security practices that happen before-hand and all day, everyday. This is particularly true for Identity and Access Management, which is a component of every domain within Cyber Security, and it's identified as a cause for more than 80% of data breaches. IAM is rarely about white-hat hackers counter-attacking an ongoing intrusion. It's mainly about a set of good practices, clearly defined processes and, overall, good hygiene in the way we manage our identities, our resources, our entitlements, and the way they relate to each other.

Event Recording
Panel | Leadership Outlook: What Are the Key Attributes of the Next-Gen CISO?
Nov 09, 2022

In this exclusively curated panel session, top CISOs from across the world reflect on where they find themselves today, explore trends that will define the cyber ecosystem over the next decade and highlight the core attributes required for future CISOs to maneuver through the challenges brought about by the digital enterprise.

Event Recording
The Art of Becoming a Multifaceted CISO
Nov 09, 2022

The challenges to information security in companies are increasing every year. The focus is on serious attacks against small and large companies and the urgent need to protect their own information. It is no longer sufficient to view the protection of corporate information in a one-dimensional way. Many different facets are important: authentication, authorization, governance, policies, processes, monitoring and surveillance, cyber defense and many more.

Putting a company on the right track in the long term requires strategic and technical expertise that is usually managed from the information security area within the company - by the Chief Information Security Officer.

But what skills does a modern CISO need? What should be his or her strengths, what does a company need to look out for if it has this role, or how does a security expert need to develop in order to meet the numerous requirements for this position? Join this session by KuppingerCole CISO, Christopher Schuetze to get answers to these pertinent questions

Event Recording
Awareness?! How to Make It Work in a Low-Tech Environment
Nov 10, 2022
Event Recording
Lessons Learned: Responding to Ransomware Attacks
Nov 09, 2022

The last year has seen almost two-thirds of mid-sized organizations worldwide experiencing an attack. Managing ransomware attacks requires significant patience, preparedness and foresight – Stefan shares his experience managing the ransomware attack on Marabu Inks, his key learnings from the attack and how they have shaped the organization’s response capabilities.

Event Recording
Zero Trust Is Table Stakes, Zero Knowledge Is the Next Evolution
Nov 09, 2022

Zero trust has been around in one shape or form in security for many years, usually under different names like the "Principle of least privilege" or "Mandatory Access Control'. It exists for a good reason, and needs to be re-enforced. But for any cloud native vendor, Zero Trust should be table stakes at this point. Zero knowledge at the organizational level, and not just Zero knowledge encryption, is the next evolution of security best practices. Join us to learn more.