Event Recording

Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM

Show description
Speakers
Oran Aviezer
EMEA Sales Engineer
Axonius
Oran Aviezer
Oran currently works as a Sales Engineer for Axonius. With over 15 years of pre and post sales activities from cyber security start-ups such as SafeBreach, Empow Cyber Security, and Tufin.
View profile
Avidor Bartov
Co-Founder & Chief Architect
Axonius
Avidor Bartov
Avidor is the Co-Founder & Chief Architect of Axonius. Avidor is a globally recognized cybersecurity expert. Starting at the age of 13, Avidor became a staple in the Israeli cybersecurity underground hacking scene; by the time he was 17, he was employed as a leading penetration tester, and...
View profile
Christoph Kumpa
Regional Director Central and Eastern Europe
Axonius
Christoph Kumpa
Christoph Kumpa is Regional Director at Axonius. His previous roles include Sales and Consulting responsibilities at HP, Computacenter, and Dimension Data. Kumpa is an Information Security and Data Protection enthusiast and also founded a Technology & Management Consulting Company just...
View profile
Yaron Lavi
Director of Development
AxoniusX
Yaron Lavi
Yaron Lavi is Director of Development at AxoniusX and a Cybersecurity researcher and Senior Developer himself since many years. Yaron has been an officer in Israel's IDF intelligence, and managed anti-exploitation team at Palo Alto Networks.
View profile
Playlist
Cybersecurity Leadership Summit 2022
Event Recording
New Security Fundamentals: Five Things CISOs and CTOs Should Consider
Nov 09, 2022

The old saying goes, ‘The more things change, the more they stay the same”. This has never been more true than today in the modern CTO and CISO’s life. As technology evolves, the attack surface and actors adapt. Are they really different? Or are they the same vulnerabilities that have always existed, surfacing in new vectors in the infrastructure? Here are five new fundamental areas to keep in mind as you fend off the modern attacks of old.

Event Recording
Panel | Getting Started on Your Zero Trust Journey
Nov 09, 2022

As organizations continue to grapple with security issues, a 'zero-trust' approach to cybersecurity has been touted as a potential solution to enhance enterprise security. However, taking on Zero Trust architectures can be an overwhelming experience for even the most seasoned cybersecurity professionals. This panel session features security leaders who go beyond network principles reliant on the “never trust, always verify” philosophy to focus on effective deployment of a Zero Trust strategy at your organization.

Event Recording
Standards & Regulatory Frameworks Are Static, Security Isn't
Nov 10, 2022

Current frameworks from Cyber Essentials in the UK, to the NIST Cyber Security Framework, HIPPA, PCI-DSS and even ISO27002:2022 often take at least 18-24 months to agree by their governance bodies. The world is much faster moving that that, the fact many regulatory frameworks will take years before the kinks are ironed out demonstrate that they are good for what they were designed for at inception, but after that many of them do not keep up with the changing threats and risks enterprises face, let alone the real controls that are required to protect the enterprise. This is why they are more than often just a tick-box exercise for many enterprises. This session will demonstrate with an analysis of several standards and frameworks, that they are a great starting point if you don't know where to start, but if your really want to protect your enterprise you need to go beyond using controls checklists designed for yesteryear's threats and risks. And what organisations can do to improve security to keep in touch with current threats and risks?

Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Nov 09, 2022
Event Recording
Pools of Identity: Best Practices Start With Personal Password Behavior
Nov 09, 2022
Event Recording
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Nov 10, 2022

Imagine deepfake footage of a CEO engaging in bribery, a politician committing a sexual assault just a few days before an election, or soldiers committing atrocities on foreign soil. In our current environment, where conspiracy theories thrive, deepfakes could lead to catastrophic consequences. We are at an inflection point. Soon, deepfakes will move from being an oddity to possibly becoming a destructive social and political force. This presentation will discuss how deepfakes are made using deep learning methods and explore the possible impacts to society and to cybersecurity with some recent examples. The presenter will also discuss some of the latest research into deepfake detection.

Event Recording
Protecting Infrastructure in an Exposed Environment
Nov 10, 2022
Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Nov 10, 2022

For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics. It is unlikely to have a greenfield implementation as there is a rich fundament of processes, technologies and business uses cases need to be covered. This presentation describes how to build a holistic view of your ecosystem, understand your maturity, develop a reference architecture for your vision and then come up with a continuous transformation to achieve the targets using a value and risk driven approach.

 

Event Recording
Risk-Based Cyber Reporting Best Practices
Nov 09, 2022

Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the Board. Yet, reporting today is far from being a formality and does not comprehensively highlight an organization's exposure to cyber threats. Join this session to understand the factors that drive the effectiveness of a risk-based cybersecurity report and get access to best practices on communicating actionable metrics within a specific context.

Event Recording
Only Those Who Know the Dangers Can Protect Themselves
Nov 10, 2022

How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers and social engineers work with social pentester Graham Stanforth.

Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Nov 10, 2022

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Event Recording
The Changing Face of Resilience
Nov 10, 2022

Resilience has been changing over the last 15-20 years, where we now accept and acknowledge the various types of reslience an organisation should be responding to. This session will explore how security has moved from a focus on just protection to faster detection and response. It will aso explore what the fast moving technologies mean for other types of resilience that organisations will be faced with in the coming future, and what they can do about it.