Event Recording

Electronic Trust Ecosystems – What could a future look like? International Digital Identity Wallet activities and consortia

Show description
Speaker
Dr. André Kudra
Board Member
IT Security Association Germany (TeleTrusT)
Dr. André Kudra
On a mission for decentralized identity & bit-heat confidential cloud. Decentralization visionary. Passion for information security since turn of millennium. Business-driven yet tech-savvy – IT guy at heart, businessman by education. European Business School (EBS) diplomas &...
View profile
Playlist
cyberevolution
Event Recording
Welcome note by Minister of Interior Affairs - Hessen
Nov 14, 2023

Businesses, public institutions, and government agencies face various cybersecurity issues in an increasingly connected world. This welcome session highlights current and emerging cybersecurity challenges and trends as perceived through the lens of public leadership in Hesse.

From the intricacies of regulatory policy to the application of practical security measures, the discussion will provide a comprehensive understanding of the state's strategic approach to enhancing security and resilience. Attendees will gain unique insights into how government agencies shape cybersecurity trends and translate them into actionable support for stakeholders.

Event Recording
How to Minimize the Blast Radius of an Attack?
Nov 15, 2023

In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

Event Recording
Operational concepts with the WALLIX tiering model
Nov 15, 2023

Lack of control and controllability is increasingly a problem in many internal IT departments today. The complexity of the solutions used has steadily increased. It is therefore all the more important that information security systems are optimally set up and easy to operate and administer.

Establishing a risk class-based access management system makes sense for many reasons. In addition to meeting compliance requirements such as ISO27001, BSI IT-Grundschutz or industry standard 62443 and integrating seamlessly into a risk-based approach followed in the information security management system, this approach promotes the regaining of control over all possible accesses to company or organisational systems, regardless of these requirements.

Event Recording
Practical Cloud Protection: A Guide for Modern Businesses
Nov 16, 2023

The realm of cloud security has been extensively covered in books and articles, yet a crucial aspect remains ripe for exploration. It revolves around the fundamental understanding of what your cloud service provider offers and, equally vital, where your responsibilities lie in the realm of cloud security.


When embarking on the journey of adopting a cloud service, the foremost question to answer is, "What aspects of security do I need to oversee?" In a traditional on-premises setting, roles are distinct: IT manages infrastructure, information and cybersecurity handles security, and application developers bear the responsibility for code integrity. However, the landscape is evolving, with many organizations embracing DevOps, where these responsibilities are often shared, and the lines between development and operations blur or vanish.

Regardless of organizational structure, the majority of security obligations reside within your company's domain when you use an on-prem environment. Transitioning from an on-premises environment to a cloud environment presents one of the most intricate challenges—a more intricate shared responsibility model for security.

In the context of cloud security, two paramount concerns need close attention. 

The first is the risk of misconfiguration. In a cloud environment, misconfigurations can inadvertently expose sensitive data and vulnerabilities, underscoring the critical importance of ensuring that cloud services and resources are set up correctly to mitigate such risks.

The second concern is insider attacks. Cloud users often lack influence over the staff of cloud service providers, making it essential to consider the possibility of insider threats. While cloud service providers typically promise robust security measures in place, it's crucial for organizations to implement their own layers of security to safeguard against insider attacks and unauthorized access, fortifying the shared responsibility model in the cloud.

In my presentation, I will delve into these intricacies, providing valuable insights and real-world examples of what your cloud service provider can do, irrespective of your specific needs and/or preferences.

 

Event Recording
Implementing Zero Trust Principles: Crafting Your Cybersecurity Fabric
Nov 14, 2023

This interactive workshop will provide a practical approach to understanding and applying Zero Trust principles in creating your cybersecurity architecture.

We will focus on transitioning from traditional security perimeters to an identity-driven Cybersecurity Mesh, acting as the backbone for implementing the Zero Trust model. A detailed case study will guide you through the initial stages of incorporating Zero Trust principles into your current security landscape, identifying potential challenges, and offering methodical solutions.

The session will center on active learning through real-world examples, where participants will gain hands-on experience in shaping a resilient Cybersecurity Fabric. The workshop will conclude with participants developing a personalized roadmap to integrate Zero Trust principles into their cybersecurity systems seamlessly.

Join us to kickstart your Zero Trust journey, navigate its intricacies, and move towards a secure future with real-world applications and interactive problem-solving guidance.

Event Recording
Securing the Metaverse: Cybersecurity in a New Reality
Nov 16, 2023
Event Recording
Panel: AI Governance & Regulation
Nov 16, 2023

Artificial Intelligence is transforming how we live, work, and interact, bringing groundbreaking opportunities and notable challenges. As the influence of AI continues to grow, the pressing issues of governance and ethical considerations come to the forefront.

Martin, Scott, and Spray dive into this crucial discourse. Together, they will navigate the intricate landscape of AI regulations, exploring how to ensure these systems align with human values and societal standards. From the nuances of biases in decision-making algorithms to the broader societal implications of unchecked AI, the panelists will provide insights, debate solutions, and address the need for universally accepted ethical guidelines.

With diverse policy, ethics, and technology backgrounds, this panel promises a holistic overview of the ongoing challenges in AI governance. Attendees will gain insights into the path forward, ensuring AI serves humanity responsibly and ethically.

Event Recording
Chain of Confidence: Ensuring Trustworthiness in Software Supply Chains
Nov 16, 2023

Paul Fisher delves into the multifaceted approach required to foster trustworthiness within complex software supply chains. This discussion begins by delineating the critical components of software supply chains and the potential risks associated with each link—from development and deployment to maintenance and decommissioning.

Key to establishing a chain of confidence is the adoption of transparent processes and tools that provide verifiable evidence of security at each step. The audience will be introduced to Software Bill of Materials (SBOM), cryptographic signing, and continuous integration/continuous deployment (CI/CD) pipelines fortified with automated security checks.

The talk will also consider the human aspect, emphasizing the need for cultivating a culture of security awareness and collaboration among stakeholders. This includes not only developers and security professionals but also suppliers, distributors, and end-users.
Finally, the talk will provide actionable insights and strategies for organizations to audit, monitor, and continuously improve their software supply chains.

Event Recording
Beware of Easy Paths: The Journey Towards NIS2 Compliance
Nov 15, 2023

Matthias offers a critical analysis of the EU's NIS2 Directive's intricate demands, drawing attention to the limitations of one-size-fits-all solutions. He advocates for customized compliance plans, underscoring the unique challenges across various entities, with special attention to the constraints faced by SMEs. And obviously the future interpretation of this EU directive into national regulation adds another layer of complexity.

Essential strategies such as comprehensive risk evaluations, continuous educational efforts, and advanced incident management protocols are emphasized as crucial for effective compliance, integrating cybersecurity deeply into the organization's core values beyond just adherence. The talk concludes with a perspective that views NIS2 compliance as a dynamic goal necessitating enduring dedication and flexible approaches. 

Event Recording
XM Cyber: From Vulnerability Management to Continuous Exposure Management
Nov 15, 2023
Event Recording
The future CISO in the age of AI
Nov 14, 2023

With the introduction of ChatGPT, we have entered into the knowledge age. In this new economy, CISOs are presented with new challenges. This session explores three concerns arising from capabilities like ChatGPT but also three opportunities that CISOs are well positioned for in this new knowledge economy.

Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
Nov 16, 2023

IT Security – In a General Perspective:

  • Security Investment vs. Success
  • New Goals, Rediscovering Old Objectives

Closing the Gap with HP Wolf Security