Event Recording

EDITH #DigiTalk „CVD – Embracing Ethical Hackers”

Show description
Speakers
Dr.-Ing. Steven Arzt
Head of Secure Software Engineering department
The Fraunhofer Institute for Secure Information Technology (SIT)
Dr.-Ing. Steven Arzt
Dr. Steven Arzt leads the Secure Software Engineering department at the Fraunhofer Institute for Secure Information Technology (SIT) in Darmstadt. He also oversees the software security research division at the National Research Center for Applied Cybersecurity, ATHENE. In collaboration with...
View profile
Hauke Schlüter
Managing Director
House of Digital Transformation (HoDT)
Hauke Schlüter
Hauke Schlüter currently serves as the Managing Director of the House of Digital Transformation (HoDT) located in Darmstadt. He completed his studies in Business Informatics at the Karlsruhe Institute of Technology (KIT) at the University of Karlsruhe and possesses over 30 years of...
View profile
Playlist
cyberevolution
Event Recording
DORA: What are the Main Challenges Facing the Financial Industry?
Nov 15, 2023

The Digital Operational Resilience Act (DORA), which entered into force on 16 January 2023 and will apply from 17 January 2025, aims to enhance the digital operational resilience of entities across the EU financial sector and to further harmonise key digital operational resilience requirements for all EU financial entities. DORA sets out uniform requirements for the security of network and information systems of companies and organisations operating in the financial sector as well as critical third parties which provide ICT (Information and Communication Technologies) services to them, such as cloud computing or data analytics services. DORA creates a regulatory framework on digital operational resilience, whereby all financial entities need to make sure they can withstand, respond to, and recover from all types of ICT-related disruptions and threats. These requirements are homogenous across the EU, with the core aim to prevent and mitigate cyber threats. DORA is complemented with several “regulatory technical standards (‘RTS’)” which give more details on requirements for cyber security.

As the whole DORA legislation cannot be presented in a short timeframe, I will focus on the part that is most important to ensure cybersecurity and the part that is the most interesting one for the audience, the RTS on ICT Risk Management Framework. I will give a quick overview and highlight the topics, which will bring the most workload to the industry. The biggest challenges will be in the areas of Asset Management, Operations Security, Network Security and Encryption.

Event Recording
Securing the Metaverse: Cybersecurity in a New Reality
Nov 16, 2023
Event Recording
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Nov 16, 2023

In a world where everything and everyone is interconnected, traditional cybersecurity is outdated.

Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the future.This presentation, "Zero Trust in a World of Everything, Everyone, Everywhere, All at Once," explores the fundamentals of Zero Trust and its relevance to our hyperconnected world.

Event Recording
How to Minimize the Blast Radius of an Attack?
Nov 15, 2023

In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

Event Recording
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
Nov 16, 2023

The 2023 Cybersecurity Workforce Study identifies a daunting 4 million-person workforce gap. This shortfall in qualified candidates hampers industry growth. To tackle this challenge, the industry must broaden its recruitment scope, targeting individuals with potential to learn, including those from diverse backgrounds like business, arts, or engineering. Cultivating entry-level opportunities for students, young professionals, and career changers is vital for industry expansion. However, assessing cybersecurity aptitude in candidates without direct experience poses a challenge. Traditionally, the industry has lacked accessible entry points for newcomers. In this presentation, ISC2's CEO, Clar Rosso, advocates for a clear and adaptable pathway to cybersecurity careers, offering data-driven insights and strategies to ignite recruitment efforts and welcome new talent into the field.

Event Recording
Beyond Tomorrow: Navigating Cyber Futures via SAFIRE Scenarios (2028 / 2032)
Nov 14, 2023

Step into the future of cybersecurity in an engaging and enlightening keynote presentation featuring Jonathan Blanchard Smith from SAMI Consulting and Berthold Kerl, CEO of KuppingerCole. Join us as we unveil the outcome of extensive discussions with CISOs and cybersecurity experts, exploring the ramifications of SAFIRE scenarios on the digital realm.

The keynote commences with captivating short films that vividly illustrate the diverse future scenarios. Witness how technological advancements, societal shifts, economic fluctuations, environmental concerns, and political dynamics intertwine to shape the cyber landscapes of tomorrow.

Delve into thought-provoking discussions as we ponder the most effective means of safeguarding the future digital life for each scenario. Gain insights into the challenges and opportunities that lie ahead, and explore innovative approaches to bolstering cyber resilience in a rapidly evolving world.

By the end of this session, you will be equipped with a clearer vision of the future of cybersecurity. Embrace this unparalleled opportunity to comprehend the potential challenges and transformations that await us.

Don't miss this extraordinary keynote at cyberevolution, where groundbreaking minds converge to envision the digital frontier. Join us and embark on a journey to discover the cyber future that lies ahead.

Event Recording
Secure software engineering: The sleeping giant in the GenAI Era
Nov 15, 2023

In the realm of cybersecurity, there's one truth we can't escape: Building secure products from the get-go is the most effective, cost-efficient, and innovative approach to achieving cyber resilience. With GenAI, we're in a new era of software industrialisation. Let's explore how crucial secure software engineering is in this new wave and what lessons we can learn from the past to avoid repeating our mistakes.

Event Recording
Anchors of Trust - Lessons learned from a Ransomware attack
Nov 16, 2023

The word no company wants to hear became an unfortunate reality for one of the world’s largest independent development partners to the automotive and aviation industries — ransomware. The EDAG Group fell victim to an encryption Trojan that shut down their business-critical systems and IT systems. During this session Maria will be sharing her lessons learned and will be explaining her strategy that helped EDAG successfully restore their systems by leaning on Vectra AI as one of her anchors of trust. 

 

Event Recording
Unleashing Automated, Agentless Microsegmentation to Isolate the Next Breach
Nov 15, 2023

Discover the power of full-scale microsegmentation! Join us for an exciting presentation on this cutting-edge security solution that prevents lateral movement. Automated and agentless, effortlessly fortify your network against lateral movement attacks. 

Don't miss this opportunity to safeguard privileged protocols like RDP, SSH, and WinRM required by IT but loved by attackers. As a bonus, unlock the ability to MFA any port, protocol, or app. 

Deploys in one hour and protects your environment in just 30 days. Come see why Zero Networks was awarded “Best Global Startup” at GISEC & gain a competitive edge in today's rapidly evolving threat landscape. 

5 Takeaways:

1. Make a massive leap in your Zero Trust journey in just 30 days

2. Understand how auto-rule creation allows you to microsegment all your assets with little operational costs

3. Provide the ability to Just-in-Time MFA privileged protocols such as RDP, without the use of agents

4. Address 70%+ of the MITRE ATT&CK framework

5. Understand why Zero Networks is awarded the “Best Global Startup” at GISEC

Event Recording
Panel | It all starts with the Endpoint
Nov 15, 2023

The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as “beyond PC” and “beyond mobile” types of endpoints, including printers. How can efficient endpoint security become implemented, which are the obstacles, and how to overcome them? And which role does endpoint security play in the bigger picture.

Event Recording
Building an AI skills Workforce
Nov 15, 2023

In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared with expert human help. The end is not nigh, instead the AI tools now coming will make our jobs easier while elevating cybersecurity to new levels. 

Event Recording
Adopting Insider Threat Management Best Practices for NIS2 Compliance
Nov 16, 2023

In today's dynamic cybersecurity landscape, safeguarding sensitive data and infrastructure from insider threats, while effectively monitoring supply chain and third-party users, is paramount. This presentation delves into the critical intersection of Insider Threat Management and NIS2 compliance, anchored in a detailed case study of a company subject to NIS2 regulations. We will explore a diverse toolkit and industry best practices tailored not only for achieving compliance, but also for streamlining cybersecurity processes through robust technical controls. Attendees will gain invaluable insights into seamlessly integrating cutting-edge tools and proven methodologies, ensuring unwavering compliance with NIS2 regulations while fortifying your security posture.