Event Recording

No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways

Show description
Speaker
Clar Rosso
CEO
ISC2
Clar Rosso
Clar Rosso, Certified in Cybersecurity, has more than two decades of experience helping global professional associations and certifying bodies grow and strengthen member value. As CEO of ISC2, she has established a forward-looking strategic framework and set bold goals for the future of the...
View profile
Playlist
cyberevolution
Event Recording
Building Your Cybersecurity Strategy with Emerging Security and Privacy Technologies
Nov 15, 2023

In this session, I will give an overview of a number of emerging security and privacy technologies, such as advanced cryptography (e.g., lightweight cryptography, post-quantum cryptography, etc.), privacy-enhancing technologies (e.g., confidential computing, zero-knowledge proof, etc.), and blockchain, and discuss why and how organizations should consider building their cybersecurity strategies with these emerging technologies.  

Event Recording
XM Cyber: From Vulnerability Management to Continuous Exposure Management
Nov 15, 2023
Event Recording
The Risk of Quantum for PKI and How to Handle It
Nov 15, 2023

Quantum computing has found its way into Deutsche Bahn's technology roadmap. In the session I’ll give an introduction where is it used, which use cases are being developed, which skills does the industry need? The key question is which risks do we expect and how can we prepare our organization against attacks, some keywords are NIST, PQC, crypto agility. I will give an overview of the international quantum landscape and its progress. You will get hands on advice how to establish a maturity model for quantum readiness and an enterprise program to become quantum ready.

Event Recording
Navigating the Cyber Regulatory Landscape: Quo vadis Cyber Regulations
Nov 15, 2023

What's happening with the growth and increase in Cyber Regulations in Europe? Why are authorities pushing more and more regulations that focus on Cyber Security and Risk Management? Does it really bring value for actual Cyber Security at a business? And how can (if not must) one prepare for this wind of change?

Event Recording
Panel | Addressing Universal Digital Vulnerability with Modern Identity
Nov 15, 2023

The risk of being digitally vulnerable, or not being able to access basic services, affects us all. There can be no doubt that enhancing accessibility features across digital access journeys is tremendously important in helping people simply and safely connect with the digital world. But this doesn’t go far enough.

What you’ll learn from this session: How can adaptive, connected, and balanced digital identity go further in addressing universal digital vulnerability at the root, making sure no one gets left behind.

Event Recording
A Taste of AI & Phishing 2.0, a Data Rodeo
Nov 16, 2023

This session provides palpable illustrations of the latest LLM technologies and hands-on suggestions on how to tackle the challenges arising from automated, emotionally aware, and generative AI prompted with malicious intent.

What will digital deception and trickery look like in the age where today’s youth become the standard bearers of our digital world? Times of e.g. required proof of personhood, predicted behavioural biometrics, and advanced data brokerage.

How are social engineering tools, tactics, and procedures evolving? What can we expect? And how can we prepare?

In this presentation, Emilie van der Lande, certified information privacy professional (CIPP/E) and certified by MIT in Artificial Intelligence’s implications on business and strategy, will explore prevention and detection tips to be a step ahead of the shifting paradigms of Cyber Deceptology.

Event Recording
The Next Generation of Secure Access with Zero Trust
Nov 15, 2023

Learn how Netskope can deliver a seamless transition for implementing the next generation of Zero Trust protection with their award-winning SSE platform.

Event Recording
Federation Bubbles - Dynamic Trust Moves Beyond The Commons
Nov 15, 2023

Traditional federation agreements are relatively static. It takes some effort to onboard an IdP and RP to each other, but once that trust is established, it's good until some exceptional event breaks the federation.

But what about a more dynamic world, one where trust comes and goes based on context? What if users could be provisioned dynamically into a space based on trust from elsewhere? What if an isolated space could still function in a disconnected state and still have powerful security properties? What if these isolated spaces could reconnect to the network and provide audit capabilities and security signaling to other components throughout the wide ecosystem? And what if all of this could be built on a layer of trusted software that didn't rely on pre-placing keys or accounts ahead of time?

Come to this talk to learn about Federation Bubbles, the proof of concept being built out on top of a suite of technology including OpenID Connect, OAuth, SPIFFE, Verifiable Credentials, and more.

Event Recording
The Human Factor: Why people are the main key to cybersecurity?
Nov 16, 2023

When it comes to cybersecurity, many people focus on red/blue teams and technical measures such as servers, firewalls, encryption, and intrusion prevention systems. However, one crucial factor that is often overlooked is the human factor. All of these technical measures will count for nothing when it comes to matter of insider threats. Even the most robust cybersecurity measures can be rendered ineffective by social engineering threats.

In this keynote, I will present several use cases to demonstrate why it is essential to consider the human factor in any organization’s cyber threat landscape.

Event Recording
Securing the Metaverse: Cybersecurity in a New Reality
Nov 16, 2023
Event Recording
RAI 2.0 in the era of Gen AI - Need for Regulating AI
Nov 16, 2023
Event Recording
Hunt the Shadows: Attack Surfaces and Entry Points!
Nov 16, 2023

Security should cover more than just what we know. As a common practice, we define the scope of assessment including the systems, networks, applications, and data that will be assessed. Hackers, by their very nature, have no predefined scope. They often seek to exploit any entry points they can find, those we may consider less significant or even we aren't aware of yet. Unknown threats are lurking in the shadows! This talk will delve into how attack surface discovery and management contribute significantly to visibility, a pivotal foundation of effective cyber defense strategies.