Event Recording

Hacked! How to handle a Ransomware Attack

Show description
Speaker
Florian Jörgens
Chief Information Security Officer
Vorwerk SE & Co. KG
Florian Jörgens
Florian Jörgens initially developed his professional interest in information technology in 2002. Whilst working as an IT specialist for system integration at T-Systems International GmbH, in application and system support he earned his BSc. in Business Information Systems. Gaining...
View profile
Playlist
cyberevolution
Event Recording
Welcome to cyberevolution 2023
Nov 14, 2023

Welcome to the cyberevolution Conference Opening!

Berthold Kerl will kick off the cyberevolution Conference in Frankfurt from the 14th to the 16th of November. He will explain the idea behind "Anticipate - Innovate - Together," the triad that drives the future of cybersecurity. In today's rapidly evolving digital landscape, the role of AI in cybersecurity has never been more crucial. Throughout this opening, Berthold will explore the profound impact of AI on cybersecurity today and tomorrow, uncovering its potential to reshape defense strategies. Drawing on our expertise as a leading analyst firm in cybersecurity, KuppingerCole will share the trends and insights that demand your attention. These crucial themes will spark thought-provoking discussions, igniting anticipation for what defenders of cybersecurity must prepare for today and in the future.

During the conference, expect a dynamic agenda filled with thematic highlights, distinguished speakers, and interactive sessions. Our goal is to encourage active participation, collaboration, and discussions that enrich your knowledge and strengthen the collective defense against cyber threats. Moreover, be prepared to immerse yourself in a captivating and diverse range of events in our engaging framework. We've crafted a compelling and exciting program that complements the conference and ensures you make meaningful connections and lasting memories.

Let's embark on this transformative journey together at cyberevolution. Anticipate new possibilities, innovate to shape the future, and together, we'll empower cybersecurity defense for the challenges that lie ahead. 

Get ready for an exceptional experience!

See you at cyberevolution!

Event Recording
Building Security - SQUARED! Securing critical transportation infrastructure in Germany
Nov 16, 2023

The German railroad system is part of the national Critical Infrastructure, and hence all major train stations are fall under the KRITIS regulation. Recently, OT-(in)Security has drawn the attention of Threat Actors, and it is due time, to focus on securing Building Automation and Control system. The talk introduces to the challenges of managing a diverse and distributed technology landscape and how established solutions can help protect the infrastructure - or not...

Event Recording
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
Nov 15, 2023

As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted landscape of applying AI to secure government operations.

Event Recording
Welcome note by Minister of Interior Affairs - Hessen
Nov 14, 2023

Businesses, public institutions, and government agencies face various cybersecurity issues in an increasingly connected world. This welcome session highlights current and emerging cybersecurity challenges and trends as perceived through the lens of public leadership in Hesse.

From the intricacies of regulatory policy to the application of practical security measures, the discussion will provide a comprehensive understanding of the state's strategic approach to enhancing security and resilience. Attendees will gain unique insights into how government agencies shape cybersecurity trends and translate them into actionable support for stakeholders.

Event Recording
Cloud Security in a highly regulated environment
Nov 15, 2023
Event Recording
Panel | Autonomous Yet Accountable: Do We Need Identities for AI?
Nov 15, 2023

This session aims to explore the practicalities and paradigms of integrating AI identities into current and future digital infrastructures. Topics will include the regulatory and governance challenges posed by autonomous AI operations, the technical requirements for creating and managing AI identities, and the technical and even legal considerations of recognizing AI as identifiable entities, focusing on accountability and traceability within various frameworks.

Event Recording
Asset Management for Cybersecurity: A Modern Solution for An Age-Old Challenge
Nov 16, 2023

Asset management used to be easy, but not anymore. Where and how we work, the types and amount of devices we use, and the ways and places we store information have all changed.

What’s stayed the same, though, is the fact that knowing what’s in our environment is absolutely essential to securing it.

So, it’s time we say goodbye to manual asset inventory approaches, and hello to a modern approach to asset management — one that leverages existing data and automation to solve the challenges specific to cybersecurity.
 
Join this session to learn:

  • Why old asset management approaches fall short
  • How other cybersecurity initiatives are impacted by insufficient asset management
  • A new approach that leverages existing data to solve the asset management challenge for cybersecurity
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Nov 15, 2023

Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive approach of detecting someone in our network and then moving into the proactive way of security. Using the same tools for asset discovery, risk assessment and automatic checks for compliance of the customers environment.

So the solution should not just stop the attack, but before check automatically how an attacker possibly could come in and have a full overview of the environment including automatic risk factors for assets and overview combined with integrations with other solutions.

Additionally the task of risk management is stated in the new NIS2 directive and should be clearly a topic for all companies that are affected.

Event Recording
Protect APIs Everywhere with Modern Solutions
Nov 15, 2023

Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud that can devastate your business. To effectively prevent these attacks, you need  comprehensive, consistent security that protects your entire digital footprint.

F5 solutions reduce complexity in a hybrid and multi-cloud world so you can deliver secure digital experiences at scale—in the architecture you have now, and for the architecture you aspire to evolve your business into.

Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Nov 15, 2023

Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my session I will give an inside how we got started to quantify Cyber Risks and what the challenges are to derive conclusions for risk steering and capital allocation.

Event Recording
The Digital Identity Wallet - A user perspective
Nov 16, 2023

The promise of the DIW (Digital Identity Wallet), which is inspired by SSI (Self-Sovereign Identity), is to give the user more control of which data they are sharing with whom. But do the users really want this? User control was also the intention behind "The cookie law", which brings up annoying dialogs, where only the most dedicated will do anything but accept the default option. This is very similar to the GDPR consents, where you in most cases have no option but to accept, to be able to continue.

Event Recording
Cyber Defense Matrix
Nov 14, 2023

The cybersecurity landscape is complex and can be confusing even to experts. The Cyber Defense Matrix is a model that simplifies this landscape, enabling us to navigate it more easily and clearly communicate our plans to others. This workshop will explain the Matrix and how it can be used to build, manage, and operate a security program. By organizing technologies, skillsets, and processes against the Matrix, we can understand the problems we need to solve, what gaps exist, and what options are available to close those gaps.