Event Recording

HP Endpoint Security - Time for a Different Endpoint Security

Show description
Speaker
Heinz Mäurer
Security Sales Specialist
HP Inc. Wolf Security
Heinz Mäurer
Based in Kevelaer, Germany, close to the HP Ratingen Office Heinz has 33 years of sales experience across different markets and roles. 12 years in the security sector working for some of the top names in Technology, including Forcepoint, Fireeye and HP. In the last years he supported startup...
View profile
Playlist
cyberevolution
Event Recording
Conquering Crisis: Effective Strategies for Incident Management
Nov 16, 2023

Immerse yourself in an in-depth exploration of the strategies of incident management. Through critical examination of real-world cases and emerging trends, they illuminate the integral stages of effective incident response. The dialogue underscores the importance of strategic foresight, seamless communication, and constant progress, providing indispensable insights to strengthen cyber defenses and build resilience. This discussion ensures a compelling exchange of knowledge and tactics, serving as an indispensable tool for organizations in the ever-evolving landscape of cybersecurity threats.

Event Recording
Re-inventing risk management for artificial intellect
Nov 15, 2023

This presentation delves into the imperative task of redefining risk management in the era of Artificial Intelligence (AI). As AI reshapes industries, it also introduces unique risks and challenges. This abstract offers a glimpse into how traditional risk management approaches must evolve to effectively address the intricacies of AI-related uncertainties. Through real-world examples, it explores emerging concerns like algorithmic bias, privacy infringements, and unforeseen consequences. Attendees will gain insights into proactive strategies, including leveraging AI itself for risk assessment and mitigation. By the presentation's conclusion, participants will grasp the essential steps needed to navigate the uncharted territory of AI-driven risks, ensuring responsible and secure integration of this transformative technology.

Event Recording
Securing the Metaverse: Cybersecurity in a New Reality
Nov 16, 2023
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
Nov 15, 2023

The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest developments and trends in this ever-evolving threat landscape is crucial.

Florian and Stefan explore the modern nuances of ransomware attacks in this panel. Discussions will revolve around cutting-edge techniques such as double extortion, where attackers deny access to data and threaten its public release, and the shift towards targeting operational technology, leading to real-world disruptions. Moreover, the panel will highlight the rise of decentralized ransomware models that utilize networks of affiliates and delve into the contentious debate around the ethics and implications of paying ransomware.

Beyond understanding the current ransomware landscape, attendees will be introduced to preventive measures, effective response strategies, and potential future trajectories of ransomware evolution. Join this insightful discussion to equip yourself with the tools and knowledge needed to navigate the complexities of ransomware in today's interconnected digital ecosystem.

Event Recording
Building an AI skills Workforce
Nov 15, 2023

In this presentation Paul Fisher connects the dots between Henry Ford, Stanley Kubrick and AI. He explains how AI is useless without good data and good data for cybersecurity can only be prepared with expert human help. The end is not nigh, instead the AI tools now coming will make our jobs easier while elevating cybersecurity to new levels. 

Event Recording
Securing the SaaS Revolution: Protecting Your Data in the Cloud
Nov 15, 2023

The best CISO’s are never surprised! But now that SaaS apps like Salesforce, ServiceNow, or M365 have become mission-critical for organisations and process sensitive data, it's getting harder to keep track of the security metrics. CISO’s tell us they are flying blind and hope for the best. You shouldn't have to simply trust your app teams or run periodic third-party assessments to stay on top of how your SaaS is configured. What if you could define the security guardrails, which identities have access to which data, continuously monitor for drift, and be automatically alerted when a metric needs your attention? Nothing falls through the cracks. No more hope for the best, spreadsheets, and surprises.

Event Recording
Panel | Autonomous Yet Accountable: Do We Need Identities for AI?
Nov 15, 2023

This session aims to explore the practicalities and paradigms of integrating AI identities into current and future digital infrastructures. Topics will include the regulatory and governance challenges posed by autonomous AI operations, the technical requirements for creating and managing AI identities, and the technical and even legal considerations of recognizing AI as identifiable entities, focusing on accountability and traceability within various frameworks.

Event Recording
Cloud Security in a highly regulated environment
Nov 15, 2023
Event Recording
The SSI movement: developments and status quo
Nov 16, 2023

At first, some insights into the background, purpose and history of the e-IDAS regulation are provided and the difference between the previous and the currently proposed e-IDAS version are explained very shortly. Core part of the presentation addresses the impact and main challenges, including the concerns expressed by various stakeholder groups. Finally, the expected timeline is given. 

Event Recording
Artificial Intelligence: A New Tool in the Hacker's Arsenal
Nov 15, 2023
Event Recording
RECAP Cyberevolution Day II
Nov 15, 2023
Event Recording
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
Nov 16, 2023

The 2023 Cybersecurity Workforce Study identifies a daunting 4 million-person workforce gap. This shortfall in qualified candidates hampers industry growth. To tackle this challenge, the industry must broaden its recruitment scope, targeting individuals with potential to learn, including those from diverse backgrounds like business, arts, or engineering. Cultivating entry-level opportunities for students, young professionals, and career changers is vital for industry expansion. However, assessing cybersecurity aptitude in candidates without direct experience poses a challenge. Traditionally, the industry has lacked accessible entry points for newcomers. In this presentation, ISC2's CEO, Clar Rosso, advocates for a clear and adaptable pathway to cybersecurity careers, offering data-driven insights and strategies to ignite recruitment efforts and welcome new talent into the field.