Event Recording

Panel | It all starts with the Endpoint

Show description
Speakers
Andy Aplin
VP, Solutions Engineering EMEA & LATAM
Netskope
Andy Aplin
Andy leads the Solutions Engineering team at Netskope, he was the first person in Europe when Netskope first started in the region in 2014, he has led the technical team’s evolution and acted as the Exec sponsor to many key customer engagements. With over 25 years of experience in both...
View profile
Warwick Ashford
Senior Analyst
KuppingerCole
Warwick Ashford
Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist and editor since 2003, specialising in cybersecurity and privacy since 2012. Warwick has also...
View profile
Abhinav Bajaj
IAM Lead
Delivery Hero SE
Abhinav Bajaj
Abhinav has over a decade experience in conceptualising, designing, implementing & managing IAM solutions across industry verticals. AB has been working with Delivery Hero for the last 5 years as an IAM Lead. As an IAM lead, AB actively contributes when it comes to putting together IAM...
View profile
Heinz Mäurer
Security Sales Specialist
HP Inc. Wolf Security
Heinz Mäurer
Based in Kevelaer, Germany, close to the HP Ratingen Office Heinz has 33 years of sales experience across different markets and roles. 12 years in the security sector working for some of the top names in Technology, including Forcepoint, Fireeye and HP. In the last years he supported startup...
View profile
Playlist
cyberevolution
Event Recording
Smart threat defense thanks to AI-powered threat intelligence and security awareness training
Nov 16, 2023

Learn why the use of artificial intelligence (AI) through threat actors makes a "new security awareness" on the user side essential.

 

Key areas of focus:

- How can AI-based approaches increase the effectiveness of security awareness campaigns?

- Which security awareness measures have been proven to increase your security without spending a lot of resources?

- How does Threat Intelligence and Security Awareness as-a-Service work?

 

The speakers will show you how AI in threat intelligence and security awareness campaigns strengthen your threat protection!

Event Recording
Preparing for the Current and Future Cybersecurity Threat Landscape: ENISA Efforts
Nov 15, 2023

Cybersecurity is increasingly taking the front seat, from being considered as an afterthought to becoming a priority in policy, technical, economic, societal and even legal and environmental discussions. Given the increasing hyper-connectivity of everything and our growing online presence, the significance of cybersecurity cannot be overstated. We are constantly coming across new cyber threats and attacks, novel avenues are opening for adversaries, emerging technologies are changing the paradigm and cyber affairs are more and more linked to physical ones, leading to the notion of hybrid threats. ENISA, the EU Agency for Cybersecurity, has been monitoring the cybersecurity threat landscape for more than 10 years. In this talk, ENISA will discuss the current state of the EU cybersecurity threat landscape and discuss its evolution based on the foresight activities that the Agency utilizes to map the landscape, to identify future and emerging cybersecurity challenges

Event Recording
Securing Virtual Worlds
Nov 16, 2023

Virtual Reality (VR) has moved beyond its status as a gaming technology. From sales events to military trainings, VR found its way into business applications, were security matters the most. However, along with its benefits, VR also introduces security and data protection challenges such as tracking of eye movements, deep fakes, and impersonation attacks.

This presentation introduces the risks of VR and explores strategies for securely integrating virtual worlds into our business environments.

Event Recording
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Nov 15, 2023

Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those automations are referred to as `bots´. The attackers usually reverse engineer the web application, e.g. an e-commerce platform, and based on their discovery, craft bots to exploit vulnerabilities or gaps that allow them to pursue their goal on the platform in an undesirable way. A famous example are sneaker bots, whose goal is to obtain a competitive advantage over human clients in purchasing hyped articles like sneakers. Addressing automated threats is a company-wide effort and requires to tackle the problem from many angles reaching from DevSecOps, architectural changes, raising awareness, establishing transparency in the business, implementing preventive controls, to detective controls. In the first phase of our research, we tackled the problem in a big e-commerce company on this entire spectrum of challenges and are now at the position to enhance our approach in a second phase. In the second phase, we aim for an approach to harden a web-application platform with existing detective and reactive controls using aspects of generative approaches and adversarial attacks while also considering explainability.

In the talk, we are going to explain and motivate the problem space, explain the insights from the first phase and outline the goals of the second phase of our research.

Event Recording
Is the future really password-free and is it worth using a PAM solution?
Nov 15, 2023

Comprehensive protection of networks, system infrastructures, hardware and software, applications and data is part of every cyber security strategy. But what does this actually mean for identity and access management? Unloved for many years and repeatedly declared dead: passwords. Large IT companies have been promising us a password-free future for a long time. Is it really that easy to finally turn your back on passwords? The fact is that we have to deal with a large number of passwords every day in order to complete our professional and private tasks. Every password should be unique, highly complex and as long as possible. But what does the frightening everyday life with passwords look like today, what will it hopefully look like in the future and why it is essential to deal with the topic right now, explains Daniel Holzinger in his lecture.

Event Recording
Re-inventing risk management for artificial intellect
Nov 15, 2023

This presentation delves into the imperative task of redefining risk management in the era of Artificial Intelligence (AI). As AI reshapes industries, it also introduces unique risks and challenges. This abstract offers a glimpse into how traditional risk management approaches must evolve to effectively address the intricacies of AI-related uncertainties. Through real-world examples, it explores emerging concerns like algorithmic bias, privacy infringements, and unforeseen consequences. Attendees will gain insights into proactive strategies, including leveraging AI itself for risk assessment and mitigation. By the presentation's conclusion, participants will grasp the essential steps needed to navigate the uncharted territory of AI-driven risks, ensuring responsible and secure integration of this transformative technology.

Event Recording
Closing Keynote and Award Ceremony Capture The Flag
Nov 16, 2023
Event Recording
Upcoming changes in IT-Security from an Airline perspective
Nov 15, 2023

Time is moving fast in the IT-Security industry. The rise of AI brings new attacks for example as new and better redacted phishing emails. What are the risks and chances for Security Operations? What is the impact on identity and access management. How can AI be used to improve threat hunting. These are some of the topics presented here.

Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
Nov 16, 2023

IT Security – In a General Perspective:

  • Security Investment vs. Success
  • New Goals, Rediscovering Old Objectives

Closing the Gap with HP Wolf Security

Event Recording
How to Minimize the Blast Radius of an Attack?
Nov 15, 2023

In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

Event Recording
Tomorrow is already here: AI driven Identity Governance at your fingertips
Nov 16, 2023

Anomaly & outlier detection today is far beyond human capacities. Artificial intelligence has become an important technology in cybersecurity, as algorithms can solve many problems better and faster than humans. AI-Driven data intelligence automates the discovery, management, and control of all user access. This allows you to not only make better and faster access decisions, but also to quickly spot and respond to potential threats. It empowers every worker with correct and timely access when they need it, proactively engages business users to identify risky access, and helps security professionals intelligently create and maintain access models in today’s dynamic IT environment. After all, Identity Governance is not just about security. It is Trust and Reputation Management.

Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Nov 15, 2023

Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my session I will give an inside how we got started to quantify Cyber Risks and what the challenges are to derive conclusions for risk steering and capital allocation.