Event Recording

Panel: Managing Cyber Supply Chain Risks and Achieving Digital Business Resilience

Show description
Speakers
Dr. Vangelis Gazis
Chief Architect IoT Security
Huawei Technologies
Dr. Vangelis Gazis
Evangelos (Vangelis) Gazis (PhD, MBA) is Chief Architect for IoT Security in Huawei’s Products and Solutions (P&S) organisation where he oversees the technology roadmap of common security capabilities for the IoT domain (i.e. IoT devices, IoT network, IoT gateways, and IoT cloud...
View profile
Dr. Michele Nati
Head of Telco and Infrastructure Development
IOTA Foundation
Dr. Michele Nati
Michele Nati, PhD is Head of Telco and Infrastructure Development at IOTA Foundation. Michele is responsible to drive IOTA innovation in the Telco Sector.  Before joining the IOTA Foundation, Michele worked as Lead Technologist for Data and Trust at...
View profile
Playlist
Cybersecurity & Enterprise Risk Management
Event Recording
Jean-Christophe Gaillard: Cyber Security in the Midst of the COVID Crisis: Key Management Considerations for Large SMEs and Mid-Size Firms
Jun 08, 2020

In this session, you will hear from cyber security thought-leader and Corix Partners founder JC Gaillard. JC will discuss and deconstruct 6 cliches around cybersecurity in small and mid-size firms and why security matters more than ever in the light of the COVID crisis, before answering your questions.

Event Recording
Christopher Schuetze: Prepare & Invest Now – And Survive an Incident or a Breach Tomorrow
Jun 08, 2020
Event Recording
Matthias Canisius: Return to Base | The CISO's Guide to Preparing A COVID-19 Exit Strategy
Jun 08, 2020

While governments and public healthcare specialists are looking into the timing and manner of reopening the economy, it is clear that at some point in the hopefully not-too-distant future restrictions will be eased and businesses will return to normal operations. Returning to recently-vacated offices will certainly signify a return to normality, and for most, that will be a welcome relief after working from home for an extended period. However, just as the shift to working from home required organizations to adapt and act differently, so will the return to the office. In this keynote, we discuss the preparation CISOs should consider making to offset a number of security implications that arise from returning your workforce from home and back to the office.

Event Recording
Bernard Montel: Cyber Defense : The New Concept of iSOC - Where Identity and SOC Has Never Been Tighter
Jun 08, 2020

With the introduction of AI, machine learning and UEBA, the SOC objective is to detect abnormal behavior. More than ever Identity is the battleground in this new concept of iSOC.

During this keynote, you will learn how Identity Governance and SOC need to be tight and how to remediate when a threat is detected on a specific Identity with the concept of "Threat Aware Authentication".

Event Recording
Filipi Pires: Security Predictions for 2020
Jun 08, 2020

The year 2020 will see a transition to a new decade. So will cybersecurity. Gone are the days of networks isolated behind a company firewall and a limited stack of enterprise applications. The current paradigm demands a wide variety of apps, services, and platforms that will all require protection. Defenders will have to view security through many lenses to keep up with and anticipate cybercrime mainstays, game changers, and new players.
Tried-and-tested methods — extortion, obfuscation, phishing — will remain, but new risks will inevitably emerge. The increased migration to the cloud, for instance, will exacerbate human error. The sheer number of connected assets and infrastructures, too, will open doors to threats. Enterprise threats will be no less complex, mixing traditional risks with new technologies, like artificial intelligence (AI) in business frauds.
Security predictions for 2020 reflect experts’ opinions and insights on current and emerging threats and technologies. Report paints a picture of a possible future landscape driven by technological advances and evolved threats to enable enterprises to make informed decisions on their cybersecurity posture in 2020 and beyond. The future looks complex, exposed, and misconfigured — but it is also defensible.

Event Recording
Barry McMahon: Harnessing Identity to Position Security as a Business Enabler
Jun 08, 2020

Security teams were already going through a fundamental shift in how they protect the business, even before the acceleration to remote working due to Covid-19. Given that Identity and Access Management (IAM) is now undeniably the first line of defense for organisations worldwide, how can security leaders turn the challenges, both legacy and new, into opportunities to mitigate risk and add value to the business? And all this in a way that will elevate the position, and change the perception, of security at the same time?

Based on a recent study Barry McMahon from LastPass looks at the challenges facing security teams and details five drivers where Identity and Access Management can support the business needs to benefit both the business and security team. There is also some excellent guidance on how best to engage the senior decision makers and speak in a language they understand.

Event Recording
Panel: From Threat to Opportunity - Cybersecurity in Times of Crisis
Jun 09, 2020

Ensuring business continuity is a challenge during times of crisis such as the pandemic caused by the Covid-19 virus. Companies were and are facing an increasing number of cyber-attacks which can cause damage to their finances, reputation, and growth. Today, most people continue to work from home, hence the attack surface is dramatically increased. In such trying times, the effective cybersecurity measures are of utmost importance. It is essential for businesses to understand that cybersecurity has become part of business continuity and modern, innovative approaches together with a high level of communication with the company is essential to overcome the challenges posed by cyber adversaries.

Event Recording
Matthias Reinwarth: Optimizing Your Cybersecurity Spending: Where to Put Your Money During and After the Crisis?
Jun 08, 2020
Event Recording
Christopher Schuetze: Necessary Components of an Effective Cyber Supply Chain Risk Management (C-SCRM)
Jun 09, 2020

As the recent widely publicized revelations have shown, the risk of purchasing hard- and software with deliberately or accidentally built-in weaknesses is much higher than we could have estimated – but it is not the only element of Supply Chain Risk. Supply chains can only be as strong as their weakest link. In a world where enterprises must focus on what they can do best and outsource everything else, it is necessary to know these weak spots and to limit the risks occurring from them.

Event Recording
Stefan Würtemberger: In the Crosshairs of Cyber Criminals – A Case Study by Marabu
Jun 08, 2020

In his talk, Stefan Würtemberger will discuss the caste study of Marabu's cyber-attack. He will address the necessary steps a company has to take after being attacked by cyber-criminals. He recommends calling in external cyber-specialists (expertise & protection of own resources) and filing a complaint with the police. Furthermore, he suggests dividing your forces well a working week > 100 h does not last long. A well-documented infrastructure helps when using external forces.

Event Recording
Ovidiu Ursachi: Return on Investment in Cybersecurity
Jun 09, 2020