Event Recording

Anchors of Trust - Lessons learned from a Ransomware attack

Show description
Speakers
Maria Fladung
IT Security Officer
EDAG Engineering GmbH
Maria Fladung
Maria Fladung is IT Security Officer at the independent automotive service provider EDAG. After training as an IT specialist, she gained extensive professional experience as a system engineer in the network area. During her subsequent studies in business informatics, she discovered IT security...
View profile
Matthias Schmauch
Regional Sales Manager
Vectra AI
Matthias Schmauch
Matthias Schmauch oversees sales for enterprise clients in southern Germany Vectra AI. Prior to his current role, this computer science graduate held similar positions at Varonis, Nexthink, and various IT service providers. As a strong advocate against the concept of "security by obscurity,"...
View profile
Playlist
cyberevolution
Event Recording
Decoding the Consequences for Cybersecurity Using the 4 SAFIRE Scenarios of the Future
Nov 14, 2023

After the enlightening keynote on navigating cyber futures via SAFIRE scenarios, brace yourself for an immersive panel discussion that delves deeper into the uncharted territories of cybersecurity. Joining the stage are distinguished futurists and CISOs from multinational companies, bringing their expertise to the forefront. 

Together, we'll embark on an extraordinary odyssey, exploring the key takeaways from the SAFIRE scenarios and their profound implications on cybersecurity. Our panelists will share their visionary insights, drawing from their vast experience and global perspectives. 

Engage in thought-provoking debates as our panelists envision the potential challenges and transformations that lie ahead. Unravel the strategic approaches and innovative tactics they propose to fortify cyber resilience in this dynamic digital age. 

Don't miss this unparalleled opportunity to interact with pioneering minds in the field of cybersecurity. Collaborate, share ideas, and gain invaluable perspectives on safeguarding the digital realm of tomorrow. 

Join us at cyberrevolution where the fusion of futurists and CISOs promises a compelling exploration of cybersecurity's uncharted territories. Register now and be part of this extraordinary panel, where the brightest minds converge to shape the future of cybersecurity.

Event Recording
Navigating the Cyber Regulatory Landscape: Quo vadis Cyber Regulations
Nov 15, 2023

What's happening with the growth and increase in Cyber Regulations in Europe? Why are authorities pushing more and more regulations that focus on Cyber Security and Risk Management? Does it really bring value for actual Cyber Security at a business? And how can (if not must) one prepare for this wind of change?

Event Recording
Re-inventing risk management for artificial intellect
Nov 15, 2023

This presentation delves into the imperative task of redefining risk management in the era of Artificial Intelligence (AI). As AI reshapes industries, it also introduces unique risks and challenges. This abstract offers a glimpse into how traditional risk management approaches must evolve to effectively address the intricacies of AI-related uncertainties. Through real-world examples, it explores emerging concerns like algorithmic bias, privacy infringements, and unforeseen consequences. Attendees will gain insights into proactive strategies, including leveraging AI itself for risk assessment and mitigation. By the presentation's conclusion, participants will grasp the essential steps needed to navigate the uncharted territory of AI-driven risks, ensuring responsible and secure integration of this transformative technology.

Event Recording
How to Minimize the Blast Radius of an Attack?
Nov 15, 2023

In this session we will explain how Philips reduced the attack surface and lateral movement with a potential security incident with Privileged Access Management for the cloud in a highly regulated environment.

Event Recording
Stop guessing about your Cyber Risk!
Nov 15, 2023

Cyber risk isn’t just a technical problem but a strategic one. Through Cyber Risk Quantification CISO’s are enabled to quantify the financial benefit of their cyber security strategy and are empowered to communicate with the Executive Board on eye-level and get the buy-in that you need. Join this session to learn how other companies are finally getting full transparency on their cyber exposure, ensuring not only they’re making the right investments in cyber security but also getting the right ROI of such investments.

Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Nov 15, 2023

Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive approach of detecting someone in our network and then moving into the proactive way of security. Using the same tools for asset discovery, risk assessment and automatic checks for compliance of the customers environment.

So the solution should not just stop the attack, but before check automatically how an attacker possibly could come in and have a full overview of the environment including automatic risk factors for assets and overview combined with integrations with other solutions.

Additionally the task of risk management is stated in the new NIS2 directive and should be clearly a topic for all companies that are affected.

Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Nov 15, 2023
Event Recording
Preparing for the Current and Future Cybersecurity Threat Landscape: ENISA Efforts
Nov 15, 2023

Cybersecurity is increasingly taking the front seat, from being considered as an afterthought to becoming a priority in policy, technical, economic, societal and even legal and environmental discussions. Given the increasing hyper-connectivity of everything and our growing online presence, the significance of cybersecurity cannot be overstated. We are constantly coming across new cyber threats and attacks, novel avenues are opening for adversaries, emerging technologies are changing the paradigm and cyber affairs are more and more linked to physical ones, leading to the notion of hybrid threats. ENISA, the EU Agency for Cybersecurity, has been monitoring the cybersecurity threat landscape for more than 10 years. In this talk, ENISA will discuss the current state of the EU cybersecurity threat landscape and discuss its evolution based on the foresight activities that the Agency utilizes to map the landscape, to identify future and emerging cybersecurity challenges

Event Recording
Beyond the Now: Examining Emerging Trends in the Cybersecurity Landscape
Nov 16, 2023

The results of a comprehensive 2023 study by KuppingerCole will be presented, providing invaluable foresight into cybersecurity trends and threats anticipated for 2024. Based on in-depth research, the discussion will illuminate a series of predictions and prepare participants for the evolving cyber landscape.

The conversation will touch upon emerging trends, new threat vectors, potential vulnerabilities, and anticipated advancements in cyber defense strategies. Insights from this study will equip organizations to preemptively bolster their cyber defenses, enhance resilience, and navigate the forthcoming challenges of the cyber domain with confidence and competence.

Event Recording
Battling the Bots: Enhancing Web Application Security Through Multi-Dimensional Approaches
Nov 15, 2023

Automated Threats to web applications are according to the Open Web Applications Project (OWASP) a misuse of their inherent valid functionality by applying automated means. Usually, those automations are referred to as `bots´. The attackers usually reverse engineer the web application, e.g. an e-commerce platform, and based on their discovery, craft bots to exploit vulnerabilities or gaps that allow them to pursue their goal on the platform in an undesirable way. A famous example are sneaker bots, whose goal is to obtain a competitive advantage over human clients in purchasing hyped articles like sneakers. Addressing automated threats is a company-wide effort and requires to tackle the problem from many angles reaching from DevSecOps, architectural changes, raising awareness, establishing transparency in the business, implementing preventive controls, to detective controls. In the first phase of our research, we tackled the problem in a big e-commerce company on this entire spectrum of challenges and are now at the position to enhance our approach in a second phase. In the second phase, we aim for an approach to harden a web-application platform with existing detective and reactive controls using aspects of generative approaches and adversarial attacks while also considering explainability.

In the talk, we are going to explain and motivate the problem space, explain the insights from the first phase and outline the goals of the second phase of our research.

Event Recording
Cloud Security in a highly regulated environment
Nov 15, 2023
Event Recording
IAM: The Guardian Angel of Zero Trust
Nov 15, 2023

In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes that every user, device, and application is a potential threat until proven otherwise.

In this session, we will go through the criticality of the IAM in a zero trust security model. How by leveraging and implementing core IAM Technologies (IGA, Identity Federation and PAM) organisations can effectively manage identities, devices, enforcing access control principals like least privilege, continuous authentication, user behaviour analytics and can ensure that only authorised users have access to sensitive data and mission critical resources.