Event Recording

Re-inventing risk management for artificial intellect

Show description
Speaker
Konstantin Shvetsov
Head of Information Security
Osome NL B.V
Konstantin Shvetsov
I am an adept information security professional with over 15 years of experience spanning diverse sectors such as financial institutions and international government-level endeavors. My unwavering enthusiasm for this field fuels my desire to establish meaningful connections with fellow IT and IS...
View profile
Playlist
cyberevolution
Event Recording
IAM: The Guardian Angel of Zero Trust
Nov 15, 2023

In today's digital age, traditional security models are no longer sufficient to protect against sophisticated cyber threats. That's where Zero Trust comes in – a security model that assumes that every user, device, and application is a potential threat until proven otherwise.

In this session, we will go through the criticality of the IAM in a zero trust security model. How by leveraging and implementing core IAM Technologies (IGA, Identity Federation and PAM) organisations can effectively manage identities, devices, enforcing access control principals like least privilege, continuous authentication, user behaviour analytics and can ensure that only authorised users have access to sensitive data and mission critical resources.

Event Recording
Anchors of Trust - Lessons learned from a Ransomware attack
Nov 16, 2023

The word no company wants to hear became an unfortunate reality for one of the world’s largest independent development partners to the automotive and aviation industries — ransomware. The EDAG Group fell victim to an encryption Trojan that shut down their business-critical systems and IT systems. During this session Maria will be sharing her lessons learned and will be explaining her strategy that helped EDAG successfully restore their systems by leaning on Vectra AI as one of her anchors of trust. 

 

Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Nov 15, 2023

Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my session I will give an inside how we got started to quantify Cyber Risks and what the challenges are to derive conclusions for risk steering and capital allocation.

Event Recording
Navigating Cybersecurity: Market Size and Predictive Insights
Nov 15, 2023

In an increasingly technologically interconnected world, cybersecurity teams are the defenders of digital frontlines. Looking ahead to the future, this session dives into the dynamic landscape of cybersecurity, and investigates the market segments’ evolution within it. Many things impact your cybersecurity preparedness and plans, such as new attack patterns, evolution of cybercrime techniques, and emerging technologies. We will discuss industry forecasts until 2025 and how businesses step towards optimal cybersecurity.  

From AI driven decision-making to a massive amount of cybersecurity threats around the world, many events make fluctuations in the market, and whether you are a cybersecurity professional, an investor or passionate about IT security, this session will provide you valuable information about the current market sizes and the predictions until 2025.  

You will find this session not only informative, but full of valuable insights that will enlighten your journey to secure your organization 

Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Nov 14, 2023

Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of software selection:

  1. Avoiding Hasty Decisions: Understand the risks of rushing and the value of thorough evaluation.
  2. Balancing Immediate Needs: Learn to weigh specific requirements against the broader organizational goals.
  3. Moving Beyond Current Practices: Emphasize the importance of innovation and not just sticking to what's familiar.
  4. Recognizing Universal Challenges: Discover that many challenges are common across sectors and the benefits of industry benchmarking.
  5. Setting Realistic Software Expectations: Grasp the true potential of software within a strategic framework.

Attendees will gain insight into software selection and decision making. Join us to deepen your understanding of "The Art of Choice" in software selection.

Event Recording
Building Your Cybersecurity Strategy with Emerging Security and Privacy Technologies
Nov 15, 2023

In this session, I will give an overview of a number of emerging security and privacy technologies, such as advanced cryptography (e.g., lightweight cryptography, post-quantum cryptography, etc.), privacy-enhancing technologies (e.g., confidential computing, zero-knowledge proof, etc.), and blockchain, and discuss why and how organizations should consider building their cybersecurity strategies with these emerging technologies.  

Event Recording
Advancing at the speed of AI
Nov 16, 2023

How do key human behaviours influence on how we look at AI and turn technology use in long term strategic advantage. Reflecting on learnings gained when operationalizing AI in a large multi-national starting more than 5 years ago, Christian is going to share how we can boost cyber resilience with a focus on security operations. We are going to investigate navigating common challenges when leveraging AI in a corporate environment and how to become a front runner within your organisation.

Event Recording
Adopting Insider Threat Management Best Practices for NIS2 Compliance
Nov 16, 2023

In today's dynamic cybersecurity landscape, safeguarding sensitive data and infrastructure from insider threats, while effectively monitoring supply chain and third-party users, is paramount. This presentation delves into the critical intersection of Insider Threat Management and NIS2 compliance, anchored in a detailed case study of a company subject to NIS2 regulations. We will explore a diverse toolkit and industry best practices tailored not only for achieving compliance, but also for streamlining cybersecurity processes through robust technical controls. Attendees will gain invaluable insights into seamlessly integrating cutting-edge tools and proven methodologies, ensuring unwavering compliance with NIS2 regulations while fortifying your security posture.

Event Recording
Revealing Hidden Dimensions of Security Beyond Data Secrecy
Nov 14, 2023

The presentation will provide a framing to help attendees navigate the rapid transition from yesterday’s industrial age security paradigms to future approaches for sustaining reliable information systems.

The talk will identify 13 emerging non-technical information risk trends, ranging from human hallucination and cognitive narcissism to institutional paradigm collapse and perimeter fetishism to Capitalist power overreach (and several others) that are having current, real-world security impacts, but which remain unaddressed in cybersecurity strategies and deployments. 

Solutions will be suggested and explored across business, operating, legal, technical, social, political, economic, biological and even evolutionary pathways, offering a toolkit of options that attendees can immediately apply in their organizations’ security program. Specific strategies for managing, de-risking and leveraging near and long-term personal and professional interactions in this steep part of the curve of exponential change will be suggested.

Event Recording
Secure Data Sharing in a Zero-Trust World
Nov 16, 2023

Zero trust is being embedded into law across the world enforcing privacy, data residency and consent. How do companies and governments share patient data global during a pandemic to measure the efficacy of a vaccine? How do financial services organisations share intelligence on suspected terrorist funding, money laundry or sanctions evasion? How is this achieved in the emerging world of data nationalism?

Developing a secure data sharing service is a complex proposition that need to embed change into operations.

Join this session to discuss:

  • Establishing a global secure data sharing service
  • Real world customer use case of the applications of Secure Data Sharing
  • How to supply AI models with the data required while respecting zero trust
Event Recording
Panel | Forging Stronger Shields - Collaborative Strategies to Defend Against Cyber Criminals
Nov 15, 2023

In the fast-paced and intricate world of cyber defense, the challenges are numerous and ever-evolving. Our "Forging Stronger Shields"  panel convenes a group of esteemed Chief Information Security Officers who dive deep into the complexities of this digital age, drawing from their hands-on experiences and daily challenges. These seasoned professionals will delve into the nuances of the present-day cyber threat landscape, from advanced persistent threats to state-sponsored cyberattacks. They'll emphasize collaboration's crucial role in establishing effective defense strategies.

As they share tales from the trenches, the CISOs will explore the blend of human expertise and cutting-edge technology required to construct formidable barriers against cyber threats. Furthermore, they will shed light on fostering a pervasive culture of cybersecurity, emphasizing that this responsibility doesn't just lie with the IT department but spans from the boardroom to the break room.

This session will be an engaging dialogue as these experts navigate the intricate cybersecurity maze, reiterating that our collective strength and unity are vital in defending against sophisticated cyber adversaries. Be part of this conversation that aims to inform and catalyze a united front against cyber threats.

Event Recording
Preparing for the Current and Future Cybersecurity Threat Landscape: ENISA Efforts
Nov 15, 2023

Cybersecurity is increasingly taking the front seat, from being considered as an afterthought to becoming a priority in policy, technical, economic, societal and even legal and environmental discussions. Given the increasing hyper-connectivity of everything and our growing online presence, the significance of cybersecurity cannot be overstated. We are constantly coming across new cyber threats and attacks, novel avenues are opening for adversaries, emerging technologies are changing the paradigm and cyber affairs are more and more linked to physical ones, leading to the notion of hybrid threats. ENISA, the EU Agency for Cybersecurity, has been monitoring the cybersecurity threat landscape for more than 10 years. In this talk, ENISA will discuss the current state of the EU cybersecurity threat landscape and discuss its evolution based on the foresight activities that the Agency utilizes to map the landscape, to identify future and emerging cybersecurity challenges