Event Recording

Revealing Hidden Dimensions of Security Beyond Data Secrecy

Show description
Speaker
Dr. Scott David, LL.M.
Executive Director - Information Risk and Synthetic Intelligence Research...
University of Washington - APL
Dr. Scott David, LL.M.
Scott David, J.D., LL.M., is the Executive Director - Information Risk and Synthetic Intelligence Research Initiative (IRSIRI) at the University of Washington Applied Physics Laboratory and was formerly the Executive Director of the Law, Technology and Arts Group at UW School of Law. Scott...
View profile
Playlist
cyberevolution
Event Recording
RECAP Cyberevolution Day II
Nov 15, 2023
Event Recording
Cyber Risk Quantification – Challenges from a Risk Perspective
Nov 15, 2023

Modelling Cyber Risk is hard. Only a few historical data in known quality exist. Cyber Risks occur with a low frequency but their impact and severity might be high in case they come to pass. In my session I will give an inside how we got started to quantify Cyber Risks and what the challenges are to derive conclusions for risk steering and capital allocation.

Event Recording
Hunt the Shadows: Attack Surfaces and Entry Points!
Nov 16, 2023

Security should cover more than just what we know. As a common practice, we define the scope of assessment including the systems, networks, applications, and data that will be assessed. Hackers, by their very nature, have no predefined scope. They often seek to exploit any entry points they can find, those we may consider less significant or even we aren't aware of yet. Unknown threats are lurking in the shadows! This talk will delve into how attack surface discovery and management contribute significantly to visibility, a pivotal foundation of effective cyber defense strategies.

Event Recording
Unleashing Automated, Agentless Microsegmentation to Isolate the Next Breach
Nov 15, 2023

Discover the power of full-scale microsegmentation! Join us for an exciting presentation on this cutting-edge security solution that prevents lateral movement. Automated and agentless, effortlessly fortify your network against lateral movement attacks. 

Don't miss this opportunity to safeguard privileged protocols like RDP, SSH, and WinRM required by IT but loved by attackers. As a bonus, unlock the ability to MFA any port, protocol, or app. 

Deploys in one hour and protects your environment in just 30 days. Come see why Zero Networks was awarded “Best Global Startup” at GISEC & gain a competitive edge in today's rapidly evolving threat landscape. 

5 Takeaways:

1. Make a massive leap in your Zero Trust journey in just 30 days

2. Understand how auto-rule creation allows you to microsegment all your assets with little operational costs

3. Provide the ability to Just-in-Time MFA privileged protocols such as RDP, without the use of agents

4. Address 70%+ of the MITRE ATT&CK framework

5. Understand why Zero Networks is awarded the “Best Global Startup” at GISEC

Event Recording
Building a successful vulnerability management service concept
Nov 15, 2023

Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various organizational areas work hand in hand starting from the information security strategy, over architecture, engineering, operations and the business side. This needs to be embedded in an according information security framework that defines the rules and requirements based on which the vulnerability management service is operated. However, this approach is only complete with an according target operating model that defines the various building blocks that contribute to a successful end-to-end service.

 

Event Recording
Understanding the complexity and ambiguity of AI Ethics
Nov 16, 2023
Event Recording
Enabling the Power of Digitalization with Identity-Based Access Privileges
Nov 15, 2023

As organizations seamlessly navigate between on-premises, cloud-based, and offline resources while harnessing the power of AI, the need to verify and manage user identities with precision has never been more vital. Strong identity-based access to applications not only fortifies security by allowing organizations to grant privileges based on verified identities, buy it also enables real-time threat detection, compliance adherence, and adaptive scalability. You’ll always know with certainty who is connecting to what and what they’re doing while they’re connected. Join us to explore how this approach empowers modern hybrid organizations to strike the delicate balance between safety, security, user experience and the transformative potential of true digitalization.

Event Recording
Asset Management for Cybersecurity: A Modern Solution for An Age-Old Challenge
Nov 16, 2023

Asset management used to be easy, but not anymore. Where and how we work, the types and amount of devices we use, and the ways and places we store information have all changed.

What’s stayed the same, though, is the fact that knowing what’s in our environment is absolutely essential to securing it.

So, it’s time we say goodbye to manual asset inventory approaches, and hello to a modern approach to asset management — one that leverages existing data and automation to solve the challenges specific to cybersecurity.
 
Join this session to learn:

  • Why old asset management approaches fall short
  • How other cybersecurity initiatives are impacted by insufficient asset management
  • A new approach that leverages existing data to solve the asset management challenge for cybersecurity
Event Recording
Decoding the Consequences for Cybersecurity Using the 4 SAFIRE Scenarios of the Future
Nov 14, 2023

After the enlightening keynote on navigating cyber futures via SAFIRE scenarios, brace yourself for an immersive panel discussion that delves deeper into the uncharted territories of cybersecurity. Joining the stage are distinguished futurists and CISOs from multinational companies, bringing their expertise to the forefront. 

Together, we'll embark on an extraordinary odyssey, exploring the key takeaways from the SAFIRE scenarios and their profound implications on cybersecurity. Our panelists will share their visionary insights, drawing from their vast experience and global perspectives. 

Engage in thought-provoking debates as our panelists envision the potential challenges and transformations that lie ahead. Unravel the strategic approaches and innovative tactics they propose to fortify cyber resilience in this dynamic digital age. 

Don't miss this unparalleled opportunity to interact with pioneering minds in the field of cybersecurity. Collaborate, share ideas, and gain invaluable perspectives on safeguarding the digital realm of tomorrow. 

Join us at cyberrevolution where the fusion of futurists and CISOs promises a compelling exploration of cybersecurity's uncharted territories. Register now and be part of this extraordinary panel, where the brightest minds converge to shape the future of cybersecurity.

Event Recording
Securing the Metaverse: Cybersecurity in a New Reality
Nov 16, 2023
Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
Nov 16, 2023

IT Security – In a General Perspective:

  • Security Investment vs. Success
  • New Goals, Rediscovering Old Objectives

Closing the Gap with HP Wolf Security

Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
Nov 16, 2023

In today’s volatile cyber landscape, threats are increasingly sophisticated (e.g. AI-powered ransomware and data exfiltration techniques), and the regulatory environment is ever-changing. Now more than ever, the responsibility falls on executives to spearhead effective incident response plans. This fireside chat with industry leaders Navroop Mitter, Matthew Welling, and Evan Wolff, unpacks the complexities executives face around incident response in this new cyber-normal. The panel will delve into the intricate interplay between AI-driven threats, end-to-end encrypted communications, and new regulatory landscapes both in the U.S and Europe, particularly in the light of recent legislative developments like the U.K.'s Online Safety Bill.

We will also introduce our groundbreaking joint publication featuring specialized tabletop exercises designed for the C-suite.