Event Recording

Secure software engineering: The sleeping giant in the GenAI Era

Show description
Speaker
Sergej Epp
Chief Security Officer EMEA Central
Palo Alto Networks
Sergej Epp
Sergej Epp is tech-savvy Chief Security Officer at Palo Alto Networks in EMEA Central. In this role, he develops cybersecurity strategy, overseeing cybersecurity operations and threat intelligence and is acting as a trusted advisor to strategic customers across the region. Prior to joining Palo...
View profile
Playlist
cyberevolution
Event Recording
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
Nov 16, 2023

The Elastic InfoSec team is responsible for securing Elastic’s globally distributed, remote-first workforce, and the planet scale, multi-cloud, Elastic Cloud platform.

Taking data driven approaches beyond the SIEM and applying them to the full scope of our InfoSec program, the resulting data fabric is the bedrock upon which insights, automation and AI can flourish. Learn how this approach has increased Elastic InfoSec visibility and enabled the team to distribute security responsibilities across the organisation, exponentially expanding our capability to protect Elastic from the threats of today and tomorrow, and establishing a robust foundation for AI implementation.

Event Recording
The future CISO in the age of AI
Nov 14, 2023

With the introduction of ChatGPT, we have entered into the knowledge age. In this new economy, CISOs are presented with new challenges. This session explores three concerns arising from capabilities like ChatGPT but also three opportunities that CISOs are well positioned for in this new knowledge economy.

Event Recording
Building a successful vulnerability management service concept
Nov 15, 2023

Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various organizational areas work hand in hand starting from the information security strategy, over architecture, engineering, operations and the business side. This needs to be embedded in an according information security framework that defines the rules and requirements based on which the vulnerability management service is operated. However, this approach is only complete with an according target operating model that defines the various building blocks that contribute to a successful end-to-end service.

 

Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Nov 14, 2023

Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of software selection:

  1. Avoiding Hasty Decisions: Understand the risks of rushing and the value of thorough evaluation.
  2. Balancing Immediate Needs: Learn to weigh specific requirements against the broader organizational goals.
  3. Moving Beyond Current Practices: Emphasize the importance of innovation and not just sticking to what's familiar.
  4. Recognizing Universal Challenges: Discover that many challenges are common across sectors and the benefits of industry benchmarking.
  5. Setting Realistic Software Expectations: Grasp the true potential of software within a strategic framework.

Attendees will gain insight into software selection and decision making. Join us to deepen your understanding of "The Art of Choice" in software selection.

Event Recording
The Human Factor: Why people are the main key to cybersecurity?
Nov 16, 2023

When it comes to cybersecurity, many people focus on red/blue teams and technical measures such as servers, firewalls, encryption, and intrusion prevention systems. However, one crucial factor that is often overlooked is the human factor. All of these technical measures will count for nothing when it comes to matter of insider threats. Even the most robust cybersecurity measures can be rendered ineffective by social engineering threats.

In this keynote, I will present several use cases to demonstrate why it is essential to consider the human factor in any organization’s cyber threat landscape.

Event Recording
Hacked! 72 Hours of a CISO's Nightmare
Nov 14, 2023

When the worst happens, and your defenses are breached, how do you respond? This engaging workshop, led by an experienced CISO, takes you through the crucial first hours of a cyber-attack. Using real-world examples and first-hand experience, the workshop highlights the immediate steps and strategies essential to mitigating damage and restoring operations. It provides insight into the tactical responses required during these stressful moments and offers guidance on how to create a robust response plan to prepare your organization better.

Attendees can expect to walk away with a better understanding of incident response management and benefit from the lessons learned from past attacks. This is a rare opportunity to learn from the trenches and equip your organization with the resilience it needs in the face of cybersecurity threats.

Event Recording
DORA: What are the Main Challenges Facing the Financial Industry?
Nov 15, 2023

The Digital Operational Resilience Act (DORA), which entered into force on 16 January 2023 and will apply from 17 January 2025, aims to enhance the digital operational resilience of entities across the EU financial sector and to further harmonise key digital operational resilience requirements for all EU financial entities. DORA sets out uniform requirements for the security of network and information systems of companies and organisations operating in the financial sector as well as critical third parties which provide ICT (Information and Communication Technologies) services to them, such as cloud computing or data analytics services. DORA creates a regulatory framework on digital operational resilience, whereby all financial entities need to make sure they can withstand, respond to, and recover from all types of ICT-related disruptions and threats. These requirements are homogenous across the EU, with the core aim to prevent and mitigate cyber threats. DORA is complemented with several “regulatory technical standards (‘RTS’)” which give more details on requirements for cyber security.

As the whole DORA legislation cannot be presented in a short timeframe, I will focus on the part that is most important to ensure cybersecurity and the part that is the most interesting one for the audience, the RTS on ICT Risk Management Framework. I will give a quick overview and highlight the topics, which will bring the most workload to the industry. The biggest challenges will be in the areas of Asset Management, Operations Security, Network Security and Encryption.

Event Recording
Decoding the Consequences for Cybersecurity Using the 4 SAFIRE Scenarios of the Future
Nov 14, 2023

After the enlightening keynote on navigating cyber futures via SAFIRE scenarios, brace yourself for an immersive panel discussion that delves deeper into the uncharted territories of cybersecurity. Joining the stage are distinguished futurists and CISOs from multinational companies, bringing their expertise to the forefront. 

Together, we'll embark on an extraordinary odyssey, exploring the key takeaways from the SAFIRE scenarios and their profound implications on cybersecurity. Our panelists will share their visionary insights, drawing from their vast experience and global perspectives. 

Engage in thought-provoking debates as our panelists envision the potential challenges and transformations that lie ahead. Unravel the strategic approaches and innovative tactics they propose to fortify cyber resilience in this dynamic digital age. 

Don't miss this unparalleled opportunity to interact with pioneering minds in the field of cybersecurity. Collaborate, share ideas, and gain invaluable perspectives on safeguarding the digital realm of tomorrow. 

Join us at cyberrevolution where the fusion of futurists and CISOs promises a compelling exploration of cybersecurity's uncharted territories. Register now and be part of this extraordinary panel, where the brightest minds converge to shape the future of cybersecurity.

Event Recording
The Digital Identity Wallet - A user perspective
Nov 16, 2023

The promise of the DIW (Digital Identity Wallet), which is inspired by SSI (Self-Sovereign Identity), is to give the user more control of which data they are sharing with whom. But do the users really want this? User control was also the intention behind "The cookie law", which brings up annoying dialogs, where only the most dedicated will do anything but accept the default option. This is very similar to the GDPR consents, where you in most cases have no option but to accept, to be able to continue.

Event Recording
Protect APIs Everywhere with Modern Solutions
Nov 15, 2023

Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud that can devastate your business. To effectively prevent these attacks, you need  comprehensive, consistent security that protects your entire digital footprint.

F5 solutions reduce complexity in a hybrid and multi-cloud world so you can deliver secure digital experiences at scale—in the architecture you have now, and for the architecture you aspire to evolve your business into.

Event Recording
XM Cyber: From Vulnerability Management to Continuous Exposure Management
Nov 15, 2023
Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
Nov 16, 2023

In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his perspectives on how Decentralized IDs can improve the cybersecurity posture of organizations for different use cases, including workforce, business partners, customers, and citizens.