SIGS Afterwork Event Berne

Identify and close gaps in your data access governance practices

Save the DateClick on the .ics file to save the date

Target Audience Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security

From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.

CPE Credits Earn 2 CPE (Continuing Professional Education) for attending a SIGS Afterwork Event. Please request a confirmation.
Location Hotel Schweizerhof Bern & THE SPA
Bahnhofplatz 11
3001 Bern

Further information at http://www.schweizerhof-bern.ch/de/top-navigation/kontakt

Date of Event 17th of May 2018
Language German – English on request

Participation Costs Fr. 30.–
This includes presentations, all beverages and aperitif (food)

Agenda

4:00 – 5:00 Registration & Welcome Coffee
5:00 – 5:30 Alexander Bode, IT Security Expert at Netwrix

Identify and close gaps in your data access governance practices
All too often, organizations get serious about controlling access to their data only after they experience a data breach. But there’s no reason to wait. Let’s discuss, how to enable strong data access governance (DAG) across file servers, as well as collaboration systems like SharePoint and SharePoint Online, by giving deep insight into unstructured data, including information about possible security gaps, effective permissions and data access patterns. We’ll answer a question, how to ensure, that all the proper access security controls are in place to prevent breaches.

5:30 – 6:30 Yves Kraft, Senior Penetration Tester & Security Consultant at Oneconsult AG

Workshop: Ethical Hacking to improve Data Access Control
Testing is an essential part of any data security program. If corrective action is taken and there is proper distribution of the lesson learned, then an ethical hack can reduce the potential exposure of the company to criminal hackers.

Whether designing a security process or engaging in testing required by an existing process, it is essential to have a thorough understanding of the process or application being tested. In most scenarios, the tester is looking to see what and how much information is accessible (and the relative sensitivity of the information) with techniques commonly used by criminals from in and outside. This can help you to further improve security if the lessons learned are properly analyzed, changes implemented, and information is disseminated to all interested parties.

Learn from Yves’s experience based on real examples/hacks already done and hear more about how to design possible hacks scenarios. Gain deeper insights how specific testing situation will help considerably in limiting possible exposure that today may be overlooked by many companies.

If there’s enough time, Yves will show you a short Live Hacking Demo.

6:30 – open end Apéro & Networking

The sponsor of this event is:

So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email

With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.