Videos, photos and presentations from the SIGS Technology Summit 2014

SIGS Technology Summit 2014 (Quality of videos and photos is not perfect – sorry for that!)

For the photos please click here

Keynotes

Keynote Dr. Hugh Thompson, Chief Security Strategist and Senior Vice President at Blue Coat

(http://www.rsaconference.com/speakers/hugh-thompson)





Video:
  Now it’s Personal: A Look at the Future of Information Security
Keynote Stephen Gates, Security Evangelis at Corero Network Security
(http://www.rsaconference.com/speakers/stephen-gates)



Video:Cyber-security risks presented by an unsecured Internet



10 Key Steps for a Sustained DDoS Protection Plan



Cyber-security risks presented by an unsecured Internet

Keynote Dr. Robert W. Griffin, Chief Security Architect at RSA
(http://www.rsaconference.com/speakers/robert-griffin)





Video:
  The Future of Cyber Security



The Future of Cyber Security
Keynote Christof Jungo, Security Architecture and Engineering at Swisscom
Building Secure Cloud Service

Sponsor Presentations



If you like more information about AccessData, please contact this address

Video:

Close the Security Loophole Created by Encrypted Traffic – Encrypted Traffic Management

Blue Coat Systems, Robert Arandjelovic, Director of Products & Solutions



Close the Security Loophole Created by Encrypted Traffic – Encrypted Traffic Management
Advanced Threat Protection and living in a post-breach world, an opportunity for partner to add value

The presentation from Pat Dunne is – due to legal issues – only available if you send an email to this address






Virtualisation, Cloud, Mobility versus Security – a contradiction?




Video:
  Security at your fingertips – A Good Bye to traditional architecture
F5 Networks, Michael Giesselbach, Director Sales



Security at your fingertips – A Good Bye to the traditional architecture
F5 Networks, Ralf Sydekum, Technical Manager



Shift of Paradigm; The Application Delivery Controllers are the Security Devices of the future!


Guidance Software Inc, Heinz Mäurer, Senior Account Executive DA-CH


Simply monitoring network packets for looking at log files is not sufficient to detect
attacks

 

Video:

Quantum computing & Quantum cryptography: Why & when you should start worrying

ID Quantique, Richard P. Straub, Head of Market Development



Quantum computing & Quantum cryptography: Why & when you should start worrying
Imperva, Martin Dombrowski, Security Engineer



Compromised Insider – “In the wild” examples of how critical corporate data is stolen today (incl. live demo)


  Video: APT detection: Closing the Gaping Hole
Lynx Software Technologies, Avishai Ziv, Vice President of Cyber Security Solutions



APT detection: Closing the Gaping Hole



Video:Cost savings with security and performance tests
Ixia, Nimrod Kravicas, EMEA Business Development Manager



with security and performance tests


“Identity of Everything”: The New Foundation for Security and Privacy Challenges

The presentation from Jörn Dierks is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time.






It is 10:50 am … do you REALLY know what your endpoints are doing?


Tools and Techniques Adversaries use for 0-day Malware to the latest in Targeted Attacks with live demo

The presentation from Erik Yunghans is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time.



Know Your Enemy

The presentation from Dominic Haussmann is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time.






How do we prevent hackers from compromising our systems?





The threat from within: What we can learn from the Edward Snowden affair?





2014 Website Security Statistics Report: Findings and Recommendations