Security Day


09:00 - 09:30 Short introduction of the sponsors / event partners
09:30 - 10:00 Key Note
CERN, Stefan Lüders, Head of Computer Security
Security in an Academic Environment: The Balance between Academic Freedom, Operations & Computer Security
CERN, Stefan Lüders, Head of Computer Security

Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Since 2009, he is heading the CERN Computer Security Incident Response Team as CERN’s Computer Security Officer with the mandate to coordinate all aspects of CERN’s computer security — office computing security, computer centre security, GRID computing security and control system security — whilst taking into account CERN’s operational needs.

Dr. Lüders has presented on computer security and control system cyber-security topics at many different occasions to international bodies, governments, and companies, and published several articles.

Security in an Academic Environment: The Balance between Academic Freedom, Operations & Computer Security
Like any other entity, the European Organization for Nuclear Research (CERN) is daily targeted by the malicious cyber-evil. Protection is difficult as CERN staff and users value high their academic freedom important to prosper and for pursuing their research. Hence, any cyber-security approach needs to find the appropriate balance between this academic freedom, the operation of accelerators & physics experiments, and the protection of all digital assets.

This presentation will outline such an approach, discuss attack scenarios and problems, and present CERN’s solution for countering cyber-attacks.

10:00 - 10:30 Key Note
Cisco, Story Tweedie-Yates, Head of Security Business Unit – EMEAR
The frontiers of cybersecurity; how to prepare
Cisco, Story Tweedie-Yates, Head of Security Business Unit – EMEAR

Story is a Product Manager for the Cisco Security portfolio in the Security Business Group. In her role, she is responsible for introducing customers to Cisco’s large portfolio of security offerings, applying these offerings to verticals, market segments and the local relevant EMEAR context. She serves as a Subject Matter Expert and thought leader on Cisco Security, creating content and presentations about how Security enables digitization and innovation. Recently she has served as the Product lead for Cisco Web Security, bringing new Cloud and CASB capabilities to market for Cisco customers while pioneering a popular webinar series.

Story is a Stanford graduate with a BS in Psychology. She also has an MBA from Thunderbird School of Global Management, speaks fluent Spanish and has done business in over 40 countries. In her time off, you will find her on a bike riding around Amsterdam or exploring underwater treasures with a scuba mask alongside her husband.

The frontiers of cybersecurity; how to prepare
In this presentation, you will see a case study around preparing for the cybersecurity issues of tomorrow. We will get specific about research currently underway in the realm of supply chain security, lightweight security and cryptography for IoT environments as well as quantum resistant cryptography.

We will expand the conversation to the practicalities of executing and nurturing futuristic ideas, discussing best practices for working across government and academia. The presentation should provide some new ideas to the audience to help inform their own future cybersecurity initiatives.

10:30 - 11:00 Break


11:00 - 11:25 track211track212track213track214track215
11:35 - 12:00 track221track222track223track224track225
12:00 - 13:30 Lunch

13:30 - 14:00 Key Note
IBM Resilient, Ted Julian, VP Product Management & Co-Founder
The Role of Orchestration in Incident Response
IBM Resilient, Ted Julian, VP Product Management & Co-Founder

Ted is a well-known, highly regarded figure in the security and compliance markets. Over the last 12 years, he has conceived and launched multiple successful security start-ups across software, hardware, and professional services. He served as the founding VP of Marketing at Application Security, the leading provider of database security solutions. Prior to Application Security, Ted was a company founder and Chief Strategist (functionally the VP of Marketing) at Arbor Networks (acquired by Danaher), a leading network security firm whose technology protects the backbone networks of virtually every provider around the globe. Prior to Arbor, Julian was a company founder and VP of Marketing at @stake, the premier digital security consulting firm (acquired by Symantec). He got his start in high tech as an industry analyst at International Data Corporation (IDC) and Forrester Research.

Julian is a sought-after industry expert who has appeared on CNN and ABC News as well as in the Wall Street Journal and USA Today. He is proud to have been named “Geek of the Week” by The Boston Globe and to be a guest lecturer at Cornell University’s Johnson School. Ted serves on the board of his town’s recreation department and is an avid runner. He holds a Bachelor of Science degree from Cornell University.

The Role of Orchestration in Incident Response
Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it’s no wonder that most companies struggle to respond effectively to cyberattacks. Successfully resolving attacks requires fast, intelligent, and decisive action – organisations need to have an orchestrated plan in place before an attack occurs. The best organisations leverage an orchestrated response capability to achieve cyber resilience.

In this keynote, IBM Resilient’s Ted Julian, Co-Founder and VP of Product Management will explore the latest incident response methodology and technology. Can automation really save the day? Or are the naysayers correct that the automation cure is worse than the disease itself? From instant escalation, to automatic enrichment, to guided mitigation, Ted will explore the latest incident response techniques and share what works and what doesn’t.

14:00 - 14:30 Key Note
Zscaler, Bil Harmer, Strategist, Office of the CISO
Change is Merely an Act of Survival
Zscaler, Bil Harmer, Strategist, Office of the CISO

Harmer been in the IT industry for 30 years. He has been at the forefront of the Internet since 1995 and his work in security began in 1998. He has led security for startups, Government and well established Financial Institutions. In 2007 he pioneered the use of the SAS70 coupled with ISO to create a trusted security audit methodology used by the SaaS industry until the introduction of the SOC2.



He has presented on Security and Privacy in Canada, Europe and the US at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance. He has been interviewed by and has written for various publications such as Dark Reading, Data Informed, SecureWorld and Security Intelligence. His vision and technical abilities have been used to on advisory boards for Adallom, Trust Science, ShieldX, Resolve and Integris. He has served as Chief Security Office for GoodData, VP Security & Global Privacy Officer for the Cloud Division of SAP and now serves as a strategist for Zscaler where he runs the Office of the CISO for the Americas.

Change is Merely an Act of Survival
This presentation will review the history and development of the corporate network and its interaction with the Internet. How the adoption of SaaS and PaaS base solutions have rendered the network irrelevant from a security perspective. We will explore the developments in malware, how threat actors have taken on a business approach to creation, distribution, and management of their attack campaigns.



We will then take a few steps into the future and explore some possibilities that have the potential to greatly affect corporations and how they protect themselves. Finally we will explore some of the potential strategies that can be started now to lay time ground work to ensure a more secure architecture in the future.

14:40 - 15:05 track231track232track233track234track235
15:15 - 15:40 track241track242track243track244track245
15:40 - 16:15 Break
16:15 - 16:40 track251track252track253track254track255
16:50 - 17:15 track261track262track263track264
17:25 - 17:55 Closing Note
University of Toronto, Allan Stojanovic, Information Security Architect
World at a crossroad - “Will we be able to secure our cyber world, or not?”
University of Toronto, Allan Stojanovic, Information Security Architect

Allan Stojanovic has survived IT for over 20 years. He has worked in nearly every vertical doing may different roles, mostly in the Information Security field. A jack of all trades, he tries to know a little bit about everything, and is a self proclaimed expert at nothing. The University of Toronto has been kind enough to employ him for the last 6 years.

Tactical Defence: Principles and Observations
Have you ever had to justify a firewall? What do you do when you don’t have one? Over the past six years we have been exploring non-traditional tools, and through them defining security principles to help defend our large open network. These principles have helped us focus our efforts, educate our population, and even guide some of our purchasing decisions.



In this presentation, I will talk about some of these principles, the observations that lead us to them, and the some of the outcomes of trying to implement them. Spoiler alert: They work very very well, even along side traditional security thinking.

17:55 - open end Apéro & Networking

Mobile Menu