Special Interest Group Cyber Security Strategy – but best practice!

This is an interactive workshop – topic for next time:
Prevention, Detection & Response

Save the DateKlick for the .ics file to save the date

In cooperation with Cyber Management Alliance’s CEO & Founder Amar Singh, Chair of ISACA’s UK Security Advisory Group, Head of UK & Europe CISO Council. More information at https://www.cm-alliance.com/about-us/

Cyber Myths, Legends and Folktales – Demystifying the Fear Uncertainty and Doubt around Cyberspace and its Security
About time we sat down and laid down solid foundations in cyber security and agree, as a collective of cyber professionals, on what works and what does not work in Cybersecurity and how we can protect, detect and most importantly recover from cyber attacks.

No, it’s not going to be easy, but we need to begin somewhere and getting the basics right must surely be the most important undertaking.

With this Special Interest Group, we are bringing together cyber professionals to share their experience and insights to collectively create and define practical and pragmatic guidance and shared knowledge. Together, we will begin by defining the key ingredients of a cyber security strategy and strive to create usable templates for all the group members.

The group members will also decide and determine future topics for ongoing CMA & SIGS roundtable events

You are invited to come, contribute and share your experience in this Special Interest Group. But be aware; it’s not only to consume; we want an interactive two way communication and need as well your active participation to make this platform successful for all!

We make sure there’s always a technical advisor on site who can answer your questions from an architectural perspective and can help to design the right solutions.

Target Audience Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects

Vendors, Security Consultants and peoples from the Sales/Marketing part are not authorized as participants.
Special This platform is held under Chatham House Rules
CPE Credits 4.5 CPE (Continuing Professional Education) for attending this SIGS Special Interest Group. Please request a confirmation
Location Landgasthof zu den Drei Sternen
Hauptstrasse 3
5505 Brunegg

There are a lot of free parking lots available
Shuttle buses from and to the railways stations around will be organized

Date of Event 12th of December 2017
Further planned date: 12th of December 2017
Language English
Participation Costs Fr. 250.–
Organization, presentations, beverages and apéro riche (dinner) included

Agenda

1:00 – 1:30 Registration & Coffee
1:30 – 2:00 Carlo Hopstaken, Group Information Security Office at UBS AG

Using Threat Intel to steer you Cyber Capability requirements and risk appetite
In this session a brief overview will be provided on an approach how a firm can define their required cyber capabilities, report on residual risk, drive improvement initiatives, and discuss risk appetite with senior management.

2:00 – 2:30 Kilian Zantop, Co-Founder and Technical Adivsor of SIGS

Prevention, Detection and Response
Prevention, Detection or Response. Where should we put our limited money and why? A view based on statistical data and experience from the current operations. What works and what does not. And how does my organization need to look like to leverage the different approaches successfully. Last but not least, how to retain the budget if I’m able to successful prevent everything?

2:30 – 3:00 Olli-Pekka Niemi, Director of Network Security Research, Forcepoint

Threat & malware research, stopping attacks in the network perimeter
During the past year, the network based threats have been more damaging than ever. We have seen ransomware worms, the leak of cyber weapons by Shadow Brokers and rising level of IOT based threats.

In this session, I will drill into some interesting details of these emerging threats and malware and provide some deep-dive info based on our analysis in the Forcepoint Labs. We will specially focus in the network behaviors of the threats and discuss how the threats can be mitigated in the network perimeter.

3:00 – 3:45 Break
3:45 – 6:00 Moderated Round Table Discussion/Workshop to the topic

Defining the key ingredients to the topic and strive to create usable templates for all the group members. You will get as well a result paper after the workshop.

6:00 – open end Apéro Riche & Networking
The speakers will be onsite for Q&A

 

The sponsor of this event is:

Registration
Cancellations of registration are free of charge until 30 days before. Cancellations received beyond this point will incur 100% of the admission fee. You will get an invoice for the respective amount. In any case, however, a delegate may be sent at no additional costs.

So don’t wait and register here

With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.

Register here



Event Partner

Earn CPE Credits for
attenting SIGS Events

Mobile Menu