SIGS Special Event – Artificial Intelligence: a reasonable completion against the risk at the endpoint?

Save the DateKlick for the .ics file to save the date

Target Audience Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security

From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.

CPE Credits Earn 3.75 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.
Location Hilton Zurich Airport Hotel
Hohenbuehlstrasse 10
8152 Opfikon-Glattbrugg

There are a lot of free park places available.
Train: railway station Zurich Airport – take the Hotel Shuttle

Date of Event 5th of April 2017
Language English
Schedule see agenda below
Participation Costs Fr. 55.— per participants
Organization, presentations, beverages and aperitif included

Agenda

2:00 – 2:30 Registration & Coffee
2:30 – 2:30 Welcome & Introduction from the moderator Gerben Schroers at KPMG AG
2:30 – 3:30 Rainer Kessler, Senior Lecturer for the Certificate of Advanced Studies in Information Security & Technology Risk Management at the University of Applied Sciences in Basel, and independent advisor for security and compliance in the technology area

Security in the age of artificial intelligence – what we should be prepared for
Artificial intelligence (AI) is the buzzword which moves not only the subject-matter expert publications, but the broad public as well. AI is not new, but these days its commercial use is visible to everyone (Google Now, Siri, Roboadvisors, etc.). Due to missing harmonized definition, some applications are called AI which do not deserve this label.

What should be paid attention to in the context of AI (or AI-like applications) from a security perspective? What are the opportunities and what are the threats of AI? Especially machine learning is a challenge for security (and specific challenge as well for compliance).

The presentation with subsequent discussion shall help to shed light on AI from a security perspective, but as well regarding general developments. Various application areas of AI will be touched, while fundamental questions will be raised.

3:30 – 4:00 Jan Tietze, Senior Sales Engineer at Cylance

Artificial Intelligence for Threat Prevention
What are the benefits the use of Artificial Intelligence can provide for information security? AI techniques have been receiving a lot of attention recently, especially in the field of endpoint security.

We will look at the technology, capabilities, and approaches to utilizing AI methods for endpoint security, as well as how the technology can be operationalized in a practical scenario to provide protection from existing and emerging threats, in online and offline scenarios.

4:00 – 4:30 Antonio Baresi, Security Researcher

Attack surface of modern endpoints
Compromising the endpoint as a first step to enter an organization’s network is still a prevailing intrusion method today. A modern endpoint connected to the Internet exposes a certain attack surface and thus becomes a potential threat to the entire organization.

This talk will give an overview of the attack surface of a modern Windows 10 endpoint with a special focus on software security. We will look at different intrusion vectors and the attack surface that makes them possible. We will also peek into how software security on the endpoint evolved and what that means today from an attack surface point of view. Finally, we will conclude with some practical advice on how attack surface can be effectively reduced.

4:30 – 5:00 Break
5:00 – 5:30 Gion Manetsch, Lead-Architect Security at Post CH AG

Evolutions in the area of Endpoint Security
In many companies, security at the endpoints has changed massively in the last years. Static “security”, as we know it from ten years ago, has only a minimal effect in today’s world.

“Zero Day” attacks and targeted attacks are now reality. Today attacks affect more and more the endpoints because they are usually still the weakest member in the chain. The term “endpoint” changes visibly, in particular if you add terms like IoT or you consider the multiple purposes from the endpoint.

In this presentation you will hear more about this evolution and as well best practice approaches from a complex environment.

5:30 – 6:00 Jean Paul Kölbl, CISO at Swisscard AECS

Where to start defending the Endpoint?
Defense in depth is hard to archive, especially where to start and find out where you can have the most bang for your bucks. We have used an analysis technique which was developed by US Military and later adopted by Lockheed Martin in Information Security.

This risk based approach has given us a lot of insight where our weaknesses are and where to potentially start defending the End Point to be hacked and so protect our data with more efficient and effective solutions.

6:00 – 6:30 Panel Discussion moderated
6:30 – open end Apéro Riche, Live Demo from Cylance if you are interested & Networking
The speakers will be onsite for Q&A

 

The Sponsors of this event are:

This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.

So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email

With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.

Mobile Menu