SIGS Special Event – Cyber Security Strategy – what should be covered?
|Target Audience||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
|CPE Credits||Earn 3.75 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.|
|Location||Hilton Zurich Airport Hotel
There are a lot of free park places available.
|Date of Event||30th of November 2016|
|Schedule||see agenda below|
|Participation Costs||Fr. 55.— per participants
Organization, presentations, beverages and aperitif included
|2:30 – 3:00||Registration & Coffee|
|3:00 – 3:05||Welcome & Introduction by the moderator Stefan Strobel, CEO and founder at cirosec GmbH|
|3:05 – 3:35||Ilia Kolochenko, Chief Executive Officer and Founder at High-Tech Bridge
Why we still cannot stop cybercrime – a global overview
This presentation will review the causes of cybercrime, and discuss how companies can mitigate the risks in a simple, efficient and effective way without spending a fortune on vendors’ solutions. We also discuss what should be covered for an effective Cyber Security Strategy.
|3:35 – 4:05||Darron Gibbard, Chief Technology Security Officer at Qualys
2016 State of Vulnerability Exploits
In this presentation we take a look at using exploit information to drive remediation.
|4:05 – 4:35||Stefan Strobel, CEO and founder at cirosec GmbH
APTs today: how to detect, prevent and deal with targeted attacks
The talk by Stefan places the numerous detection technologies including additional topics like SIEM, vulnerability management and threat intelligence (TI) in an overall context, evaluates them and presents prospects.
|4:35 – 5:10||Break|
|5:10 – 5:40||Carlo Hopstaken, Group Information Security Office at UBS AG
Using Threat Intel to steer you Cyber Capability requirements and risk appetite
|5:40 – 6:10||Thomas Dullien, formerly Google staff and CEO at zynamics (aquired by Google)
Re-architecting a defendable Internet
Unfortunately, our infrastructure was never designed to establish who is in control of a given device. This talk outlines what would be necessary to construct a software and hardware infrastructure which allows a person to establish that he is truly in control of a device.
|6:10 – 6:30||Panel Discussion moderated|
|6:30 – open end||Apéro Riche & Networking
The speakers will be onsite for Q&A
The Sponsors of this event are:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.