Presentations from the SIGS Technology Summit 2016



Cyber Management Alliance Ltd., Amar Singh, CEO & Founder
Now or Never! Why we need to get Cybersecurity right today!
e3 CSS AG, Michael Hoos, CEO Safe Harbor, Privacy Shield and Espionage: go Cloud or stay home?
Venafi, Kevin Bocek, Vice President Security Strategy & Threat Intelligence World at a crossroad – “Will we be able to secure our cyber world, or not?”
Zscaler, Dr. Manoj Apte, Senior Vice President of Product Management Transforming network infrastructure and Internet security for a changing business-world

Sponsor and Professional Speaker Presentations

Akamai Technologies, Marco Fullin, Solutions Engineer The Future of Web Attacks
Avecto, Andrew Avenessian, VP of Technology Social Engineering: lessons learnt from history
Bromium, Rafal Wojtczuk, Principal Security Architect Lessons learnt from the history of vulnerabilities in hypervisors
Cisco, René Räber, Distinguished Engineer Have you ever heard about how to achieve and simplify compliance through policy abstraction and modeling?
Forcepoint, Neil Thacker, Information Security & Strategy Officer EMEA Cloud First Security Resilience: Considerations and Solutionss
Fortinet, Simon Bryden, Consulting Systems Engineer The current threat landscape and how to deal with it
Intel Security, Rolf Haas, Enterprise Technology Specialist EMEA Threat Predictions Cyber Threat Landscape 2016it
keyon AG, René Eberhard, CEO Classify or Die
Kudelski Security – Jean-Philippe Aumasson, Principal Cryptographer at Nagravision SA Quantum computing and post quantum crypto
Ping Identity, Hans Zandbelt, Principal Solutions Architect CTO Office
From WAM to FAM – the Evolution of Access Management
ProtonMail, Dr. Andy Yen, Co-Founder/CEO (on behalf of Radware) Switzerland under attack: Lessons from the ProtonMail DDoS attack
Rapid7, Pim van der Poel, Regional Manager Moving Cybersecurity Focus From Prevention to Detection & Response
Resilient Systems, Arne Jacobsen, Country Manager DACH Cyber Resilience – Industry Best Practice in Managing Security Incidents
RSA, Ralf Kaltenbach, Director DACH & Eastern Europe Modern Cyber Risks – why traditional security methods are falling short
RUAG Defence, Rocco Mandrysch, Security Researcher/strong> Hidden Information in the DNS Protocol
SailPoint, Mark Oldroyd, Technical Partner Enablement Manager Putting Identity @ the Center of Security
Securosys, Marcel Dasen, Vice President of Engineering Where are your keys?
Tenable Network Security, Florian Hammers, Security Specialist Re-active Vulnerability-Scanning was yesterday – The evolution of Vulnerability-Management
TITUS, Craig Adams, EMEA Director Tackling Insider Threats with Data Discovery and Classification
University Innsbruck, PD Dr. Michael Felderer No Risk, No Test: Successful Security Testing with Risk-Orientation
University Innsbruck, Dr. Thomas Trojer, Scientific Staff IT-Architecture Intelligence for Risk- and Security Analyses
Varonis Systems, David Lin, Country Manager How do you spot the insider threat?
Vectra Networks, Günter Ollmann, Chief Security Officer In a World of 100% Encrypted Traffic, Who Wins?

Event Partner