Keynotes
|
|||
Cyber Management Alliance Ltd., Amar Singh, CEO & Founder |
![]() |
Now or Never! Why we need to get Cybersecurity right today! | |
e3 CSS AG, Michael Hoos, CEO | ![]() |
Safe Harbor, Privacy Shield and Espionage: go Cloud or stay home? | |
Venafi, Kevin Bocek, Vice President Security Strategy & Threat Intelligence | ![]() |
World at a crossroad – “Will we be able to secure our cyber world, or not?” |
|
Zscaler, Dr. Manoj Apte, Senior Vice President of Product Management | ![]() |
Transforming network infrastructure and Internet security for a changing business-world | |
Sponsor and Professional Speaker Presentations
|
|||
Akamai Technologies, Marco Fullin, Solutions Engineer | ![]() |
The Future of Web Attacks | |
Avecto, Andrew Avenessian, VP of Technology | ![]() |
Social Engineering: lessons learnt from history | |
Bromium, Rafal Wojtczuk, Principal Security Architect | ![]() |
Lessons learnt from the history of vulnerabilities in hypervisors | |
Cisco, René Räber, Distinguished Engineer | ![]() |
Have you ever heard about how to achieve and simplify compliance through policy abstraction and modeling? | |
Forcepoint, Neil Thacker, Information Security & Strategy Officer EMEA | ![]() |
Cloud First Security Resilience: Considerations and Solutionss | |
Fortinet, Simon Bryden, Consulting Systems Engineer | ![]() |
The current threat landscape and how to deal with it | |
Intel Security, Rolf Haas, Enterprise Technology Specialist EMEA | ![]() |
Threat Predictions Cyber Threat Landscape 2016it | |
keyon AG, René Eberhard, CEO | ![]() |
Classify or Die | |
Kudelski Security – Jean-Philippe Aumasson, Principal Cryptographer at Nagravision SA | ![]() |
Quantum computing and post quantum crypto | |
Ping Identity, Hans Zandbelt, Principal Solutions Architect CTO Office |
![]() |
From WAM to FAM – the Evolution of Access Management | |
ProtonMail, Dr. Andy Yen, Co-Founder/CEO (on behalf of Radware) | ![]() |
Switzerland under attack: Lessons from the ProtonMail DDoS attack | |
Rapid7, Pim van der Poel, Regional Manager | ![]() |
Moving Cybersecurity Focus From Prevention to Detection & Response | |
Resilient Systems, Arne Jacobsen, Country Manager DACH | ![]() |
Cyber Resilience – Industry Best Practice in Managing Security Incidents | |
RSA, Ralf Kaltenbach, Director DACH & Eastern Europe | ![]() |
Modern Cyber Risks – why traditional security methods are falling short | |
RUAG Defence, Rocco Mandrysch, Security Researcher/strong> | ![]() |
Hidden Information in the DNS Protocol | |
SailPoint, Mark Oldroyd, Technical Partner Enablement Manager | ![]() |
Putting Identity @ the Center of Security | |
Securosys, Marcel Dasen, Vice President of Engineering | ![]() |
Where are your keys? |
|
Tenable Network Security, Florian Hammers, Security Specialist | ![]() |
Re-active Vulnerability-Scanning was yesterday – The evolution of Vulnerability-Management | |
TITUS, Craig Adams, EMEA Director | ![]() |
Tackling Insider Threats with Data Discovery and Classification | |
University Innsbruck, PD Dr. Michael Felderer | ![]() |
No Risk, No Test: Successful Security Testing with Risk-Orientation | |
University Innsbruck, Dr. Thomas Trojer, Scientific Staff | ![]() |
IT-Architecture Intelligence for Risk- and Security Analyses | |
Varonis Systems, David Lin, Country Manager | ![]() |
How do you spot the insider threat? | |
Vectra Networks, Günter Ollmann, Chief Security Officer | ![]() |
In a World of 100% Encrypted Traffic, Who Wins? | |