SIGS Technology Summit 2014 (Quality of videos and photos is not perfect – sorry for that!)
For the photos please click here
Keynotes |
|||
Keynote Dr. Hugh Thompson, Chief Security Strategist and Senior Vice President at Blue Coat |
|||
![]() Video: Now it’s Personal: A Look at the Future of Information Security |
|||
Keynote Stephen Gates, Security Evangelis at Corero Network Security
(http://www.rsaconference.com/speakers/stephen-gates) |
|||
![]() Video:Cyber-security risks presented by an unsecured Internet |
|||
![]() |
10 Key Steps for a Sustained DDoS Protection Plan |
||
![]() |
Cyber-security risks presented by an unsecured Internet |
||
Keynote Dr. Robert W. Griffin, Chief Security Architect at RSA |
|||
![]() Video: The Future of Cyber Security |
|||
![]() |
The Future of Cyber Security |
||
Keynote Christof Jungo, Security Architecture and Engineering at Swisscom
|
|||
![]() |
Building Secure Cloud Service | ||
Sponsor Presentations |
|||
![]() |
If you like more information about AccessData, please contact this address | ||
![]() Video: Close the Security Loophole Created by Encrypted Traffic – Encrypted Traffic Management |
|||
Blue Coat Systems, Robert Arandjelovic, Director of Products & Solutions | |||
![]() |
Close the Security Loophole Created by Encrypted Traffic – Encrypted Traffic Management |
||
Advanced Threat Protection and living in a post-breach world, an opportunity for partner to add value
The presentation from Pat Dunne is – due to legal issues – only available if you send an email to this address |
|||
![]() |
![]() |
Virtualisation, Cloud, Mobility versus Security – a contradiction? |
|
![]() Video: Security at your fingertips – A Good Bye to traditional architecture |
|||
F5 Networks, Michael Giesselbach, Director Sales | |||
![]() |
Security at your fingertips – A Good Bye to the traditional architecture |
||
F5 Networks, Ralf Sydekum, Technical Manager | |||
![]() |
Shift of Paradigm; The Application Delivery Controllers are the Security Devices of the future! |
||
![]() |
Guidance Software Inc, Heinz Mäurer, Senior Account Executive DA-CH
![]() Simply monitoring network packets for looking at log files is not sufficient to detect attacks |
||
Video: Quantum computing & Quantum cryptography: Why & when you should start worrying |
|||
ID Quantique, Richard P. Straub, Head of Market Development | |||
![]() |
Quantum computing & Quantum cryptography: Why & when you should start worrying |
||
Imperva, Martin Dombrowski, Security Engineer | |||
![]() |
Compromised Insider – “In the wild” examples of how critical corporate data is stolen today (incl. live demo) |
||
![]() Video: APT detection: Closing the Gaping Hole |
|||
Lynx Software Technologies, Avishai Ziv, Vice President of Cyber Security Solutions | |||
![]() |
APT detection: Closing the Gaping Hole |
||
![]() Video:Cost savings with security and performance tests |
|||
Ixia, Nimrod Kravicas, EMEA Business Development Manager | |||
![]() |
with security and performance tests |
||
![]() |
“Identity of Everything”: The New Foundation for Security and Privacy Challenges
The presentation from Jörn Dierks is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time. |
||
![]() |
![]() |
It is 10:50 am … do you REALLY know what your endpoints are doing? |
|
![]() |
Tools and Techniques Adversaries use for 0-day Malware to the latest in Targeted Attacks with live demo
The presentation from Erik Yunghans is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time. |
||
![]() |
Know Your Enemy
The presentation from Dominic Haussmann is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time. |
||
![]() |
![]() |
How do we prevent hackers from compromising our systems? |
|
![]() |
![]() |
The threat from within: What we can learn from the Edward Snowden affair? |
|
![]() |
![]() |
2014 Website Security Statistics Report: Findings and Recommendations |