SIGS Special SOC Forum – Visit the Cyber Fusion Center from Kudelski Security
Klick for the .ics file to save the date
||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
||Earn 3 CPE (Continuing Professional Education) for attending a SIGS Afterwork Event. Please request a confirmation.
Route de Genève 22-24
|Date of Event
||28th of September 2017
||This time for free – sponsored by Kudelski Security
Organization, presentations, beverages and aperitif included
|2:30 – 3:00
||Registration & Apéro
|3:00 – 3:30
||Olivier Spielmann, Head EMEA MSS Operation at Kudelski Security
How to upgrade to Security Operations 2.0 for tackling the latest threats?
Currently, the time to detect threat actors after a compromise is much too long. Hundred days are needed in average which brings the breach impact to an incredible level. As a conclusion, current techniques and processes are not adapted to the actors the world is facing. We will present how we have addressed that issue very efficiently in an advanced threat actor case.
|3:30 – 4:00
||John Titmus, Director, Sales Engineering EMEA at CrowdStrike
On the Hunt for Pandas, Kittens and Bears: Effective use of Intelligence and Data to Keep You Safe
In this session, you will learn the importance of Intelligence in preventing your environment. We will present how to identify Threat Actors at play and how you can operationalise this data into your environment effectively. We will also offer real-world strategic insight into the current threat landscape, offering practical tips on how you can utilise intelligence to protect your organisation.
|4:00 – 4:30
||Richard Quignon, Sales Engineer at LogRhythm
Threats are evolving. A new approach to cyber security is required
It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.
TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:
- Advanced machine analytics, which are key to discovering potential threats quickly
- Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery
Key take aways:
- Determine if your spending is focused on the right areas
- Understand how to prevent high-impact cyber incidents
- Discover how can you lower your TCO and maximise the ROI of your security technology
|4:30 – 5:00
|5:00 – 5:30
||Qing Lan, Security Operation Center Analys at UBS AG
Experiences on User Awareness Campain Exercises
In this presentation you can profit from the experience UBS has made relating user awareness campain exercises. Learn more about what has worked in this environment and what not – what you can try as well and what you can skip on your to do list.
|5:30 – 6:00
||Juan Ramos, Cyber Security Leader at Canton de Vaud
SOC ACV: where we are and where we go
In this presentation, you will get an overview how Canton de Vaud has organized their SOC, how they work – means the actual processes – and how they reached this goal. You can profit from an inside view about the different challenges to get there and possible hints where you maybe can profit from. In addition, you will get a future outlook about the relations between the Cantons and the collaboration with the Confederation.
|6:00 – open end
||Tour de SOC, Apéro Riche & Networking
The speakers will be onsite for Q&A
The Sponsors of this event are:
So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.