Please select the presentations you would like to attend. By hoovering over the titel, talk details will be shown.

09:00 - 09:30 Key Note
ISF Limited, Steve Durbin, Managing Director
The emerging threat landscape: how to keep ahead in cyberspace

ISF Limited, Steve Durbin, Managing Director

Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of focus include strategy, information technology, cyber security and the emerging security threat landscape across both the corporate and personal environments. He is a frequent speaker and commentator on technology and security issues.

Steve has considerable experience working in the technology and telecoms markets and was previously senior vice president at Gartner. He has served as an executive on the boards of public companies in the UK and Asia in both the technology consultancy services and software applications development sectors.

Steve has also served as a Digital 50 advisory committee member in the United States, a body established to improve the talent pool for Fortune 500 boards around cyber security and information governance. He was ranked as one of the top 10 individuals shaping the way that organizations and leaders approach information security careers in 2014. Steve is currently chairman of the Digiworld Institute senior executive forum in the UK, a think tank comprised of Telecoms, Media and IT leaders and regulators. He is a Chartered Marketer and a Fellow of the Chartered Institute of Marketing.

The emerging threat landscape: how to keep ahead in cyberspace
As information security threats intensify, organisations risk becoming disoriented as they grapple with complex technology, an explosion of data, increased regulation, and a debilitating skills shortage.

Prompt action is required to interpret an increasingly complex threat horizon which could place organisations and their goals at risk.

09:30 - 10:00 Key Note
e3 CSS AG, Michael Hoos, CEO
Safe Harbor, Privacy Shield and Espionage: go Cloud or stay home?
e3 CSS AG, Michael Hoos, CEO

Developing a security product in Europe was always his dream. E3 CSS AG made the dream come true by developing Centraya in Zurich. After working 16 years for Symantec as Senior Director for Specialist Sales, Presales and Consulting he took the opportunity to be part of a security product development here in Europe from day 0 on. Since 2014 the team and Michael work on Centraya – a central cloud access security broker.
Michael works since 1997 in the IT security industry. He has been responsible for some of the largest IT security projects in Central Europe – from endpoint protection to gateway security.

Safe Harbor, Privacy Shield and Espionage: go Cloud or stay home?
“I have nothing to hide” is one of the common answers if you talk about data privacy. “We will screen what we get” seems to be the approach of secret services all around the globe. It was already tough to stay in control of your company internal digital assets. And now they are moved to the cloud. Who has access, who has control? How can I stay compliant with data privacy requirements or other regulations.
The key note tries to provide an overview of current challenges as well as an approach that we call “customer enforced trust”.

10:00 - 10:30 Break

10:30 - 10:55 track11track12track13track14track15
11:05 - 11:30 track21track22track23track24
11:40 - 12:05 track31track32track33track34
12:05 - 14:00 Lunch

14:00 - 14:30 Key Note
Zscaler, Dr. Manoj Apte, Senior Vice President of Product Management
Transforming network infrastructure and Internet security for a changing business-world
Zscaler, Dr. Manoj Apte, Senior Vice President of Product Management

Dr. Manoj Apte is a veteran network security executive with over 15 years of experience developing high performance networking and security systems.

Prior to Zscaler, Manoj held engineering and product line management positions at Juniper Networks, where he created and launched Juniper's 10G IPS (Intrusion Prevention System) appliance. Prior to Juniper, he worked on real-time embedded platforms at various companies.

Manoj holds more than a dozen patents and has contributed to the Cloud Security Alliance since its initial charter. He earned a PhD in Real-Time Embedded Systems from Mississippi State University and holds a B.Tech. in Aerospace Technology from IIT Bombay.

Transforming network infrastructure and Internet security for a changing business-world
Today, the IT landscape has dramatically shifted. Users are on the road and connected everywhere, data is moving to cloud applications, mobile and personal devices are always on and rarely controlled, and the Internet-of-Things is becoming reality. All of this is putting huge pressure on traditional appliance-based security infrastructure.
The challenge is that hackers understand these trends, and have shifted to attacking the end users as the easiest target. Users are now the primary vector for bringing malware into a company. In the age of the disappearing corporate perimeter, how can enterprises protect all users, apps and devices, wherever they are?

This presenatation covers:

  • Introduction of a cloud-based Internet Security Plattform, that delivers highly integrated Internet Security and lays the foundation of business transformation to the cloud
  • Security challenges for IT departments in work environments with a disappearing corporate perimeter and how the cloud enables to overcome limitations with regards to providing Internet Security for every user or device independenly from location
  • Moving applications to the cloud goes along with new network infrastructure requirements - How to overcome the bandwidth and latency dilemma with a zero IT branch office approach
  • There is no "No Cloud strategy" - Cloud environments will become normality - how enterprises regain transparency into which applications are used in their networks and how they can prevent Shadow IT

14:40 - 15:05 track41track42track43track44track45
15:15 - 15:40 track51track52track53track54
15:40 - 16:25 Break
16:25 - 16:50 track61track62track63track64
Continuation ENISA Panel Discussion
17:00 - 17:20 Key Note
Venafi, Kevin Bocek, Vice President Security Strategy & Threat Intelligence
World at a crossroad - “Will we be able to secure our cyber world, or not?”
Venafi, Kevin Bocek, Vice President Security Strategy & Threat Intelligence

Kevin Bocek is responsible for security strategy and threat intelligence at Venafi. He brings more than 16 years of experience in IT security with leading security and privacy leaders including RSA Security, Thales, PGP Corporation, IronKey, CipherCloud, nCipher, and Xcert.

He is sought after for comment by the world’s leading media such as Wall Street Journal, New York Times, Washington Post, Forbes, Fortune, BBC, Süddeutsche Zeitung, USA Today, Associated Press, Guardian, and Telegraph along with security press including SC Magazine, Dark Reading, and Network World.

World at a crossroad - “Will we be able to secure our cyber world, or not?” A new perspective and approach
How Can We Strengthen Trust in a World of Software and Devices
All signs point to a future world of more complex and harder-to-detect cyber threats. How can we defend our business if we don't know what is friend or foe, trusted or not, as perimeters fade, software growth explodes, DevOps moves faster, and security controls fail? Already 8 out of 10 European CIOs believe the investments we're making in traditional security solutions are not working.

The foundation of cybersecurity in our organisations are the tens of thousands of keys and certificates the authenticate and encryption communications for websites, virtual machines, software, mobile devices, containers and cloud servers. Protected, they ensure trust and privacy in digital communications and connections. But if just one critical key or certificate is left unmanaged or unprotected, the entire cybersecurity foundation is placed in jeopardy.

With Gartner expecting 50% of network attacks to come over encrypted TLS traffic by 2017 and certificates of all types the interest of cybercriminals and governments, it is essential that keys and certificates are managed and protected in the datacenter, on desktops, on mobile and IoT devices, and in the cloud.

Discover a new approach to thinking about cybersecurity, so you strengthen all the security controls to protect customers, business, data and brand.

17:20 - 18:00 Closing Note
Amar Singh, CISO and Founder Cyber Management Alliance, Chair of ISACA’s UK Security

Cyber Management Alliance, Amar Singh, CEO & Founder

mar Singh is an industry influencer and leader, founder of a not-for-profit organisation and the Cyber Management Alliance and Chair of ISACA’s UK Security Advisory Group. Amar is engaged as a trusted business and cyber security advisor, mentor to C level executives, and a consultant to organisations who need to reduce their risk exposure, deploy post incident remediation, build security teams, increase cyber resiliency and mature their information security and data privacy posture.

Amar’s client profile includes News International (now News UK), Siemens, the BBC, Reuters, BP, ATOS, Gala Coral, Cable & Wireless, SABMiller and many more. Several of the world’s prestigious media organisations and publications regularly seek and publish Amar’s counsel and guidance, including: The BBC, Financial Times, Al Jazeera, The Economist, The Guardian and The Daily Telegraph The Economist’s Intelligence Unit (EIU) invited Amar to the London Stock Exchange to share his insights on information risk management Amar launched The Financial Times’ CISO video series Amar has featured in a number of prestigious publications including: Institute of Chartered Accountants for England and Wales The Counter Terror Business Magazine Regular contributor to publications including Computer Weekly, SC Magazine, InfoSec and others Featured on the cover of SC Magazine

Now or Never! Why we need to get Cybersecurity right today!

There is no going back now. No turning the clock back. Cyberspace, the Internet, the connected world – call it what you may, is increasingly becoming an integral part of our daily lives.

Furthermore, the line between virtual cyberspace and the real world is starting to blue as cyber attacks start to impact the physical world. In the near future, our very lives will depend on the security, the stability and the integrity of our connected world. Ignoring the safety of Cyberspace will have dire consequences wrong may have long standing consequences to our lives. It’s now or never.

18:00 - open end Apéro & Networking

Mobile Menu