Hacking Day

09:00 - 09:30 Key Note
modzero AG, Max Moser
Hacking 2017

modzero AG, Max Moser

Max Moser works at his self-founded company modzero AG as an IT Security Consultant for large and medium-sized businesses. As a ‚paid hacker‘ he attacks software and hardware products by order of his customers to test their security or helps customers to improve their overall security.

Max Moser is an active member of the IT Security scene for over 20 years and known for his innovative security research as well as several Open Source projects.

Hacking 2017
The year is 2017 and the commercial Internet is soon 30 years old. 30 years is a long time in our fast-paced times. Computers, smartphones, robots, they all became our constant companions in life: At work, in our smart home, in the airplane or on the surgeon’s table. One would believe we have come to grips with the technology. Why then are ‚hacker attacks‘ still an almost daily news item? How is it possible that large companies and individuals are seemingly becoming victims more and more frequently?
How hard is it to infiltrate systems and organizations or to tap their data? Based on examples from his work as a Security Analyst, Max Moser discusses ‚modern‘ defenses and attack techniques.

09:30 - 10:00 Key Note
SySS GmbH, Sebastian Schreiber, Founder and Managing Director
Live Hacking: How digital attackers are intruding into your systems
SySS GmbH, Sebastian Schreiber, Founder and Managing Director

Sebastian Schreiber, born 1972, studied physics, mathematics, business studies and computer science at the University of Tuebingen.

He graduated in the latter (Diplom Informatiker), and in 1998 founded the SySS GmbH in his hometown Tuebingen in order to offer high-quality security assessments.Until the present days, he is owner and managing director of this fast growing company which currently employs a staff of about 90.

Schreiber is frequently present on national congresses an the media, being an demanded expert in the field of IT security.

As a long time member, he is also commited to, e.g., the „Verband für Sicherheit in der Wirtschaft Baden Württemberg e.V.” or the advisory council of the journal „Datenschutz und Datensicherheit“.

Live Hacking: How digital attackers are intruding into your systems
During a live hacking presentation, Sebastian performs different attacks on IT systems. He shows that it is astonishingly easy to bypass protective measures in order to access sensitive information.

IT security incidents in the recent past demonstrate emphatical ly that the IT systems even in international high-tech companies and major state institutions are not given sufficient protection. Widespread IT quality assurance measures may suffice to safeguard 99 per cent of systems. However, the decisive factor is that the remaining 1 per cent vulnerability provides a target for digital attacks: Every gap, however tiny, is sufficient to render an otherwise well-secured IT infrastructure vulnerable in its entirety.

10:00 - 10:30 Key Note
Cisco, Story Tweedie-Yates, Head of Security Business Unit – EMEAR
Cybersecurity topics for tomorrow – today
Cisco, Story Tweedie-Yates, Head of Security Business Unit – EMEAR

Story is a Product Manager for the Cisco Security portfolio in the Security Business Group. In her role, she is responsible for introducing customers to Cisco’s large portfolio of security offerings, applying these offerings to verticals, market segments and the local relevant EMEAR context. She serves as a Subject Matter Expert and thought leader on Cisco Security, creating content and presentations about how Security enables digitization and innovation. Recently she has served as the Product lead for Cisco Web Security, bringing new Cloud and CASB capabilities to market for Cisco customers while pioneering a popular webinar series.

Story is a Stanford graduate with a BS in Psychology. She also has an MBA from Thunderbird School of Global Management, speaks fluent Spanish and has done business in over 40 countries. In her time off, you will find her on a bike riding around Amsterdam or exploring underwater treasures with a scuba mask alongside her husband.

Cybersecurity topics for tomorrow – today
In this presentation, you will see an overview of the threat landscape of today and tomorrow. We will start with the latest trends in the threat landscape that are being seen today, followed by specific research currently underway to counteract the threat landscape of tomorrow. We will dive deeper into research underway in topics such as supply chain security, lightweight security and cryptography for IoT environments as well as quantum resistant cryptography and SDN. The presentation should provide participants with a good idea about new and interesting areas of cybersecurity to get involved in and look for in the future.

Three questions:

  • What do you think of the content?

  • How many people are we expecting for both Security and hacking days?

  • Are those people the same for both days?

10:30 - 11:00 Break

11:30 - 10:25 track311track312track313
11:35 - 12:00 track321track322
12:00 - 13:45 Lunch

13:45 - 14:15 Key Note
High-Tech Bridge SA, Stéphane Koch, Executive Vice President and General Counsel
False Sense of Security is Insecurity
High-Tech Bridge SA, Stéphane At the benefit of a Master of Advanced Studies (MAS) in Economic Crime Investigation, and a degree of Specialist in Public Relations (ISRP), he also holds the position of Vice-President of the High-Tech Bridge SA (a web security company). Member of the scientific board of the Master of Advanced Studies (MAS) on Competitive Intelligence and Monitoring at the Geneva High School of Management. Specializes in the professional use of Social Media and Digital Strategy, online reputation management, information security and managing human risk. He also intervenes in cases related to Cyber-Bullying problem, Brand protection on the Internet, and in other cases related with cybercriminality. Since 2003 Stephane Koch, is one of the Senior Online Security advisor for Reporters Without Borders, he has leaded his series of workshops on information security for journalists in various Institutes and Universities all around the world.

False Sense of Security is Insecurity
Human perception” versus “Security technologies”… Whatever security tool is used, it is only one of a link in a chain, and securing a link is not enough to secure the entire chain… Therefore, the way to understand “Computer and Information Security” should be considered with a similar perception that the way „quantum computing“ works.

We need (at the personal and professional level) to makes our understanding of info security evolving from “bits” to “qbits”: accepting that there is two possible states of the security in the same time: to consider that application, or data, are not just secure or unsecure… but that they can be in a secure and insecure state in the same time.

14:25 - 15:25 track331track332track333
15:25 - 16:00 Break
16:00 - 16:25 track341track342track343
16:35 - 17:00 track351track352
17:10 - 17:35 track361track362
18:00 - open end Apéro & Networking

Mobile Menu