All presentations are held in English
As Technology Officer of Cisco’s EMEAR Data Center team, Tjerk is focused on evangelizing the Cisco DC vision, strategy and technology to executives, architects and engineers. Tjerk also represent Cisco at public events speaking where he shares Cisco’s vision for the data center future.
A part of Tjerk’s focus is incubating new emerging DC technologies into Cisco and preparing them for public launch. Recent examples of these include Cisco ACI (Application Centric Infrastructure) in 2013, Cisco HyperFlex and Cisco Tetration in 2016 and AzureStack in 2017 and Cisco Network Assuance in 2018.
Security has become a function of the new modern DC fabrics, no longer an afterthought add-on. This extends from on-prem into multi-cloud. What are these technology innovations that make this possible? And how are they impacting the IT specialists? Join us and find out.
Matthias Luft is a security researcher and heads the German security company ERNW. He is interested in a broad range of topics (such as DLP, virtualization, and network security) while keeping up with the daily consulting and assessment work.
Matthias presents on a regular basis at international security conferences (e.g. BlackHat or Infiltrate) and is involved in the organization (e.g. part of the program committee) of the security conference TROOPERS.
Containers, DevOps, Continous Delivery, and Infrastructure-as-Code are common terms in today’s corporate landscapes. In this presentation, will not focus on the potential security issues in those technologies but how they can be used to actually improve the security posture of your environment.
Key aspects will be the use of Infrastructure-/Platform-as-Code data to perform security reviews, DevOps approaches and how they allow to build immutable systems, and security features (such as secret management) that are built into the modern application stacks.
As Market Owner of Gemalto’s Identity & Access line, Guido Gerrits maintains a focus on Identity Security and data protection for both the government and enterprise sectors. Guido brings over 10 years of experience in Multi-Factor and Access Management. Before moving to the Market Owners role, Guido supported as Account Manager large channel partners and their end users solving IAM needs. He received his degree in electrical engineering at the Fontys University of Applied Sciences in Eindhoven, the Netherlands.
Digitization, cloud services, mobile devices and data protection regulations. Authentication is one of the key topics in information security and the requirements are changing dramatically. François Lasnier presents the Gemalto vision of access management of the future through virtualization and by merging different technologies to one solution.
Ivan Pepelnjak, CCIE#1354 Emeritus, is an independent network architect, book author, blogger and regular speaker at industry events like Interop, RIPE and regional NOG meetings and DIGS events. He has been designing and implementing large-scale service provider and enterprise networks since 1990, and is currently using his expertise to help multinational enterprises and large cloud- and service providers design next-generation data center and cloud infrastructure using Software-Defined Networking (SDN) and Network Function Virtualization (NFV) approaches and technologies.
Ivan is the author of several books covering data center technologies, highly praised webinars, and dozens of data center and cloud-related technical articles published on his blog.
We keep hearing about disaggregated infrastructure, whitebox switching, virtual network functions, Google-Infrastructure-for-Everyone-Else (GIFEE), hybrid clouds… and the more we try to figure out where these ideas might be relevant in our infrastructure, the more confused we get.
As Ivan Pepelnjak will explain in his keynote, it’s time to realize that not all IT environments are equal. Apart from the traditional Service Provider/Enterprise split, we’re approaching another major junction where enterprise IT teams will have to decide whether they want to use their infrastructure as a strategic asset or get rid of it and move to the cloud.
Christian Laux, LL.M., is attorney-at-law and partner at LAUX LAWYERS AG. He has extensive experience with technology and its legal implications, and advises on all aspects of IT law. Contracts, outsourcings, and Data related issues are at the core of his practice. Christian combines his experience both as inside counsel as well as his practice as outside counsel with a passion for technology. Christian is board member of several organizations operating at the cutting edge of data, policy and the law.
This presentation will focus on Internet of Things (IoT) and what it is that makes IoT a core theme for the future. Digitization and automation of workflows implies that things, devices and processes will be tagged by a variety of means to track them. The result is that data are being generated, extracted from the sphere of those who own the devices or the instruments used in those processes, and then conveyed to central storage facilities of the system operators. There, processing takes place (Big Data, Analytics), and the results of the analytics processes can be reused in further projects. – The workflows that are being outlined during the presentation trigger a number of legal issues. The legal issues can be properly addressed, but should be, too. The presentation will cover the aspects relevant under the GDPR, and ePrivacy regulations (yet to come):
Neil holds 20 years experience in the Information Security industry with 10 years financial services experience in the insurance and banking arena. Neil is a member of the ENISA Threat Landscape stakeholder group where he contributes to the EU agency program alongside CERTs to position the threat landscape, offer mitigation advice and threat analysis innovation. Neil is also co-founder and board member of the Security Advisor Alliance, a not-for-profit organisation formed to help security leaders in their role, engage and support interest in the infosec industry and offer advice and tools to move organisations towards improved risk and data-centric strategies.
Organisations have embraced the cloud however todays CISO is playing catch-up to ensure they can adequately control and manage the risk. This talk will cover the fundamentals of both cloud application and cloud data security and how CISO’s and information security leaders can understand risk from an organisational, and more importantly, contextual level. This talk will cover:
Christian Treutler, application security expert and technology enthusiast, is a long time security advocate with focus on defending applications against threats in this hyper-connected world. In his position as Product Manager Security for Avi Networks, he uses his engineering background to push the boundaries of what application defence can offer.
He is especially interested in designing security tools that make DevSecOps jobs easier by enabling application defence through automation and better visibility of attacks.
Applications today are deployed in fully automatic environments like micro-services, containers or clouds, which allow for seamless load balancing, auto-scaling and other infrastructure-dependent services. To secure such applications many different security policies need to be applied, like SSL/TLS, ACLs, IP Reputation, WAF and more. Traditional application security products will not work well in such environments, because they are usually not built for them. Over the last 10 years I have worked with large and small customers to rethink and implement security for their applications.
In this session we will explore many challenges that companies are facing when moving applications to a DevOps approach and cross reference them with participant experience if possible. After the analysis of these challenges we will outline possible solutions for enabling application security alongside continuous application rollout. As a result participants should have a good understanding of what an automated and integrated application security solution could look like.
Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 12 years, Barry has been helping organisations manage their Identity Management and Auditing challenges, focusing on security, regulatory compliance and operational efficiency, especially using “AD bridge” technology.
Barry’s current role is focused around enabling Centrify customers to use infrastructure they already own – Microsoft’s Active Directory – to control, secure and audit heterogeneous systems, mobile devices and applications, and also providing them a unified identity service across data centre, cloud and mobile using Centrify’s on-premises and Cloud-based solutions.
Organizations spent a combined $170 billion on cybersecurity in 2016 and 2017 . During the same period, 66% of organizations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security. The benefits of Zero Trust Security are crucially important in this climate of ever increasing number and scope of security breaches. Zero Trust Security:
Stephan Fritsche, Dipl. Ing. (FH) Computer engineering, started his career after graduating as a specialist for routing and switching systems, followed by business development positions at system integrators and a distributor. At Nortel Networks, he held various channel positions, including managing large partners and being responsible for 2-tier business in Germany. At Cisco, he guided large partners into the data center and cloud world.
For the last few years he has consulted customers as a Product Sales Specialist in the Data Center & Cloud sector. In 2017, he stared working at Check Point Software Technologies and took over responsibility for the Cloud business in Central Europe.
As stated above, organizations are looking to better utilize their IT resources and align them with the latest and greatest that the cloud has to offer:
When designing your cloud-based environment, it is fundamental that the architecture aligns with your and your customers’ business use cases all while keeping an uncompromised approach to security.
This presentation highlights the required principles and best practices to follow in order to build your cloud based environments in a secure manner.
Paul Vriens is CIAM/IDaaS Solution Architect at iWelcome. In his role Paul is leading and designing complex identity projects on a daily basis, also dealing with new regulations as GDPR.
Before joining iWelcome, Paul worked as a Security Architect, and later as Managing Consultant at CA Technologies. His background in Security and knowledge of GDPR make him a valued sparring partner at the intersection of seamless customer journeys and the right level of privacy protection and security.
The Internet of Things is transforming how we live. But is also changes the Identity Management landscape. Multiple users connected to multiple devices and things lead to different levels of user rights, mandates and extensive consent management. How to manage these complex user interactions in the cloud? In this workshop we’ll look upon the platform of the future, and you’ll get some practical examples.
André Döhn, a Security professional has held a range of engineering and pre-sales consulting roles during the course of his 20-year career in helping enterprise and service provider customers to deploy and secure their network infrastructure. André has worked for vendors like VMware as network virtualization consultant and is currently leading the Pre-Sales Team of the DACH organization at Juniper Networks. He also acts as lead for cloud technologies and therefore has a strong focus on security for multicloud environments. The promise of multicloud is to deliver an infrastructure that is secure, ubiquitous, reliable and fungible and where the migration of workloads will be a simple and intuitive process. For IT to be successful in becoming multicloud-ready, it is critical organizations consider not only the data center and public cloud, but also the on-ramps of their campus and branch networks. Otherwise, enterprises will face fractured security and operations as network boundaries prevent seamless, end-to-end visibility and control.
Security administrators are faced with an ever-increasing list of threats to their applications, whether they are deployed in development, staging, production, or public cloud environments; running on bare-metal servers, on virtual machines, or within containers; or orchestrated by OpenStack, Kubernetes, or OpenShift. Workload mobility in modern cloud environments exacerbates the problem, adding a new level of difficulty for securing workloads that migrate frequently.
As a result, the network perimeter is now blurred, rendering traditional perimeter-based application security measures insufficient, inflexible, and extremely cumbersome and costly to manage. The solution we are introducing allows writing Policies based on known application attributes defined by tags, labels, and other grouping constructs can be universally applied in various environments without having to rewrite them every time.
The solution is also providing critical insights into traffic flows, establishing a new security paradigm that reduces the overall number of policies, simplifies enforcement, and provides greater visibility into hybrid cloud environments.
Alex J. Pattupara, IT Security Consultant at Keyon, is a cyber security expert in the field of Enterprise Mobility & Security consisting of Azure Information Protection, Intune, Rights Management Services, and Cloud App Security. In strong collaboration with customers, he planned and realized several strategic projects for large enterprises in the field of finance, insurance, manufacturer, energy and infrastructure.
Microsoft EMS big picture – holistic solution
The cloud and mobility are reality. Data is transferred between organizations, users, devices and applications, regardless of their location. The challenge is to identify sensitive information and take the right measures to ensure data security and protection.
Microsoft Enterprise Mobility + Security (EMS) and O365 offer comprehensive security measures and compliance dashboards that enable organizations to implement statutory, regulatory, and company-specific security requirements. The presentation gives an overview of the most important components and processes.
Secure collaboration with Intune – BKW Success Story
The BKW Group’s Europe-wide acquisition of several companies and the continuously increasing mobility demands made it necessary to adjust their IT infrastructure in order to encourage and ensure secure collaboration across all affiliated companies and within the BKW Group itself. Therefore, they decided to invest in a Microsoft based solution. The focus was on improving collaboration, regardless of the device types, app types, and the location.
Further information you can find at https://www.keyon.ch/en/News-Medien/2018/keyon-BKW-Success-Story-Intune-V1.5.pdf
Franck Braunstedter currently heads the cloud security & cyber defence teams at NTT Security. Previously he was head of cyber security for an international biotech company headquartered in Switzerland.
Franck has 20 years IT security background and has implemented several cloud migration projects. As cloud security specialist, he focuses on compliance automation, continuous configuration and DevOps, ensuring security teams are participating as active business enablers in current IT transformation projects and not as show stoppers.
Take the pain out of your cloud configuration and compliance management and make operational headaches disappear: Automate version controls, software developments & tests, deployment pipeline, compliance audits & hardening policies.
Franck Braunstedter, experienced cloud security expert, shows the balancing act between speed and security, ease and control and flexibility and limited resources in practice.
Jason Goode is a Regional Director at Ping Identity, a provider of cloud identity security solutions and is responsible for supporting sales and business development activities across the EMEA region. Jason has over 15 years sales experience in the identity security space. Prior to joining Ping Jason worked for a number of public and privately owned enterprise software companies focused on delivering world class identity and security products.
Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure.
This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2.
Leif Kremkow, Director Technology, Qualys has been with Qualys for over 13 years now. Committed to working with Qualys’ customers to help make the most of the Cloud Platform and its dependant services. Prior to being Director Technology, Leif worked closely with CAC40 enterprise companies as a Technical Account Manager to define custom solutions, carefully respecting corporate culture, fostering user acceptance, and documenting processes.
Leif has been a speaker at various European events, such as Systems, Assises de la Sécurité, RSA Conference, InfoSec, or the CSO Interchange.
A German citizen living and working in France, Leif has a Bachelor of Sciences (Hons.) in Computer Systems and Networks from the University of Plymouth in England.
Let’s collaborate! During this interactive workshop we’ll work out together how to secure the part of your information system that is in the Cloud. Attendees will leave this session with a consensus list of prioritized risks as well as with field- and peer-tested solutions.
This presentation and workshop will be delivered via a purpose built web application that attendees will be encouraged to navigate to and use. This implies that attendees come with a web browser, either on their laptop, their tablet, or smartphone, and have an Internet connection to surf the web with. The topic is the “Cloud” – this workshop will be based on the Cloud.
Thomas Cueni joint Tenable as a Security Specialist for Switzerland and Austria. He is a cybersecurity professional with almost fifteen years of technical experience in network and endpoint security, security operations and vulnerability management.
Prior to joining Tenable he was working for FireEye and Blue Coat (now Symantec), where he was doing pre-sales for major global accounts based out of Switzerland.
Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise.
This interactive session will cover:
Pierre is an IT-Security professional with over 20 years sales and management experience within this industry. He has worked in the past for Computacenter AG and Virtual Forge Inc. Additionally Pierre is acting as Trusted Advisor and strategy consultant for IT-Security Managers and CISOs. His main topics are ISMS, SOC, application + network security and leadership for high potentials.
Many companies using or plan to use a hybrid infrastructure to get more business flexibility. But a mix of physical, virtual and cloud networks is not only very complex -it´s nearly impossible to gain the expected business flexibility and maintain at the same time security and compliance.
Automation based on a central company wide security policy bridges these gap between business flexibility and maintain security within complex environments.
Harmer has been in the IT industry for 30 years. He has been at the forefront of the Internet since 1995 and his work in security began in 1998. He has led security for startups, Government and well established Financial Institutions. In 2007 he pioneered the use of the SAS70 coupled with ISO to create a trusted security audit methodology used by the SaaS industry until the introduction of the SOC2.
He has presented on Security and Privacy in Canada, Europe and the US at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance. He has been interviewed by and has written for various publications such as Dark Reading, Data Informed, SecureWorld and Security Intelligence. His vision and technical abilities have been used on advisory boards for Adallom, Trust Science, ShieldX, Resolve and Integris. He has served as Chief Security Office for GoodData, VP Security & Global Privacy Officer for the Cloud Division of SAP and now serves as a Strategist for Zscaler where he runs the Office of the CISO for the Americas.
For 30 years we have built our security posture on the premise that we control the corporate network. 80% of Employees use “ Shadow IT Apps, O356 usage has increase 320% and AWS have over 2 million enterprise clients. Add Mobilized users to this massive usage of Cloud based services and everything Enterprise security teams are trying to defend has left the corporate “Castle”.
How do you embrace the changes and protect your company in the where the Internet is your new corporate network?