SIGS Technology Conference – Cloud Security Day Speakers 2018

All presentations are held in English


Key Notes

Ivan Pepelnjak, Independent Network Architect
Ivan Pepelnjak, CCIE#1354 Emeritus, is an independent network architect, book author, blogger and regular speaker at industry events like Interop, RIPE and regional NOG meetings and DIGS events. He has been designing and implementing large-scale service provider and enterprise networks since 1990, and is currently using his expertise to help multinational enterprises and large cloud- and service providers design next-generation data center and cloud infrastructure using Software-Defined Networking (SDN) and Network Function Virtualization (NFV) approaches and technologies.

Ivan is the author of several books covering data center technologies, highly praised webinars, and dozens of data center and cloud-related technical articles published on his blog.

Three Paths of Enterprise IT
We keep hearing about disaggregated infrastructure, whitebox switching, virtual network functions, Google-Infrastructure-for-Everyone-Else (GIFEE), hybrid clouds… and the more we try to figure out where these ideas might be relevant in our infrastructure, the more confused we get.

As Ivan Pepelnjak will explain in his keynote, it’s time to realize that not all IT environments are equal. Apart from the traditional Service Provider/Enterprise split, we’re approaching another major junction where enterprise IT teams will have to decide whether they want to use their infrastructure as a strategic asset or get rid of it and move to the cloud.

Cisco, Tjerk Bijlsma, Technology Officer, Data Center EMEAR
As Technology Officer of Cisco’s EMEAR Data Center team, Tjerk is focused on evangelizing the Cisco DC vision, strategy and technology to executives, architects and engineers. Tjerk also represent Cisco at public events speaking where he shares Cisco’s vision for the data center future.

A part of Tjerk’s focus is incubating new emerging DC technologies into Cisco and preparing them for public launch. Recent examples of these include Cisco ACI (Application Centric Infrastructure) in 2013, Cisco HyperFlex and Cisco Tetration in 2016 and AzureStack in 2017 and Cisco Network Assuance in 2018.

DC Security Transformation, and how the IT specialist is impacted
Security has become a function of the new modern DC fabrics, no longer an afterthought add-on. This extends from on-prem into multi-cloud. What are these technology innovations that make this possible? And how are they impacting the IT specialists? Join us and find out.



Check Point, Stephan Fritsche, Cloud Security & IaaS Manager
Stephan Fritsche, Dipl. Ing. (FH) Computer engineering, started his career after graduating as a specialist for routing and switching systems, followed by business development positions at system integrators and a distributor. At Nortel Networks, he held various channel positions, including managing large partners and being responsible for 2-tier business in Germany. At Cisco, he guided large partners into the data center and cloud world.

For the last few years he has consulted customers as a Product Sales Specialist in the Data Center & Cloud sector. In 2017, he stared working at Check Point Software Technologies and took over responsibility for the Cloud business in Central Europe.

Cloud – Agile and dynamic but also secure – Blueprint & Demo
As stated above, organizations are looking to better utilize their IT resources and align them with the latest and greatest that the cloud has to offer:

  • Agility – decrease the time to market interval
  • Elasticity – expand and shrink resources on-demand
  • Efficiency – only pay for what you use

When designing your cloud-based environment, it is fundamental that the architecture aligns with your and your customers’ business use cases all while keeping an uncompromised approach to security.

This presentation highlights the required principles and best practices to follow in order to build your cloud based environments in a secure manner.

Centrify, Barry Scott, CTO EMEA
Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 12 years, Barry has been helping organisations manage their Identity Management and Auditing challenges, focusing on security, regulatory compliance and operational efficiency, especially using “AD bridge” technology.
Barry’s current role is focused around enabling Centrify customers to use infrastructure they already own – Microsoft’s Active Directory – to control, secure and audit heterogeneous systems, mobile devices and applications, and also providing them a unified identity service across data centre, cloud and mobile using Centrify’s on-premises and Cloud-based solutions.

Workshop: Zero Trust Security – Never Trust, Always Verify
Organizations spent a combined $170 billion on cybersecurity in 2016 and 2017 . During the same period, 66% of organizations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security. The benefits of Zero Trust Security are crucially important in this climate of ever increasing number and scope of security breaches. Zero Trust Security:

  • Covers the broadest range of attack surfaces, ranging from users, endpoints, and networks to resources
  • Enables organizations to increase business agility through the secure adoption of cloud and mobile solutions
  • Provides a framework to properly manage the risk of exposing sensitive apps and infrastructure to business partners
  • Creates satisfied, productive users by ensuring the proper controls are in place to address appropriate levels of risk without requiring a heavy-handed, maximum-control approach regardless of the risk posed

ERNW, Matthias Luft, Security Researcher & CEO
Matthias Luft is a security researcher and heads the German security company ERNW. He is interested in a broad range of topics (such as DLP, virtualization, and network security) while keeping up with the daily consulting and assessment work.

Matthias presents on a regular basis at international security conferences (e.g. BlackHat or Infiltrate) and is involved in the organization (e.g. part of the program committee) of the security conference TROOPERS.

Three Paths of Enterprise IT
Containers, DevOps, Continous Delivery, and Infrastructure-as-Code are common terms in today’s corporate landscapes. In this presentation, will not focus on the potential security issues in those technologies but how they can be used to actually improve the security posture of your environment.

Key aspects will be the use of Infrastructure-/Platform-as-Code data to perform security reviews, DevOps approaches and how they allow to build immutable systems, and security features (such as secret management) that are built into the modern application stacks.

keyon AG (details will follow)

Secure collaboration with Intune – BKW Success Story
The BKW Group’s Europe-wide acquisition of several companies and the continuously increasing mobility demands made it necessary to adjust their IT infrastructure in order to encourage and ensure secure collaboration across all affiliated companies and within the BKW Group itself. Therefore, they decided to invest in a Microsoft based solution. The focus was on improving collaboration, regardless of the device types, app types, and the location.

This session includes an interactive part: what ever you like to know, the team from keyon AG is there to answer all your questions, work out possible solution approaches and show you further scenarios. We will use the white board or what ever it’s needed to make this part a value add for you.

NTT Security, Franck Braunstedter, Senior Manager Cyber Defence & Cloud Security
Franck Braunstedter currently heads the cloud security & cyber defence teams at NTT Security. Previously he was head of cyber security for an international biotech company headquartered in Switzerland.

Franck has 20 years IT security background and has implemented several cloud migration projects. As cloud security specialist, he focuses on compliance automation, continuous configuration and DevOps, ensuring security teams are participating as active business enablers in current IT transformation projects and not as show stoppers.

Make your cloud faster, cheaper and more secure with a fully automated cloud environment!
Take the pain out of your cloud configuration and compliance management and make operational headaches disappear: Automate version controls, software developments & tests, deployment pipeline, compliance audits & hardening policies.

Franck Braunstedter experienced cloud security expert, shows the balancing act between speed and security, ease and control and flexibility and limited resources in practice.

Qualys, Leif Kremkow, Director Technology
Leif Kremkow, Director Technology, Qualys has been with Qualys for over 13 years now. Committed to working with Qualys’ customers to help make the most of the Cloud Platform and its dependant services. Prior to being Director Technology, Leif worked closely with CAC40 enterprise companies as a Technical Account Manager to define custom solutions, carefully respecting corporate culture, fostering user acceptance, and documenting processes.

Leif has been a speaker at various European events, such as Systems, Assises de la Sécurité, RSA Conference, InfoSec, or the CSO Interchange.

A German citizen living and working in France, Leif has a Bachelor of Sciences (Hons.) in Computer Systems and Networks from the University of Plymouth in England.

Workshop (you need a tablet/notebook!): How to secure the Information System that is in the Cloud
Let’s collaborate! During this interactive workshop we’ll work out together how to secure the part of your information system that is in the Cloud. Attendees will leave this session with a consensus list of prioritized risks as well as with field- and peer-tested solutions.

This presentation and workshop will be delivered via a purpose built web application that attendees will be encouraged to navigate to and use. This implies that attendees come with a web browser, either on their laptop, their tablet, or smartphone, and have an Internet connection to surf the web with. The topic is the “Cloud” – this workshop will be based on the Cloud.

  • Makro list of risk
  • How likely are the risks
  • How much damage do you associate with the risk
  • Three most important risks to address
  • Present the consolidated risks
  • Present a coverage map
  • What works and what doesn’t

Tenable, Thomas Cueni, Security Specialist
Thomas Cueni joint Tenable as a Security Specialist for Switzerland and Austria. He is a cybersecurity professional with almost fifteen years of technical experience in network and endpoint security, security operations and vulnerability management.

Prior to joining Tenable he was working for FireEye and Blue Coat (now Symantec), where he was doing pre-sales for major global accounts based out of Switzerland.

Roundtable: Reducing the Cyber Exposure Gap from Cloud to Containers
Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise.

This interactive session will cover:

  • Making the attack surface as small as possible
  • Understanding asset priority and location
  • Expanding visibility and control over assets beyond the perimeter
  • Enhancing basic security practices to accommodate more dynamic IT environments

Zscaler, Bil Harmer, Strategist, Office of the CISO
Harmer has been in the IT industry for 30 years. He has been at the forefront of the Internet since 1995 and his work in security began in 1998. He has led security for startups, Government and well established Financial Institutions. In 2007 he pioneered the use of the SAS70 coupled with ISO to create a trusted security audit methodology used by the SaaS industry until the introduction of the SOC2.

He has presented on Security and Privacy in Canada, Europe and the US at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance. He has been interviewed by and has written for various publications such as Dark Reading, Data Informed, SecureWorld and Security Intelligence. His vision and technical abilities have been used on advisory boards for Adallom, Trust Science, ShieldX, Resolve and Integris. He has served as Chief Security Office for GoodData, VP Security & Global Privacy Officer for the Cloud Division of SAP and now serves as a Strategist for Zscaler where he runs the Office of the CISO for the Americas.

(Details will follow)

Event Partner