|Target Audience||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical people allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
|CPE Credits||Earn 4.25 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.|
|Location||Hilton Zurich Airport Hotel
There are a lot of free parking places available.
|Date of Event||11th of April 2018|
|Schedule||see agenda below|
|Participation Costs||Fr. 55.— per participant
Organization, presentations, beverages and aperitif included
|2:30 – 3:00||Registration & Coffee|
|3:00 – 3:00||Welcome & Introduction by the Moderator|
|3:00 – 4:00||Jonathan Sinclair, Associate Director Information Security at Celgene
Jonathan Sinclair is an active IT security professional whose operated successfully at all levels of the corporate chain, with roles including: developer; engineer; pen-tester; reverser; service owner; architect and director.
He’s spent most of his professional career focused around the pharmaceutical area, however he’s also consulted and deployed security solutions to the financial, governmental and NGO business verticals.
Alongside his professional engagements he was the founding member of the Swiss Honeynet Project, has conducted research into unique stains of malware, presented on the emerging topic of Explainable AI, contributed to the fileless malware knowledge base and published papers on the legal ramifications of autonomous vehicles.
The cyber security hype-cycle is upon us. Is there a wave to be ridden or shall we keep our heads down until the disruption passes?
Is this really something innovative or are old ideas being recycled? In this presentation I will give you an idea about what I see will be important for 2018.
|4:00 – 4:30||Nathan Howe, Private Access Architect EMEA at Zscaler
The Hype-Cycle about Cloud Security
However, a lot of players are competing in this space and it is wise to have a closer look in order to differentiate Cloud-born solutions from Cloud-washed approaches. At first glance the solutions seem to follow the same business model. Differences become very clear when performance and scalability are reviewed or during the implementation process. Traditional solutions were designed based on a static many-to-one connection approach whereas a true Cloud-born solution follows the many-to-many connection set-up. In this session we will have a closer look at how the user will profit from this differentiation.
|4:30 – 5:00||Coffee Break
|5:00 – 6:30||Rountable Discussion
What do you see will be important for 2018? Let’s disuss and profit from the different opinions and experiences.
|6:30 – open end||Apéro Riche & Networking
The speakers will be onsite for Q&A
The sponsors of this event are:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.