SIGS Special Event – Artificial Intelligence: a reasonable completion against the risk at the endpoint?
|Target Audience||Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security
From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.
|CPE Credits||Earn 3.75 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.|
|Location||Hilton Zurich Airport Hotel
There are a lot of free park places available.
|Date of Event||5th of April 2017|
|Schedule||see agenda below|
|Participation Costs||Fr. 55.— per participants
Organization, presentations, beverages and aperitif included
|2:00 – 2:30||Registration & Coffee|
|2:30 – 2:30||Welcome & Introduction from the moderator Gerben Schroers at KPMG AG|
|2:30 – 3:30||Rainer Kessler, Senior Lecturer for the Certificate of Advanced Studies in Information Security & Technology Risk Management at the University of Applied Sciences in Basel, and independent advisor for security and compliance in the technology area
Security in the age of artificial intelligence – what we should be prepared for
What should be paid attention to in the context of AI (or AI-like applications) from a security perspective? What are the opportunities and what are the threats of AI? Especially machine learning is a challenge for security (and specific challenge as well for compliance).
The presentation with subsequent discussion shall help to shed light on AI from a security perspective, but as well regarding general developments. Various application areas of AI will be touched, while fundamental questions will be raised.
|3:30 – 4:00||Jan Tietze, Senior Sales Engineer at Cylance
Artificial Intelligence for Threat Prevention
We will look at the technology, capabilities, and approaches to utilizing AI methods for endpoint security, as well as how the technology can be operationalized in a practical scenario to provide protection from existing and emerging threats, in online and offline scenarios.
|4:00 – 4:30||Antonio Baresi, Security Researcher
Attack surface of modern endpoints
This talk will give an overview of the attack surface of a modern Windows 10 endpoint with a special focus on software security. We will look at different intrusion vectors and the attack surface that makes them possible. We will also peek into how software security on the endpoint evolved and what that means today from an attack surface point of view. Finally, we will conclude with some practical advice on how attack surface can be effectively reduced.
|4:30 – 5:00||Break|
|5:00 – 5:30||Gion Manetsch, Lead-Architect Security at Post CH AG
Evolutions in the area of Endpoint Security
“Zero Day” attacks and targeted attacks are now reality. Today attacks affect more and more the endpoints because they are usually still the weakest member in the chain. The term “endpoint” changes visibly, in particular if you add terms like IoT or you consider the multiple purposes from the endpoint.
In this presentation you will hear more about this evolution and as well best practice approaches from a complex environment.
|5:30 – 6:00||Jean Paul Kölbl, CISO at Swisscard AECS
Where to start defending the Endpoint?
This risk based approach has given us a lot of insight where our weaknesses are and where to potentially start defending the End Point to be hacked and so protect our data with more efficient and effective solutions.
|6:00 – 6:30||Panel Discussion moderated|
|6:30 – open end||Apéro Riche, Live Demo from Cylance if you are interested & Networking
The speakers will be onsite for Q&A
The Sponsors of this event are:
This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.
With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.