How to Build Secure Networks

Save the DateKlick for the .ics file to save the date


Target Audience Information Security Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security

From Consultancies and Resellers/Integrators are only technical peoples allowed to take part. Vendors and people with a Sales/Marketing role are not authorized as participants.

CPE Credits Earn 3.75 CPE (Continuing Professional Education) for attending this SIGS Afterwork Event. Please request a confirmation.
Location Hilton Zurich Airport Hotel
Hohenbuehlstrasse 10
8152 Opfikon-Glattbrugg

There are a lot of free park places available.
Train: railway station Zurich Airport – take the Hotel Shuttle

Date of Event 5th of July 2017
Language English, if non-German speaking people will attend, otherwise German
Schedule see agenda below
Participation Costs Fr. 55.— per participants
Organization, presentations, beverages and aperitif included


2:30 – 3:00 Registration & Coffee
3:00 – 3:00 Welcome & Introduction by the moderator
3:00 – 3:30 Peter Kuoni, CTO at StorTec Switzerland GmbH

A more Secure Network
Gain experience during the analysis phase and the implementation of rules to make the LAN more secure.

About the hassle to find security leaks and to fix them as well as the necessity to cooperate with the employees

3:30 – 4:00 Reto Herrmann, Director at Datapark AG

How to Build and Operate Secure Networks with a long term perspective
After 20 years of establishing, developing and operating a network in Eastern Switzerland, you can learn in this presentation from the following experiences we’ve made:

  • Insides of our best practice experiences
  • Pragmatic ways to reach the goal – focused on long lasting stability and availability
  • Learn about what it means if the security of the own network is key for the core business
  • A reliable company needs reliable partners and suppliers – what is important for us
4:00 – 4:30 Christian Klewar, Systems Engineer at Juniper Networks

How to Build Secure Networks based on SDN
Today’s layered security model (based on perimeter security) is not enough to protect against new sophisticated threats and the increasing surface area of possible attacks.

SDSN is the future of network security by embracing SDN by leveraging the cloud to solve current network security issues more effectively.

4:30 – 5:00 Break
5:00 – 5:30 Beat Küng, Security Solutions Architect at verizon

Software Defined Perimeter; a new Approach to Build Secure Networks
With the adoption of cloud services, the threat of network attacks against application infrastructure increases since servers cannot be protected with traditional perimeter defense techniques. The Software Defined Perimeter (SDP) is a research working group that was established in 2013 with the goal to develop a solution to stop network attacks against application infrastructure.

The working group research will be made freely available for use without license fees or restrictions by the Cloud Security Alliance (CSA).

5:30 – 6:30 Yves Kraft, Senior Penetration Tester & Security Consultant at Oneconsult AG

Whiteboard Session “How to Build Secure Networks”
How are company networks attacked today? What kind of attack vectors do hackers get from data? What are effective measures? Which security mechanisms can be circumvented with little effort?

We will be an interactive whiteboard session to help solve problems and questions in the area of network design and security.

6:30 – open end Apéro Riche & Networking
The speakers will be onsite for Q&A


The Sponsors of this event are:

This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.

So don’t wait and register here if you have a XING account. If you don’t have or don’t like to have a XING account, just send us an email

With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it with its event partners and event sponsors of this specific platform.

Mobile Menu