SlideShare a Scribd company logo
1 of 2
Download to read offline
More Information at www.technologysummit.ch
23rd
of June 2015 at the PostFinance Arena in Berne
Moderation
Start End Andreas Wuchner
on behalf of SIGS
Bob Griffin
on behalf of SIGS
open Bernhard Tellenbach, Swiss
Cyber Storm
Peter Berlich, (ISC)2
Bernd Auer, Internet Security
Forum (ISF)
08:00 09:00 Registration & Coffee
09:00 09:30 Swisscom, Adrian Humbel, Head of Securiy Solutions & Roger Halbheer, Head of Group Security
Security for Tomorrow – new Approaches for a new World
09:30 10:00 Millenium Evolution Israel, Joseph H. Boussidan, Founder & Managing Director
Cyber Security Continuum: Edging towards a decentralized World & an inside Look into the Israeli Cyber Security Industry
10:00 10:30 Break
10:30 10:55 Classify, Protect and
Confidently Share
TITUS, Tim Upton, Founder
and CEO
The Increasing Importance of
Using Data Identification and
Behavioral Analytics to
Tackle Insider Threats
Privileged Activity Monitoring
BalaBit, Laszlo Szabo, Head of
Solution Strategy
Contextual Security
Intelligence
Trust Protection
Venafi, Kevin Bocek, Vice
President, Security Strategy &
Threat Intelligence
Securing our future: Lessons
from the human immune
system
Bern University of Applied
Sciences, Dr. Endre Bangerter,
Professsor of Computer
Siences
Memory Tracing - Forensic
Reverse Engineering
Internet Security Forum (ISF),
Peter Berlich
A best practice framework for
managing information risk
11:05 11:30 Data-centric Security
Websense, Neil Thacker,
Information Security &
Strategy Officer
Data protection – own your
asset before your adversary
Continuous Security
Qualys, Wolfgang Kandek,
CTO
Security becomes Continuous
Anti Fraud
F5 Networks, Alfredo Vistola,
Senior Security Solutions
Web fraud – attack examples
and how to protect your
internet online services
against it
ETH, David Gugelmann,
Doctoral Student
Finding malicious activity in
HTTP(S) traffic with Hviz
iT-CUBE SYSTEMS AG, Andreas
Mertz, CEO
Time to Detect / Respond –
How to achieve the next
evolution level in Cyber
Security
11:40 12:05 Identity & Access Control
Ping Identity, Hans Zandbelt,
Senior Technical Architect
Goodbye passwords. Hello
productivity. The future of
identity - has the post-
password era begun?
Threat Exposure
Management
Rapid7, Wim Remes, Manager
of Strategic Security Services
Modelling systems to reduce
risk
DDoS Threat Defense
Corero Network Security,
Stephen Gates, Security
Evangelist
The Growing DDoS Threat to
your Business
Compass Security Schweiz AG,
Ivano Somaini, Resource
Manager Bern & Security
Analyst
"Social Engineering: The devil
is in the details"
Firmenich SA, Peter Merker,
Corporate Information
Security Officer
Information Security Policies
and Compliance
measurement – simplified?
12:05 02:00 Lunch
Event Partners
More Information at www.technologysummit.ch
23rd
of June 2015 at the PostFinance Arena in Berne
Moderation
Start End Andreas Wuchner
on behalf of SIGS
Bob Griffin
on behalf of SIGS
open Bernhard Tellenbach, Swiss
Cyber Storm
Peter Berlich, (ISC)2
Bernd Auer, Internet Security
Forum (ISF)
02:00 02:30 Information Security Forum (ISF), Prof. Dr. Dirk Loomans
„Threat Horizon 2017"
02:40 03:05 Data and Mobility Security
Platform
Ionic Security, Carlos Scott,
Data Security Consultant
Start with the Data
Security Policy Management
AlgoSec, Edy Almer, VP
Product Management
Hybrid is Here, Security Not
Secure Communication
Kudelski, Jean-Philippe
Aumasson, Principal
Cryptographer
Secure communication
technology: past, present,
future
Universität Innsbruck, Ass.-
Prof. Dr. Ulrike Hugl
Humans as security
vulnerability! Malicious
insider threat as a crucial
corporate risk factor
Bank Julius Bär & Co. Ltd.,
Michael Meli, Chief
Information Security Officer
New CISO - surviving the first
100 days
03:15 03:40 Continuous Network
Monitoring
Tenable Network Security,
Colin West, Sales Engineering
Director EMEA
Visualizing Insider Activity
and Uncovering Insiders
Threats
Cloud and Data Center
Security
Trend Micro, Udo Schneider,
Security Evangelist DACH
Modern Datacenters – “Face
the challenges with Security”
InfoSec Global (Switzerland)
AG, Dr. Tomislav Nad, System
Architect & Cryptographer
Advances and Trends in
Cryptography
UBS AG, Stephan Pfirter, Head
Information Security Officer of
Group Technology
The CEO gets it, now you
have to deliver...
03:40 04:25 Break
04:25 04:50 Security Policy Orchestration
Tufin, Mark Wellins, Vice
President of Solutions
Microsegmentation vs.
legacy concepts – the future
of policy orchestration
FS-ISAC, John M. Salomon,
Director Continental Europe
Cyber-Threat Intelligence
Sharing: Addressing Evolving
Global Security Threats
Swisscom IT Services AG,
Christof Jungo, Head of
Security Architecture &
Engineering
Collaborative Security Model
05:00 05:20 (ISC)2
, Peter Berlich, Authorized Instructor
The Great Cyber Race: Information and cyber security preparedness as seen from the front-lines of practice around the World
05:20 06:00 Podiums Discussion
06:00 open end Networking & Apéro
Event Partners

More Related Content

Similar to SIGS_Technology_Summit_Agenda

Expert Event Legal challenges and opportunities for digital health innovation
Expert Event Legal challenges and opportunities for digital health innovationExpert Event Legal challenges and opportunities for digital health innovation
Expert Event Legal challenges and opportunities for digital health innovationDayOne
 
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.techbyte2014
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Dale Butler
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceDale Butler
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityLucy Nicholas
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016Dale Butler
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008Anton Chuvakin
 
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure SoftwareHacker Proof: Building Secure Software
Hacker Proof: Building Secure SoftwareCesar Cerrudo
 
Fujitsu World Tour 2017 in Berlin - Agenda
Fujitsu World Tour 2017 in Berlin - AgendaFujitsu World Tour 2017 in Berlin - Agenda
Fujitsu World Tour 2017 in Berlin - AgendaFujitsu Central Europe
 
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...Marek Pietrzyk
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School FDMagazine
 
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017Tiago Henriques
 

Similar to SIGS_Technology_Summit_Agenda (19)

Expert Event Legal challenges and opportunities for digital health innovation
Expert Event Legal challenges and opportunities for digital health innovationExpert Event Legal challenges and opportunities for digital health innovation
Expert Event Legal challenges and opportunities for digital health innovation
 
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
JIMS TECHBYTE 2012- The Annual IT Symposium Of JIMS, Sec-5,Rohini.
 
Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013Cyber Security for the Military and Defence Sector 2013
Cyber Security for the Military and Defence Sector 2013
 
Security in a Mobile World
Security in a Mobile WorldSecurity in a Mobile World
Security in a Mobile World
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Why IT Security Is Fucked Up
Why IT Security Is Fucked UpWhy IT Security Is Fucked Up
Why IT Security Is Fucked Up
 
E-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_SecurityE-069_Oil&Gas_Cyber_Security
E-069_Oil&Gas_Cyber_Security
 
SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016SMi Group's Oil & Gas Cyber Security Europe 2016
SMi Group's Oil & Gas Cyber Security Europe 2016
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Hacker Proof: Building Secure Software
Hacker Proof: Building Secure SoftwareHacker Proof: Building Secure Software
Hacker Proof: Building Secure Software
 
Fujitsu World Tour 2017 in Berlin - Agenda
Fujitsu World Tour 2017 in Berlin - AgendaFujitsu World Tour 2017 in Berlin - Agenda
Fujitsu World Tour 2017 in Berlin - Agenda
 
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
Marek Pietrzyk - CISO Summit Zurich - Next generation Information Rights Mana...
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
IPEC 2019 Agenda
IPEC 2019 AgendaIPEC 2019 Agenda
IPEC 2019 Agenda
 
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017
 

SIGS_Technology_Summit_Agenda

  • 1. More Information at www.technologysummit.ch 23rd of June 2015 at the PostFinance Arena in Berne Moderation Start End Andreas Wuchner on behalf of SIGS Bob Griffin on behalf of SIGS open Bernhard Tellenbach, Swiss Cyber Storm Peter Berlich, (ISC)2 Bernd Auer, Internet Security Forum (ISF) 08:00 09:00 Registration & Coffee 09:00 09:30 Swisscom, Adrian Humbel, Head of Securiy Solutions & Roger Halbheer, Head of Group Security Security for Tomorrow – new Approaches for a new World 09:30 10:00 Millenium Evolution Israel, Joseph H. Boussidan, Founder & Managing Director Cyber Security Continuum: Edging towards a decentralized World & an inside Look into the Israeli Cyber Security Industry 10:00 10:30 Break 10:30 10:55 Classify, Protect and Confidently Share TITUS, Tim Upton, Founder and CEO The Increasing Importance of Using Data Identification and Behavioral Analytics to Tackle Insider Threats Privileged Activity Monitoring BalaBit, Laszlo Szabo, Head of Solution Strategy Contextual Security Intelligence Trust Protection Venafi, Kevin Bocek, Vice President, Security Strategy & Threat Intelligence Securing our future: Lessons from the human immune system Bern University of Applied Sciences, Dr. Endre Bangerter, Professsor of Computer Siences Memory Tracing - Forensic Reverse Engineering Internet Security Forum (ISF), Peter Berlich A best practice framework for managing information risk 11:05 11:30 Data-centric Security Websense, Neil Thacker, Information Security & Strategy Officer Data protection – own your asset before your adversary Continuous Security Qualys, Wolfgang Kandek, CTO Security becomes Continuous Anti Fraud F5 Networks, Alfredo Vistola, Senior Security Solutions Web fraud – attack examples and how to protect your internet online services against it ETH, David Gugelmann, Doctoral Student Finding malicious activity in HTTP(S) traffic with Hviz iT-CUBE SYSTEMS AG, Andreas Mertz, CEO Time to Detect / Respond – How to achieve the next evolution level in Cyber Security 11:40 12:05 Identity & Access Control Ping Identity, Hans Zandbelt, Senior Technical Architect Goodbye passwords. Hello productivity. The future of identity - has the post- password era begun? Threat Exposure Management Rapid7, Wim Remes, Manager of Strategic Security Services Modelling systems to reduce risk DDoS Threat Defense Corero Network Security, Stephen Gates, Security Evangelist The Growing DDoS Threat to your Business Compass Security Schweiz AG, Ivano Somaini, Resource Manager Bern & Security Analyst "Social Engineering: The devil is in the details" Firmenich SA, Peter Merker, Corporate Information Security Officer Information Security Policies and Compliance measurement – simplified? 12:05 02:00 Lunch Event Partners
  • 2. More Information at www.technologysummit.ch 23rd of June 2015 at the PostFinance Arena in Berne Moderation Start End Andreas Wuchner on behalf of SIGS Bob Griffin on behalf of SIGS open Bernhard Tellenbach, Swiss Cyber Storm Peter Berlich, (ISC)2 Bernd Auer, Internet Security Forum (ISF) 02:00 02:30 Information Security Forum (ISF), Prof. Dr. Dirk Loomans „Threat Horizon 2017" 02:40 03:05 Data and Mobility Security Platform Ionic Security, Carlos Scott, Data Security Consultant Start with the Data Security Policy Management AlgoSec, Edy Almer, VP Product Management Hybrid is Here, Security Not Secure Communication Kudelski, Jean-Philippe Aumasson, Principal Cryptographer Secure communication technology: past, present, future Universität Innsbruck, Ass.- Prof. Dr. Ulrike Hugl Humans as security vulnerability! Malicious insider threat as a crucial corporate risk factor Bank Julius Bär & Co. Ltd., Michael Meli, Chief Information Security Officer New CISO - surviving the first 100 days 03:15 03:40 Continuous Network Monitoring Tenable Network Security, Colin West, Sales Engineering Director EMEA Visualizing Insider Activity and Uncovering Insiders Threats Cloud and Data Center Security Trend Micro, Udo Schneider, Security Evangelist DACH Modern Datacenters – “Face the challenges with Security” InfoSec Global (Switzerland) AG, Dr. Tomislav Nad, System Architect & Cryptographer Advances and Trends in Cryptography UBS AG, Stephan Pfirter, Head Information Security Officer of Group Technology The CEO gets it, now you have to deliver... 03:40 04:25 Break 04:25 04:50 Security Policy Orchestration Tufin, Mark Wellins, Vice President of Solutions Microsegmentation vs. legacy concepts – the future of policy orchestration FS-ISAC, John M. Salomon, Director Continental Europe Cyber-Threat Intelligence Sharing: Addressing Evolving Global Security Threats Swisscom IT Services AG, Christof Jungo, Head of Security Architecture & Engineering Collaborative Security Model 05:00 05:20 (ISC)2 , Peter Berlich, Authorized Instructor The Great Cyber Race: Information and cyber security preparedness as seen from the front-lines of practice around the World 05:20 06:00 Podiums Discussion 06:00 open end Networking & Apéro Event Partners