Cyber Summit - Latest Insights and Emerging Technologies - Zürich

Cyber Summit - Latest Insights and Emerging Technologies - Zürich

By Kudelski Security

Date and time

Thursday, March 22, 2018 · 12 - 6:30pm CET

Location

Sheraton Zurich Hotel

100 Pfingstweidstrasse 8005 Zürich Switzerland

Description

Kudelski Security Cyber Summit - Latest Insights and Emerging Technologies

This year we are kicking off 2018 with our new Cyber Summit Latest Insights and Emerging Technologies’ in Zürich on the 22nd March 2018, wherein we bring you the latest insights to ensure that you can tackle cyber challenges.

Join us for an afternoon filled with the latest in:

  • Next-generation endpoint protection & SOC services
  • OT (operational technology) & ICS (industrial control systems) network protection
  • Incident response
  • Information security awareness & training

A networking lunch and cocktail are included.

* Press, marketing agencies, as well as IT & IT security resellers, are not authorized to take part in this event


Kudelski Security-Cyber-Summit: Neueste Erkenntnisse und Technologien

Das Jahr 2018 beginnen wir mit unserem neuen Cyber-Summit „Neueste Erkenntnisse und Technologien“ am 22. März 2018 in Zürich. Hier erhalten Sie Einblick in die neuesten Entwicklungen, damit Sie heutige Cyberbedrohungen zuverlässig abwehren können.

An diesem gemeinsamen Nachmittag stellen wir Ihnen die neuesten in:

  • Next-generation endpoint protection & SOC services
  • OT (operational technology) & ICS (industrial control systems) network protection
  • Incident response
  • Information security awareness & training


Wir schließen den Summit mit einem gemeinsamen Networking-Cocktail ab.

* Presse, Marketingagenturen und IT, sowie IT Sicherheitsverkäufer dürfen an diesem Event nicht teilnehmen



AGENDA

12:00 - 13:00 Welcome and buffet lunch

13:00 - 13:10 Introduction
Presenter: Philippe Borloz — Vice President - EMEA
Kudelski Security

13:10 - 13:50 The art of deception
Presenter: Udi Peled — Regional Director
Illusive Networks

When advanced attackers compromise a network, they relentlessly advance towards a clearly defined target. To reach their goal, these persistent, highly skilled attackers repeatedly collect data, analyze it, and use it to move laterally. Deception technology is the most effective way to detect advanced attackers early as it uses their own persistence and iterative tactics against them. Using fake information such as user-credentials, servers, and websites, you can detect attackers before they reach sensitive data. To remain one step ahead, state-of-the-art, network-optimized deceptions automatically and dynamically construct a deceptive layer over your entire network, with zero IT footprint and no agents installed. By constantly creating an environment where attackers cannot tell real information from fake information, deceptions ensure that the data attackers collect is always unreliable. And if attackers cannot rely on collected data, they cannot proceed and the attack is neutralized.

13:50 - 14:30 Threats are evolving. A new approach to cybersecurity is required
Presenter: Stefan Schweizer — Sales Manager
LogRhythm

It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.


TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:
• Advanced machine analytics, which are key to discovering potential threats quickly.
• Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.

Key take aways:
• Determine if your spending is focused on the right areas.
• Understand how to prevent high-impact cyber incidents.
• Discover how can you lower your TCO and maximise the ROI of your security technology.

14:30 - 15:00 Incident Response Panel Discussion

15:00 – 15:20 Coffee Break

15:20 – 15:40 The rise of auto-spreading Ransomware
Presenter: Omar Benjumea — Cybersecurity Architect
Kudelski Security

WannaCry, Notpetya or BadRabbit were the first examples of worm-style ransomware which affected organizations all over the world and used advanced lateral movement techniques to enable its spread. In this presentation we will look into why and how this happened. Furthermore, we will discuss key controls one should consider in order to successfully protecting organizations from future similar incidents.


15:40 – 16:20 The business case for innovative industrial cybersecurity
Presenter: Colin Blou — Vice President of Sales
Claroty

Most industrial C-suite and board-level executives have concerns about cyber threats targeting their organizations, but frequently don’t know what to ask or how to measure the cyber risk to their organization. Over 62% will turn to the CIO or Chief Information Security Officer to gauge the security of their industrial control environment. However, IT typically helps Operations Technology (OT) and plant engineering organizations most with perimeter defenses and tracking software licenses. The challenge at the top is to be sure that an adequate level of security is in place for operational assets without disrupting production, which will disrupt the bottom line.

Claroty will present the business case and innovative approach for securing your industrial control systems (ICS) and lessons learned from global customer settings:

• Key challenges – some, not all technology-driven

• Organizational decisions needed for best efficiency as well as securing ICS

• How extreme visibility into networks and assets solves multiple requirements

• What to ask your operations teams about securing remote access – 3rd parties, employees, etc


16:20 – 17:00 The evolving market of Endpoint Protection: Is there a silver bullet?
Presenter: Chris Meidering — Senior Sales Manager
CrowdStrike

The Endpoint Security market is changing rapidly from reactive to pro-active, driven by the increased number of attacks. How can you optimal protect and manage your environment?

What elements are crucial in protecting your infrastructure, who are the threat actors, what’s their goal and motivation? Do you know that just 34% of all attacks is coming from Malware? How to protect against the other 66%?

Learn about the various functions of Endpoint Security and receive guidance on how you can implement these based on your organization’s resources and the threats you face.

17:00 – 18:30 Networking Cocktail

Organized by

Sales Ended