A year for living dangerously

16th e-Crime & Cybersecurity DACH: Virtual Edition
14th January 2021

Digitalisation is not optional; the Cloud is unavoidable; business transformation is survival. Can CISOs maintain control?

The judgement of the Court of Justice of the European Union Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems (Schrems II) is a wake-up call. Max Schrems’ privacy group, Noyb, has already filed 101 complaints with regulators across all EU member states against companies with major European websites using code from Facebook or Google, both of which transfer data to the U.S. for processing. And in the first sign of major action from an EU regulator, the Irish DPC has sent Facebook a preliminary order to suspend data transfers to the U.S.

Facebook has responded that if standard contractual clauses (SCCs) cannot be used for data transfers then “in the worst case scenario, this could mean that a small tech start up in Germany would no longer be able to use a US-based cloud provider. A Spanish product development company could no longer be able to run an operation across multiple time zones. A French retailer may find they can no longer maintain a call centre in Morocco.”

But as businesses are effectively forced into the Cloud by WFH, COVID-driven digitalisation and the broader expectations of customers used to dealing with the FANG five giants, questions of cybersecurity and privacy are pushed to the fore. The nature of cybersecurity, how much control businesses have in choosing levels of cyberrisk to accept, and the extent to which in-house CISOs and on-premise security are relevant to the overall security posture of large companies, are up for debate.

According to Verizon’s DBIR this year, Cloud assets were involved in 24% of breaches this year, with applications a key issue. 40+% of those breaches came from web apps, rapidly overtaking desktop as the top source of breach. These and other third-party vendors present a real and growing problem for organizations in terms of visibility, complexity and security.

And basic asset management is still a problem. According to the DBIR, half of all companies are present on seven or more networks. Yet getting visibility into your entire asset footprint and understanding your extended attack surface is crucial.

So 2021 will be the year in which companies must come to terms with their new digital infrastructures, break down silos, increase visibility and get a grip on Cloud, SaaS and other third-party security challenges.

 

The 16th e-Crime & Cybersecurity DACH will take place online and will look at how cybersecurity teams, risk management functions and boards are tackling the key issues. As digitalisation goes critical, is this finally the moment at which traditional cybersecurity management has to change?

  • Cybersecurity for business resilience

    • Forced, rapid digitalisation has revealed the fragmented nature of many security programmes
    • Protecting the business while enabling innovation and flexibility requires new models and approaches for cyber
    • Are automation and orchestration the answer?
  • Strengthening identity and access management

    • IDAM is still the Achilles heel of many organisations
    • Remote working has thrown a spotlight on IDAM policies and the technologies that can help overstretched cybersecurity professionals tighten up
    • What have we learned from the past few months? Have any solutions or strategies proved their superiority?
  • Securing the citizen

    • The COVID era demands unprecendented levels of citizen engagement
    • The systems required to provide safety create a huge data security and privacy challenge for both governments and employers
    • Are compromises inevitable? How can this critical data best be kept safe?
  • Building in security: easier said than done?

    • As businesses ramp up their digital business models, it's critical that they build security in from the beginning
    • But given the speed at which businesses are having to transform, that's a big ask. Even pre-coronavirus, security teams often found it hard to gain leverage over the business
    • How can cybersecurity teams ensure digital transformation and innovation are done securely?
    • Is this a CIO vs CISO battle?
  • Securing the workplace revolution

    • Lockdowns and the extremes of WFH will end, but the cost, productivity, work-life balance and carbon benefits of remote working mean it's here to stay.
    • As flexible working becomes the norm, new hardware, software and processes will need to be implemented across all areas of the business.
    • Many initial measures put in place were intended as a short-term stopgap. What new long-term security measures are required by a permanent change to working patterns?
  • What to do about ransomware?

    • Ransomware has come a long way from 'spray and pray' phishing emails and website popups
    • What are the focused, sophisticated methods organised criminals are now using to get a better ROI for their efforts?
    • How should CISOs respond? Is the answer better security - or just better backup and recovery solutions?
  • Securing digital currencies

    • The move towards cashless payment methods during the crisis has been extreme, and looks like it may be irreversible
    • Many more governments are now looking at developing their own digital currencies
    • How do we go about securing a world in which most - perhaps all - payments are digital?

Who Attends

Job Titles

Chief BISO
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
Chief Security & Privacy Officer
CISO
CISO/CTO
Director
Director Cyber Defense & CERT
Director Data Privacy
Director Security Risk & Compliance
Director Global Security Investigations
Director Information Security
Director, CRISC
Head of Security & Governance
Head of Compliance
Head of Corporate Data Protection
Head of Cyber
Head of Cyber Security
Head of Cyber Threat Response
Manager Information Security
Head of I.T.
Head of I.T. Security
Head of Information Security
Head of Information Security
Head of Internal Audit
Head of IT / Operations
Head of IT Security
Head of IT-Security
Head of Legal Data Privacy
Head of Penetration Testing
Head of I.T. Security
Head of Security
Head of Security Management
Head PCI Compliance
VP Cyber Security & Defence
Vice President, Threat Intelligence
VP Credit & Fraud
VP Crisis & Emergency Management
ASIC Operations
BISO
Cards Security Manager
CERT
COO Data Protection Programme
Corporate Audit
Head of Methods, Projects, IT
Corporate Security Awareness Manager
Counsel, Privacy & Information Law
Country Security Officer
CTO Security & Risk
CTSO
Fraud & Risk Manager
GAMA Business Task Force
Global Head of Data Protection
Global IT - Information Security
Global IT Manager
Group Data Protection Commissioner
Group Information Security Officer
Group Lead Active Defense Center
Information Security Manager
Information Security Manager
Information Security Manager
Information Security Manager
Information Security Manager
IT Security Manager
IT Security Manager
IT Security Research Engineer
Global IT Security & Compliance
Global IT Security & Compliance
IT Spezialist, WAN und Zugang
ITM Global Information Security
Lawyer
Lawyer
Leiter Informationssicherheit CISO
Leiter Unternehmenssicherheit
Local Data Security Officer
Manager Compliance
Manager Fraud Prevention
Operational Security Officer
Partner
Partner
IT Infrastructure Vice President
Security Fraud Manager
Security Manager
Security Manager, CISSP
Senior Alliance & BD Manager
Senior Manager Internal Audit
Senior Enterprise Security Manager
Senior I.T. Auditor
Senior Information Security Manager
Senior Information Security Manager
Senior Internal Auditor
Senior IT Auditor
Senior Manager
Senior Manager, Products & Innovation
Senior Project Manager (Infocontrol)
Senior Ref NGN
Senior Researcher
Senior Risk Manager
Senior Security Consultant
Senior Security Expert
Senior Security Product Manager
Senior Security Professional
Senior Security Specialist
Senior Security Specialist
Cyber Crime Investigations
Service & Contract Manager
Software Development Engineer
Specialist Security
SR IT Security Consultant
I.T. Security & Compliance Manager
System Analyst
Systemadministrator / CISO
GAMA Business Task Force
Team manager IT Security Operations
Teamleader I.T. Infrastructure
TORM & Financial Crime

Companies

Deutsche Bank Group
Deutsche Post
GE Capital
NYSE Euronext
Vodafone
Merck & Co
Audi
Deutsche Bank Group
Deutsche Telekom
First Data Merchant Solutions
First Data Merchant Solutions
American Express
Tech Data
SAP
BT
Allianz
Otto Group
Marsh
Airbus
Deutsche Bank Group
Daimler
Hengeler Mueller
Commerzbank
Eurostar
Quipu
Nintendo
Triodos Bank
Wirecard Bank
Lanxess AG
Siemens
Deutsche Telekom
Federal Office for Information Security
Commerzbank
Bank Verlag
Six-Group
Atos
Citigroup
Elavon Merchant Services
Deutsche Telekom
Allianz
Citigroup
BP
Commerzbank
UBS
MAN SE
BMW
Vodafone
Field Fisher Waterhouse LLP
Vattenfall AB
Deutsche Bank Group
Vodafone
Sofort
Deutsche Bank Group
Allianz
Adidas
Adidas
Deutsche Lufthansa
Citigroup
Commerzbank
KfW Bankengruppe
DZ Bank
Oce
Teradata
AXA
Deutsche Bundesbank
KfW Bankengruppe
Airbus
Adidas
E.ON
BMW
Daimler
Postbank P.O.S. Transact
Osborne Clarke
RWE Group
DZ Bank
Robert Bosch
Adidas
DZ Bank
E.ON
Osborne Clarke
Baker & McKenzie LLP
Deutsche Bank Group
Q8 Kuwait Petroleum
Siemens
Vodafone
Research in Motion
Nintendo
Adidas
Commerzbank
Deutsche Post
DHL
Mondi
DHL
ThyssenKrupp AG
Deutsche Telekom
BP
Deutsche Telekom
UBS
Postbank P.O.S. Transact
BT
Deutsche Telekom
Research in Motion
Triodos Bank
Deutsche Post
Tech Data
American Express
COLT Technology Services
Nintendo
COLT Technology Services
Deutsche Bank Group
Deutsche Post
Citigroup
BNP Paribas
Deutsche Bank Group
Deutsche Bundesbank
SCOR
Santander

Industries

Banking
Communications
Electronics
Finance
Telecoms
Other
Automotive
Banking
Telecommunications
Technology
Technology
Finance
Technology
Technology
Communications
Life Insurance
Retail
Insurance
Manufacturing
Banking
Auto Manufacturing
Law Firm
Banking
Transportation
Finance
Entertainment
Banking
Banking
Real Estate
Technology
Telecommunications
Government
Banking
Banking
Finance
Technology
Finance
Finance
Telecommunications
Life Insurance
Finance
Energy
Banking
Finance
Transportation
Manufacturing
Telecoms
Law Firm
Energy
Banking
Telecoms
Other
Banking
Life Insurance
consumer products
Consumer Products
Transportation
Finance
Banking
Banking
Banking
Electronics
Technology
Life Insurance
Banking
Banking
Manufacturing
consumer products
Energy
Manufacturing
Auto Manufacturing
Banking
Law Firm
Energy
Banking
Manufacturing
consumer products
Banking
Energy
Law Firm
Law Firm
Banking
Energy
Technology
Telecoms
Technology
Entertainment
consumer products
Banking
Communications
Transportation
Other
Transportation
Law Firm
Telecommunications
Energy
Telecommunications
Finance
Banking
Communications
Telecommunications
Technology
Banking
Communications
Technology
Finance
Telecommunications
Entertainment
Telecommunications
Banking
Communications
Finance
Finance
Banking
Banking
Insurance
Banking