Agenda

08.00 - 09.05

Login and Networking

09.05 - 09.10

Chairman's welcome

09.10 - 09.30

► Panel: "Lessons from lockdown"

Frank Bertisch, Head of Group Internal Audit, Coop Group; Fabian Schild, Head of Cyber Defense, Deutsche Apotheker- und Ärztebank

  • Practical security for the work-from-home workforce
  • Cloud and cloud security strategies in the rush to digitalisation
  • Bending the rules for the business: is security learning to be an enabler?
  • Securing the return to work: problems and solutions
09.30 - 09.50

► The Threat Hunting Challenge: Detect, Prevent, Respond and Hunt - Every Second, Every Day

Jan Tietze, Director Security Strategy EMEA, SentinelOne

  • Learn how Endpoint Detection & Response (EDR) technologies pick up where antivirus technologies leave off
  • Understand why EDR should be an essential part in every Endpoint Security Strategy
  • Learn how EDR auto-immunizes the endpoints against newly discovered threats and provides rich forensic data, mitigate threats and performs network isolation
  • Demo
09.50 - 10.10

► How to Keep Business Continuity and Control Costs in Turbulent Times

Julian Totzek-Hallhuber, Principal Solutions Architect, Veracode

Join this session to learn more about:

  • Leveraging the cloud so that you can begin securing your applications right away
  • How cloud-based solutions can boost collaboration and productivity for remote teams
  • The benefits of Veracode’s SaaS products, including minimal to no installation
  • Scaling up, scaling down, and saving money with easy integration into your SDLC
10.10 - 10.30

► Doing more with less: surviving with limited cybersecurity resources in abnormal times

Adam Drabik, Former CISO, Opel Vauxhall Finance

  • How to cope with staff shortages and hiring pauses without adversely affecting your cybersecurity strategy 
  • Are your old cybersecurity processes still relevant? Reviewing and streamlining your processes for remote working. 
  • Adopting the necessary collaborative tools when operating remotely, on a budget.
  • Outsourcing vs. in-house cybersecurity operations. What are the pros and cons of switching tactics?
10.30 - 11.00

 Education Seminar Session 1

Delegates will be able to choose from the following education seminars:

  • Engaging End Users in Phishing Defence – Are your Teams Combat Ready? - Andy Spencer, VP Sales Engineering, Cofense & Ian Wallace, Sales Engineer DACH, Cofense
  • Ransomware’s Evolution from blunt tool to sophisticated weapon - Israel Barak, Chief Information Security Officer, Cybereason
11.00 - 11.30

Networking break

11.30 - 11.50

► Cybersecurity and the Home Office

Florian Stahl, Team Manager Security Method & Testing, AVL

  • Home office cybersecurity challenges
  • Organizational measures (guidelines, employee training, ...)
  • Technical measures (VPN, encryption, secure video conference tools..)
11.50 - 12.10

► NextGen Networks and Security - What does it look like?

Sergej Epp, Chief Security Officer, Palo Alto Networks

  • What are the lessons learned with legacy networks, connectivity, and network security?
  • Why does network security matter in times of encrypted traffic and decentralization?
  • What are the indigents for the third generation networks?
  • What does the convergence between security and networks look like for mobile users, BYOD, branches, and connected cars?
12.10 - 12.30

►Stopping Breaches Faster: Can you meet the 1/10/60 Minute Challenge?

David Weber, Enterprise Sales Engineer DACH, CrowdStrike

  • 1 Minute: Time to Detection — organizations should set a goal of allowing only one minute to detect an incident or intrusion (automated).
  • 10 Minutes: Time to Investigation — the length of time it takes to find out if the incident is legitimate and determine next steps (containment, remediation, etc.)
  • 60 Minutes: Time to Remediation — the period of time needed to eject the intruder and contain the initial threat.​
12.30 - 12.50

►The Human Factor – your people as last line of defense

Henning Hanke, Solutions Specialist Security Awareness Training, DACH at Proofpoint

  • Threat landscape and threat actors 2020
  • Security awareness – not just knowledge transfer but behavioural change
  • Cybersecurity and the human factor = more than the sum of its parts​
12.50 - 13.20

 Education Seminar Session 2

Delegates will be able to choose from the following education seminars:

  • Demystifying The Hunt: How to Assess Threat Hunting Readiness and Prepare for the Next Step? - Achim Kraus, Solutions Engineering CEEUR, Corelight Inc.
  • COVID-19, remote working and e-commerce: how are companies adapting to the evolving cybersecurity challenges? - Frank Augenstein, Senior Sales Engineer, Tripwire
13.20 - 14.20

Lunch and networking break

14.20 - 14.40

► Panel: "Data protection for the New Normal"

Dr. Steffen Beutlich, Data Protection Expert, DB Vertrieb GmbH; Dr. Matthias Orthwein, Partner, SKW Schwarz Rechtsanwälte

  • Protecting data, exploiting data: the business challenge of data protection
  • Managing multi-country compliance
  • Employee surveillance and data privacy challenges in the new normal
14.40 - 15.00

► Building an effective training program for your cyber-pros

Rupert Collier, Director of Sales – EMEA, RangeForce

  • Learn cutting-edge training technologies and strategies for security team leaders
  • Overcome limited budgets, time, as well as train in place requirements
  • Discover the latest advances in interactive computer-based training, advanced simulation, and cyber range exercises
15.00 - 15.20

► App Security to Defend Your Online Business from Automated Attacks

Mario van Riesen, Major Account Manager DACH, Shape Security

  • Discover how cybercriminals circumvent traditional protections such as CAPTCHA and MFA
  • Explore the fraud losses and security risks associated with automated application attacks
  • Understand how to separate fake users from real customers without degrading the user experience
  • Increase digital engagement and improve conversion rates 
15.20 - 15.50

 Education Seminar Session 3

Delegates will be able to choose from the following education seminars:

  • Empower Your Employees to Work Securely and Efficiently From Home - Daniel Gordon, Senior Solutions Engineer, DACH, OneLogin
  • Next Generation Offensive Security Testing - Thomas Hornung, Solution Architect EMEA, Synack & Stephan Rosche, Sales Director DACH Region, Synack
15.50 - 16.10

Networking break

16.10 - 16.30

► Communicating a (confirmed) data breach in the right way

Branko Džakula, CISO, Kaia Health

  • Overview of top threats resulting in recorded data breaches
  • Where did big players fail in communication?
  • How to communicate a data breach in the right way
  • Crisis Management – prepare for the worst case scenario
16.30 - 16.50

► "Lock down = lock up?"

Henrik Becker, Lawyer, Kanzlei Becker

  • Home office and remote working - changes from the perspective of a risk and compliance manager
  • The value of personal conversations
  • Detection of risks and misconduct without visual contact
  • Practical recommendations
16.50 - 17.00

Closing remarks

17.00 - 17.30

Networking

17.30

Conference close

Education seminars


Next Generation Offensive Security Testing


Thomas Hornung, Solution Architect EMEA, Synack & Stephan Rosche, Sales Director DACH Region, Synack 

The noise within security circles has become overwhelming, making it difficult to focus on what is real. Traditional pen testing is no longer an option so organizations are leaning on crowdsourced security testing as a proactive means of identifying sources of risk and building trust with customers, all while operating remotely.

In this session you’ll learn:

  • About a revolutionary security testing approach using teams of highly vetted, top-class security researchers who can find serious vulnerabilities in any live system often within a matter of hours. 
  • How Synack's remote security testing platform can help augment your internal teams now.
  • Of a number of use cases and POCs performed at customers across EMEA

Engaging End Users in Phishing Defence – Are your Teams Combat Ready?


Andy Spencer, VP Sales Engineering, Cofense & Ian Wallace, Sales Engineer DACH, Cofense 

As the world locked down to mitigate the risks of COVID-19, many employees are still adjusting to working from home, and companies like yours are working hard to support it. However, organizations cannot completely lock down their networks. For example, phishing emails continue to evade Secure Email Gateways, with threat actors adapting their tactics to exploit the ongoing crisis. Businesses are threatened by a surge of phish related to COVID-19 and remote work. Listen in as Cofense security experts Andy Spencer and Ian Walllace provide an in-depth review of the current phishing threat landscape, as seen through the inboxes and eyes of those on the front line – your end users, the new face of your front-line phishing defence.                                    

Highlights will include:

  • Insights of various phishing campaigns that evaded SEGs and reached enterprise end users, delivering credential phish and malware.
  • How threat actors are using trusted services, such as online business surveys and document sharing platforms, to evade SEGs.
  • Expert predictions of what we will continue to see through the end of Q2 and the remainder of 2020.

Demystifying The Hunt: How to Assess Threat Hunting Readiness and Prepare for the Next Step?


Achim Kraus, Solutions Engineering CEEUR, Corelight Inc. 

  • Many organizations want to threat hunt, but don’t know where to begin, how to measure success, or how to scale an effective program. 
  • The bar to successful hunting can appear intimidatingly high, reachable by only the most sophisticated, well-staffed SOCs, 
  • The reality is that one individual, with the right data and some directional guidance, can begin their hunting journey today, making immediate security contributions to their organization.
  • We discuss the threat hunting maturity model based on real world examples and best practices - what works & is doable, what is hard to achieve, what’s your next best move.

Ransomware’s Evolution from blunt tool to sophisticated weapon


Israel Barak, Chief Information Security Officer, Cybereason

Though ransomware attacks dropped significantly in early 2018, they have re-emerged with a vengeance with new features that make them much more dangerous.

  • In December 2019 the average ransom payout to an attacker was over $80,000
  • What once was a blunt instrument of damage is now a campaign-style piece of malware
  • Learn about evolving ransomware attacks in real-world environments
  • Understand how new capabilities make ransomware more sophisticated than ever

Empower Your Employees to Work Securely and Efficiently From Home


Daniel Gordon, Senior Solutions Engineer - DACH, OneLogin

Empower Your Employees to Work Securely and Efficiently From Home
Over the past couple of decades we have seen the number of employees that work from home increase dramatically. Today, due to COVID-19 quarantine policies around the globe, many companies are faced with a new paradigm—employees must work from home for an undefined period of time. This change in work brings challenges along, including controlling corporate data, managing security threats, and accessing applications in a hybrid environment. 

Join Daniel Gordon, Senior Solutions Engineer - DACH, OneLogin, for his session Empower Your Employees to Work Securely and Efficiently From Home. During this discussion you'll learn how to:

  • Adjust to a sudden 100% remote workforce
  • Provide easy, secure access to business systems
  • Give employees multiple ways to communicate effectively and efficiently
  • Ensure Device Trust and Safety Flexible Authentication Policies

COVID-19, remote working and e-commerce: how are companies adapting to the evolving cybersecurity challenges?


Frank Augenstein, Senior Sales Engineer, Tripwire

Security teams are at the forefront of protecting the distributed enterprise. Cybersecurity must be integrated into COVID-driven business responses such as the shift to working from home, migratijng to e-commerce, and massively scaling delivery logistics. To learn more about how security professionals are dealing with the rapidly evolving environment, Tripwire has conducted some detailed research and we’d like to share some of the fascinating results in this session. Including:

  • Emerging trends across regions, company size and job levels on how COVID-19 has impacted companies. 
  • What are companies' biggest security concerns?
  • What steps are being taken to reduce the impact of COVID-19 on their organisation’s cybersecurity defences. 
  • What technologies are available to assist with maintaining security in the new working environment​