Agenda
08:00 - 08:50 |
Breakfast & Networking Break |
08:50 - 09:00 |
Chairman's Welcome |
09:00 - 09:20 |
►Why third party risk management is much more important than you think Guillaume de Benoit, Head of Information Security Operations, Caisse des Médecins
|
09:20 - 09:40 |
►Knowing how an attacker thinks puts you one step ahead! Dominic Haussmann, Specialist Solutions Engineer - Zero Trust, Cloudflare
|
09:40 - 10:00 |
►What’s the chef doing in the treasure chamber? Stephan Habegger, Enterprise Sales Executive, Akamai
|
10:00 - 10:20 |
►Adapting Your Security Strategy with the Rise of SaaS Solutions Hélène Mourgue d’Algue, Chief Information Officer (CIO) and Head of Information Systems & Digital Technology, City of Bienne
|
10:20 - 11:00 |
►Education Seminars Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
►Encryption in the Cloud: Safeguard or expensive Security Theater? Klaus Haller, Senior IT Security Architect, AXA
|
11:50 - 12:10 |
►Cyberattacks are here to stay. Are you? Gary Adams, Solutions Consulting Manager, Rubrik
|
12:10 - 12:30 |
►UTOPIA: Technology for creating private and sovereign clouds that are immune to cyber attacks Jan Camenisch, CTO, DFINITY Foundation
|
12:30 - 12:50 |
►How to Protect People and Defend Data in the Age of Generative AI Tom Kretzschmar, Sales Engineer, Proofpoint
|
12:50 - 13:30 |
►Education Seminars Session 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch & Networking Break |
14:30 - 15:00 |
►Panel discussion: Legal Requirements for Swiss Organizations within the European and Swiss Regulatory Frameworks Juan Carlos Lopez Ruggiero, CISO, Enotrac (Moderator)
|
15:00 - 15:20 |
►Protecting Service Accounts - Are Safeguarding Non-Human Identities with High Privileges a Luxury or a Critical Necessity? Dr. Shahriar Daneshjoo, VP Sales - EMEA Central, Silverfort
|
15:20 - 15:40 |
►From Risk Management to Ransomware Mitigation: Enhancing Supply Chain Security with SOCRadar Ali Marwani, Senior Solutions Engineer, SOCRadar
|
15:40 - 16:20 |
►Education Seminars Session 3 Delegates will be able to choose from the following education seminars:
|
16:20 - 16:40 |
Networking Break |
16:40 - 17:10 |
►CISO daily challenges: Simon Brady, Managing Editor & Event Chairman, AKJ Associates (Moderator)
|
17:10 - 17:30 |
► LIVE DEMONSTRATION: Weaponising AI: The Deep Fake Central Banking Heist Manit Sahib, Ethical Hacker, The Global Fund
|
17:30 - 17:35 |
Chairs Closing Remarks |
Education seminars
We need to talk about security in our containerized workloads
Jain Joseph, Solutions Architect, SUSE
In this session you will learn how you can secure your container workloads with modern security tools that give you peace of mind. Let's also talk about Zero Trust and why it is so important.
Attendees will learn:
- Why our standard tools are not enough
- Containerized workloads and security concerns
- Protecting your modern workloads
Why Identity Alone Is Not Enough for a Zero Trust Strategy
Frank Barthel, Manager Solutions Engineering DACH, Netskope
- The new reality of living in a hyperconnected online world requires a new approach to security, where multiple elements must be taken into account, besides simply blocking/allowing access to a specific service or the user identity to enforcing granular permissions.
- Learn why the context is important to enforce a granular and effective security policy.
- Discover which are the elements that must be considered, besides identity, to adopt an effective zero trust strategy
- Understand how the different security controls, such as data protection, threat protection, behaviour analytics, cooperate to protect the modern enterprise.
It Started with a Cookie: Zero Trust and the Rise of Session Hijacking
Mandeep Sandhu, Systems Engineering and Investigations Manager, EMEA, SpyCloud
Neill Cooper, Vice President of EMEA, SpyCloud
Learn how to go beyond traditional credential monitoring and implement continuous Zero Trust using enriched cybercrime telemetry
Attendees will learn:
- What security teams can learn from recent high-profile breaches where cybercriminals leveraged stolen session cookies in targeted attacks
- Why it’s important to feed your Zero Trust policy engine with cybercrime telemetry for continuous exposure monitoring and reduced risk of session hijacking
- How cybercrime telemetry aligns with popular compliance and risk management frameworks, including DORA, NIS2, and NIST CSF
- How SpyCloud integrates with your existing security tools for automated identity exposure remediation
The attacker’s POV: How to build the right continuous threat exposure management (CTEM) program to reduce risk
Matt Baird, Lead Solutions Architect, CyberProof, a UST company
Today’s cybersecurity leaders are under constant pressure to demonstrate their ability to manage risks effectively. With threats constantly evolving, companies need dynamic strategies to mitigate risks, especially in the cloud. This session will explore how CISOs can use Cyber Threat Exposure Management (CTEM) to stay ahead of threats and maintain strong security by analysing attack methods and threat actor behaviour.
The only way security practitioners can effectively manage the ever-changing threat landscape and maximize defensive strategies is by leveraging automation, orchestration, and continuous, evidence-based validation of the tools and technologies deployed in their enterprise environment. Effective threat management must be an ongoing, continuous, and integrated service, not just a one-time analysis or isolated mitigation effort.
Attendees will learn:
Generating an effective organizational threat profile
• Identifying the threat actors and adversarial TTPs that pose the greatest risk to your organization
• Understanding the business and security risks of threat exposure
• Gathering meaningful metrics to develop the business case for enhanced cybersecurity
• Developing a threat management program that is continuous, efficient, and proactive
Take a proactive approach to ransomware mitigation!
Joël Giger, Intelligence Consultant, Recorded Future
With its staggering rise in attacks and its devastating consequences, ransomware is no longer just a security problem; it is now a business problem and needs a proactive approach.
Attendees will learn:
- Recent trends in ransomware activity across the region
- How intelligence can help prevent or mitigate ransomware attacks
- How monitoring ransomware leak sites can provide an early warning of potential data leakage
- Why a holistic approach is required to meet the challenges
Hunting Threats and Adversaries: News and best practices from the front lines of Cyber Defense
Philipp Wachinger, Sales Engineer, CrowdStrike
- Find out about significant adversary activity and their preferred targets and attack vectors in the last 12 months
- Learn about and from real incidents observed by CrowdStrike’s Counter-Adversary-Operations Team
- Take away practical insights in how you can protect against modern adversaries and their TTPs.
- Never forget the 5 key steps to be prepared