Face evolving Cyber Threats -
be ready for what's coming next

Choose your sessions around real-life security
scenarios and future innovations

Face evolving Cyber Threats – be ready for what’s coming next

Choose your sessions around real-life security scenarios and future innovations

Multi-Cloud, Hybrid Work and many other major shifts in the way we use technology have caused Security Teams to be a major enabler for innovations throughout the business.

As more employees use cloud apps and mobile devices for work, the traditional network security perimeter has lost relevance – this puts greater emphasis on endpoint monitoring and protection – Security needs visibility into all devices, including IoT.

Security Professionals and IT therefore need to find alternative ways to achieve modern security controls and scale through Artificial Intelligence & Machine Learning.

Register for this insightful Cyber Security in practice sessions and get insights from our experts on how to strengthen your company’s security posture and leverage product innovations to address today’s and tomorrow’s threats.

Program1Image

Keynote | Current Trends in Cyberspace

Wednesday June 22nd 2022, 16:30 - 17:15 PM | (GMT+01:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna

Current Trends in Cyberspace

Ann Johnson, Corporate Vice President Security, Compliance & Identity Business Development

The Cyber Threat Landscape continuously evolves as attacks become more sophisticated and frequent. In 2022, there has been a surge in destructive malware, a revival of hacktivism, and increased targeting of critical infrastructure including supply chain, the energy sector and SCADA systems. Join Ann Johnson, renowned cybersecurity expert and thought leader, to learn about the use of cyber-attacks in the Russia/Ukraine conflict, vulnerabilities affecting open source, the current cyber threat landscape and critical trends happening throughout the world.

Register now
Program2Image

Practice Sessions

Thursday June 23rd 2022, 13:00 - 17:45 PM | (GMT+01:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna

13:00 – 13:45 - Innovation Through Security

Based on what you learned about the threat landscape, how does a modern security have to look like to address these threats and in parallel enable and even drive business innovation? Where does Zero Trust fit and what is the role of a modern Security Operating Center?

14:00 – 14:45 - Introduction to Verifiable Credentials

This session explains how we are joining hands with a diverse community to build an open, trustworthy, interoperable, and standards-based Decentralized Identity (DID) solution for individuals and organizations.

15:00 – 15:45 - How cloud permission risks can impact your organization

Nowadays, where multi-cloud scenarios are constantly rising in the market, securing Identities has never been so critical. Lack of visibility can lead to a higher surface attack and exposes companies to very complex and dangerous situations.
A Cloud Infrastructure Entitlement Management (CIEM) solution can provide comprehensive visibility into permissions assigned to all identities – like over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Azure, AWS and GCP. It detects, automatically right-sizes, and continuously monitors unused and excessive permissions.

16:00 – 16:45 - A day in the life of a SOC analyst

This session covers a day in the life of a SOC analyst, including how a SOC team triages alerts, incidents, and the many challenges that arise during the process. The process is compared and contrasted in two scenarios: the first with disparate tools, and the second, with Microsoft 365 Defender.

17:00 – 17:45 - Using External Attack Surface Management (EASM) and Threat Intelligence (TI) to drive a proactive security strategy

In this session we are addressing why is a proactive security approach is required, how a Zero Trust architecture aligns with EASM and TI and what key problems can be solved by leveraging these technologies.

 

Register now
Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image

Program1Image

Program2Image

Program3Image

Program4Image

Program5Image

Program6Image

Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image