10:45 – 12:00 CrowdStrike – Technical Workshop
12:00 – 13:00 Welcome and buffet lunch
13:00 – 13:40 Introduction & Secure Blueprint
Presenter: Philippe Borloz — Vice President – EMEA Sales & Martin Dion — Vice President EMEA Delivery
13:40 – 14:20 The art of deception
Presenter: Uli Peled — Regional Manager
When advanced attackers compromise a network, they relentlessly advance towards a clearly defined target. To reach their goal, these persistent, highly skilled attackers repeatedly collect data, analyze it, and use it to move laterally. Deception technology is the most effective way to detect advanced attackers early as it uses their own persistence and iterative tactics against them. Using fake information such as user-credentials, servers, and websites, you can detect attackers before they reach sensitive data. To remain one step ahead, state-of-the-art, network-optimized deceptions automatically and dynamically construct a deceptive layer over your entire network, with zero IT footprint and no agents installed. By constantly creating an environment where attackers cannot tell real information from fake information, deceptions ensure that the data attackers collect is always unreliable. And if attackers cannot rely on collected data, they cannot proceed and the attack is neutralized.
14:20 – 15:00 Threats are evolving. A new approach to cybersecurity is required
Presenter: Stefan Schweizer — Sales Manager
It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.
TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:
• Advanced machine analytics, which are key to discovering potential threats quickly.
• Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.
Key take aways:
• Determine if your spending is focused on the right areas.
• Understand how to prevent high-impact cyber incidents.
• Discover how can you lower your TCO and maximise the ROI of your security technology.
15:00 – 15:20 Coffee break & demo
15:20 – 15:40 Swiss Threat Landscape – A security operations view
Presenter: Olivier Spielmann — Director EMEA MSS Operations
This presentation will provide an overview of the Swiss threat landscape in 2017 as seen from a Security Operations point of view. Some real threat examples will be presented in perspective with the current exposure as well as typical mitigations paths that could be followed.
15:40 – 16:20 Identity governance & administration of applications, structured & unstructured data
Presenter: Jérôme Treyssac — Territory Manager
Managing access to information systems and company data is becoming more and more critical, as evidenced by recent events.
The goal of this event is to present SailPoint’s vision as the leader in their field, and to introduce you to their innovative solutions which enable businesses to meet these challenges as well as giving management the visibility and control over who has access to what information, who does what within the information system, whether they are compliant with security policies and, of course, whether they can show this in the event of an audit.
16:20 – 17:00 Why using intelligence is crucial for your business
Presenter: Rob Rentenaar — Partner Manager
Synopsis: In this session, you will learn the importance of Intelligence in preventing your environment. We will present how to identify Threat Actors at play and how you can operationalise this data into your environment effectively.
We will offer real-world strategic insight into the current threat landscape, offering practical tips on how you can utilise intelligence to protect your organisation.
17:00 – 18:30 Cocktail & Networking