Kudelski Security Cyber Summit – 3rd Edition

At the beginning of 2017, Kudelski Security hosted the first edition of their Cyber Summits in Geneva and Zürich which focuses on the cybersecurity landscape.

This 30th of November, Kudelski Security, in partnership with The Ortus Club, is inviting you to the third edition of their Cyber Summit. Join us for a technical workshop in the morning delivered by Crowdstrike and an afternoon filled with insights into the latest capabilities and techniques that better defend you against the ever-changing cybersecurity landscape.

AGENDA

10:45 – 12:00 CrowdStrike – Technical Workshop

12:00 – 13:00 Welcome and buffet lunch

13:00 – 13:40 Introduction & Secure Blueprint
Presenter: Philippe Borloz — Vice President – EMEA Sales & Martin Dion — Vice President EMEA Delivery
Kudelski Security

13:40 – 14:20 The art of deception

Presenter: Uli Peled — Regional Manager
Illusive Networks

When advanced attackers compromise a network, they relentlessly advance towards a clearly defined target. To reach their goal, these persistent, highly skilled attackers repeatedly collect data, analyze it, and use it to move laterally. Deception technology is the most effective way to detect advanced attackers early as it uses their own persistence and iterative tactics against them. Using fake information such as user-credentials, servers, and websites, you can detect attackers before they reach sensitive data. To remain one step ahead, state-of-the-art, network-optimized deceptions automatically and dynamically construct a deceptive layer over your entire network, with zero IT footprint and no agents installed. By constantly creating an environment where attackers cannot tell real information from fake information, deceptions ensure that the data attackers collect is always unreliable. And if attackers cannot rely on collected data, they cannot proceed and the attack is neutralized.

14:20 – 15:00 Threats are evolving. A new approach to cybersecurity is required 
Presenter: Stefan Schweizer — Sales Manager
LogRhythm

It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.

TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:
• Advanced machine analytics, which are key to discovering potential threats quickly.
• Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.

Key take aways:
• Determine if your spending is focused on the right areas.
• Understand how to prevent high-impact cyber incidents.
• Discover how can you lower your TCO and maximise the ROI of your security technology.

15:00 – 15:20 Coffee break & demo

15:20 – 15:40 Swiss Threat Landscape – A security operations view
Presenter: Olivier Spielmann — Director EMEA MSS Operations
Kudelski Security

This presentation will provide an overview of the Swiss threat landscape in 2017 as seen from a Security Operations point of view. Some real threat examples will be presented in perspective with the current exposure as well as typical mitigations paths that could be followed.

 

15:40 – 16:20 Identity governance & administration of applications, structured & unstructured data 
Presenter: Jérôme Treyssac — Territory Manager
SailPoint

Managing access to information systems and company data is becoming more and more critical, as evidenced by recent events.

The goal of this event is to present SailPoint’s vision as the leader in their field, and to introduce you to their innovative solutions which enable businesses to meet these challenges as well as giving management the visibility and control over who has access to what information, who does what within the information system, whether they are compliant with security policies and, of course, whether they can show this in the event of an audit.

 

16:20 – 17:00 Why using intelligence is crucial for your business

Presenter: Rob Rentenaar — Partner Manager
CrowdStrike

Synopsis: In this session, you will learn the importance of Intelligence in preventing your environment. We will present how to identify Threat Actors at play and how you can operationalise this data into your environment effectively.

We will offer real-world strategic insight into the current threat landscape, offering practical tips on how you can utilise intelligence to protect your organisation.

17:00 – 18:30 Cocktail & Networking

Thursday, 30th of November

Hotel President Wilson, Geneva

Hosted by:

adminKudelski Security Cyber Summit – 3rd Edition