Videos, photos and presentations from the
SIGS Technology Summit 2014

(Quality of videos and photos is not perfect – sorry for that!)

 

For the photos please klick here

 

Keynotes

 

Keynote Dr. Hugh Thompson, Chief Security Strategist and Senior Vice President at Blue Coat (http://www.rsaconference.com/speakers/hugh-thompson)

 

Video:
Now it’s Personal: A Look at the Future of Information Security

 

Keynote Stephen Gates, Security Evangelis at Corero Network Security(http://www.rsaconference.com/speakers/stephen-gates)
   

 

Video:
Cyber-security risks presented by an unsecured Internet

 

10 Key Steps for a Sustained DDoS Protection Plan
Cyber-security risks presented by an unsecured Internet
   
   

Keynote Dr. Robert W. Griffin, Chief Security Architect at RSA (http://www.rsaconference.com/speakers/robert-griffin)

 

Video:
The Future of Cyber Security

The Future of Cyber Security
   
   
Keynote Christof Jungo, Security Architecture and Engineering at Swisscom
   
Building Secure Cloud Service
   
   

Sponsor Presentations

   
   
If you like more information about AccessData, please contact this address
   
   
   

 

 

Video:
Close the Security Loophole Created by Encrypted
Traffic – Encrypted Traffic Management

Blue Coat Systems, Robert Arandjelovic, Director of Products & Solutions

Close the Security Loophole Created by Encrypted Traffic – Encrypted Traffic Management

   
 

Advanced Threat Protection and living in a post-breach world, an opportunity for partner to add value

The presentation from Pat Dunne is – due to legal issues – only available if you send an email to this address

   

Virtualisation, Cloud, Mobility versus Security – a contradiction?
   
   

Video:
Security at your fingertips – A Good Bye to traditional architecture

F5 Networks, Michael Giesselbach, Director Sales

Security at your fingertips – A Good Bye to the traditional architecture

   
F5 Networks, Ralf Sydekum, Technical Manager

Shift of Paradigm; The Application Delivery Controllers are the Security Devices of the future!

   
 
Guidance Software Inc, Heinz Mäurer, Senior Account Executive DA-CH

Simply monitoring network packets for looking at log files is not sufficient to detect attacks

 
 


 

 

 

Video:
Quantum computing & Quantum cryptography: Why & when you should start worrying

ID Quantique, Richard P. Straub, Head of Market Development

Quantum computing & Quantum cryptography: Why & when you should start worrying

 
   

 

Video:
Compromised Insider – “In the wild” examples of how critical corporate data is stolen today (incl. live demo)

Imperva, Martin Dombrowski, Security Engineer

Compromised Insider – “In the wild” examples of how critical corporate data is stolen today (incl. live demo)

   
   


Video:

APT detection: Closing the Gaping Hole

Lynx Software Technologies, Avishai Ziv, Vice President of Cyber Security Solutions

APT detection: Closing the Gaping Hole

   
   

Video:
Cost savings with security and performance tests

Ixia, Nimrod Kravicas, EMEA Business Development Manager

Cost savings with security and performance tests

   
 

“Identity of Everything”: The New Foundation for Security and Privacy Challenges

The presentation from Jörn Dierks is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time.

     
     
It is 10:50 am … do you REALLY know what your endpoints are doing?
     
     
  Tools and Techniques Adversaries use for 0-day Malware to the latest in Targeted Attacks with live demo

The presentation from Erik Yunghans is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time.

     
     
  Know Your Enemy

The presentation from Dominic Haussmann is – due to legal issues – actually not available. Please send an email to this address for getting it at a later time.

     
     
How do we prevent hackers from compromising our systems?
     
The threat from within: What we can learn from the Edward Snowden affair?
     
2014 Website Security Statistics Report: Findings and Recommendations

 

 

Mobile Menu