SIGS Technology Summit Speakers in 2014

(all presentations are held in English)

 

Key Notes

Dr. Hugh Thompson
Dr. Hugh Thompson is chief security strategist and senior vice president at Blue Coat and a leading force in the information security industry. Also Blue Coat’s CMO, he has more than a decade of experience creating methodologies that help organizations build demonstrably more secure systems and has co-authored three books on the topic. In 2006 he was named one of the “Top 5 Most Influential Thinkers in IT Security” by SC Magazine. For the past three years, Dr. Thompson has served as the program committee chairman for RSA Conference, the world’s largest information security gathering, where he is responsible for guiding the technical content at both the U.S. and European RSA Conferences. He also sits on the Editorial Board of IEEE Security and Privacy Magazine.

Dr. Thompson holds a B.S., M.S. and Ph.D. in applied mathematics from the Florida Institute of Technology. For the past few years he has been an adjunct professor at Columbia University, where he taught a graduate course that explored cutting edge techniques for secure software development and software vulnerability exploitation.

 

Key Note at the 26th of August 2014

Now it’s Personal: A Look at the Future of Information Security
Information security has long hinged on trusted insiders’ ability to make good decisions. Although foundational controls such as antivirus, data leak protection, and firewalls are important, they’re far from complete – especially in a world where the workforce is highly mobile and using consumer technology to get work done. Additionally, the use of social networking and the digitization of public records has driven a sharp rise in “knowability” of people at a distance.  All of this change raises an important question for the information security industry about the automation of personalized attacks: what happens when the marginal cost of launching a personalized attack starts to approach $0? As the cost for  attackers to personalize their attacks goes down, our zeal in building technology to defend users in a personal and agile way must rise. This session pulls from diverse fields to look for a new direction in information security – one that embraces and adapt to the individuality of users.


Dr. Robert W. Griffin
Dr. Robert W. Griffin is Chief Security Architect at RSA, the Security Division of EMC, where he is responsible for technical architecture and standards, particularly in terms of RSA’s initiatives to address the challenges of new threats and new models for IT.  He has been active in the computer industry since 1980, when he completed his doctoral studies at the University of Virginia and joined Digital Equipment Corporation. His responsibilities at DEC included software engineering and architecture for relational databases, user authentication, access control software, object-based integrated development environments and workflow management systems. After leaving DEC, as corporate architect at Entrust he designed their federated identity product and led Entrust participation in the SAML standard. During two tenures at RSA totaling more than 12 years, he designed the customer solutions that later became RSA Key Manager and the tokenization component of RSA Data Protection Manager; he also represented RSA in several standards efforts, particularly the Key Management Interoperability Protocol (KMIP) Technical Committee and the PKCS 11 Technical Committee, for each of which he is still the co-chair.  Between his tenures at RSA, he worked as a consultant for BearingPoint, primarily as architect and implementer of governance software and business process for Morgan Stanley. 

Key Note at the 26th of August 2014

The Future of Cyber Security
New technological waves such as cloud, mobile, big data and social media are impacting IT and the way we conduct business, offering new opportunities for success. At the same time, changes in the threats confronting organizations challenge our ability to respond to those opportunities. This session looks at the future of cyber security in the light of these opportunities and threats, including a look back at the perspectives introduced by speakers in earlier session. We’ll discuss current and emerging approaches to detecting, investigating and responding to cyber attacks, showing how these approaches can enable organizations to embrace opportunities, improve security and reduce risk.

 

Stephen Gates, Security Evangelist
Steve is a key Security Evangelist for Corero Network Security, having delivered hundreds of presentations and attack/defense demonstrations across the Globe. Steve has more than 25 years of computer networking and security experience with an extensive background in the deployment and implementation of next-generation security technologies.  He is a recognized Subject Matter Expert on DDoS attack tools and methodologies including defense technologies and approaches. You can usually find Steve speaking to network and security professionals within highly regarded organizations such as; InfraGard, ISSA, ISACA, Tech-Security Conferences, Interop, SecureWorld, RSA, SANs, IANS, GTRA and numerous other venues.
http://www.rsaconference.com/speakers/stephen-gates

 

Key Note at the 27th of August 2014

Cyber-security risks presented by an unsecured Internet
The growing global dependence on the Internet as the backbone for organizations to conduct business and ultimately generate revenue is leading to a corresponding surge in malicious traffic and cyber-attack volume. This trend will continue for the foreseeable future with broad implications for network security. In the face of this heightened threat level, traditional approaches to network security are proving ineffective. With the never ending growth of available Internet bandwidth and the widespread access to cyber-attack tools and services, has led to an explosion in the use of these tactics by cyber criminals to disrupt business.

Malicious traffic carrying these threats flows freely over most service provider networks. Similarly, the cloud is generally agnostic to the intent of the traffic it delivers. Many hosting providers unknowingly accommodate customers who do not practice safe Internetworking, making their public cloud offerings a platform for vulnerable services. Even more worrying is that most customers end up paying their provider for the bandwidth that delivers potentially dangerous Internet content.

For decades, we have struggled to not only fully understand the cyber threat, but also evaluate the risks and craft the appropriate response and defense mechanisms.  This session explores the concept of a partnership combining technology, upstream providers and proactive response planning to ensure resilient network infrastructures, protect personal data, online services and intellectual property from these complex cyber security events.

 

 

Sponsor Presentations

AccessData, Andrew Fleet
Andrew Fleet is the Director of Corporate Accounts in Europe at AccessData, responsible for all European business within the Private Sector. He has over twenty years’ experience of selling hardware, software and services enterprise solutions principally in the finance, legal and commercial sectors. Prior to joining AccessData, Andrew was at Sophos managing their Global Accounts.

Leveraging a dynamic threat intelligence ecosystem and endpoint machine data to identify and take action against known and unknown threats
Information security is quickly evolving from a sole focus on prevention to one of detection and response in order to survive an era of continuous compromise.  Today, cyber-attacks are so commonplace that many organizations see hundreds of attempts per day; some see thousands.  The frequency and sophistication of today’s attacks has changed the security mindset from “will a breach occur?” to “when will we get hit next and how bad will it be?”

To protect the employees, intellectual property and assets of any organization in an era of continuous compromise, infosecurity teams must adopt an intelligence-driven defense posture that sees activity throughout the entirety of the organization.  Viewing network traffic or end point activity in isolation is no longer sufficient, as today’s attacks are well disguised and come from myriad vectors.  To truly see today’s threats, network traffic must be correlated with end point activity (including mobile devices), logs and real-time threat intelligence from commercial, open source, industry and internal threat feeds for a complete picture of the threat environment

 

Blue Coat Systems, Robert Arandjelovic
Robert is Blue Coat’s Director of Products & Solutions in EMEA, where he drives the company’s Business Assurance Technology vision out to the market. Prior to joining Blue Coat, Robert spent 15 years in product and solution marketing roles at Siemens Enterprise Communications and Intel. Beyond his experience with VPN, firewall, authentication, and encryption technologies, Robert has also spent years promoting security as a key enabler of enterprise mobility and unified communications solutions.

Close the Security Loophole Created by Encrypted Traffic – Encrypted Traffic Management
More than one quarter of all traffic inside an organisation is encrypted with SSL/TLS.  How do you ensure the encryption is hiding only sensitive data and not malware or exfiltration of your data?
The presentation will cover the Gartner report “Security Leaders Must Address Threats from Rising SSL Traffic” to discover impacts and recommendations. According to Gartner, this research will help enterprise security leaders to create a traffic decryption strategy.
Report contains:

  • Analysis of the security gaps created by encrypted traffic and business impact
  • A break-down of current mitigation techniques and approaches
  • Key recommendations to help security leaders take action

Participants of the workshop are allowed to view the report for free: http://dc.bluecoat.com/Gartner_Encrypted_Traffic

Attend to discover how to defend your business.

Blue Coat Systems, Pat Dunne
Pat Dunne is Senior Sales Director EMEA Channels for Blue Coat. Pat considered a veteran of the Security Channel having held senior sales management roles at companies such as Blue Coat, Websense, Sun Microsystems, Trend Micro and NetIQ. He was also involved in several successful start-ups in EMEA including  Elron, FTP Software and Neoware. Having also held roles in direct sales, direct sales management, marketing and even Data Center Manager at a large Facilities Management for Comshare, Pat has the all-round experience needed to understand how the channel fits into the wider Eco-system of the IT Security industry. 

Presentation at the 27th of August 2014

Advanced Threat Protection and living in a post-breach world, an opportunity for partner to add value
Leading analysts such as Gartner today recognize that we live in a new Advanced Threat Landscape, where it’s no longer good enough for companies to attempt to prevent breaches, but realize they HAVE or WILL be breached. The focus is moving on from pure prevention to a post breach world where time to recognition, resolution, and understanding consequences are vital. Pat will discuss how the Security Channel can help customers understand this reality and how best to deal with it. He will also highlight the size of the opportunity for partners to seriously skill up and embrace this market opportunity now, rather than following the market in the future.

 

Citrix, Jochen Liebrich
Jochen Liebrich works for Citrix Systems since 2013 and is responsible as Director Networking Sales Central Europe for the Networking & Cloud activities in Switzerland, Austria and Germany. Within his 30 years in Network-Optimisation, Security, Server, Storage, and High-Availability Cata Centers he served for several Management roles at F5 Networks, Comparex and Siemens. During the last years he focussed on the Virtualisation, Cloud, Outsourcing, Mobility and Encryption business.

Virtualisation, Cloud, Mobility versus Security – a contradiction?
Implementing Cloud and Virtualisation-Technologies is always a new challenge for IT and TC departments. Meet demanding SLAs, offer a complete Services Catalogue and at the same time deploy attractive and innovative Apps all over the world, might be a challenge to the Security SLAs. More complex attacks on networks, apps and company data restrict the agility to develop new apps and processes. Finally the users arrive with the latest smartphones und tablets, to access their company apps and data. A nightmare for the Security of networking connections, data access, intellectual property and legacy apps?
See best-practices examples and an outlook on future workstyles. Learn how other IT customers master the challenge from Jochen Liebrichs presentation. Get inspiration how to fulfil the demand for Agility, Mobility, Individuality, Performance, Innovation and Security of your users, customers and stakeholders.
How can CIOs lead in cost reduction, company objectives and High-Security IT/TC? Free time of your best IT talents for new tasks and projects. Deliver innovative concepts for effective and attractive Workplaces for office- and mobile workers. Increase efficiency and user experience of your customers and users wherever they are. Work is not a place!

 

Corero Network Security, Stephen Gates
Steve is a key Security Evangelist for Corero Network Security, having delivered hundreds of presentations and attack/defense demonstrations across the Globe. Steve has more than 25 years of computer networking and security experience with an extensive background in the deployment and implementation of next-generation security technologies.  He is a recognized Subject Matter Expert on DDoS attack tools and methodologies including defense technologies and approaches. You can usually find Steve speaking to network and security professionals within highly regarded organizations such as; InfraGard, ISSA, ISACA, Tech-Security Conferences, Interop, SecureWorld, RSA, SANs, IANS, GTRA and numerous other venues.
http://www.rsaconference.com/speakers/stephen-gates

10 Key Steps for a Sustained DDoS Protection Plan
Today’s breed of DDoS Attacks and Cyber Threats are not only incredibly sophisticated and designed to wreak havoc on your business, they are challenging to identify, and defend against. Without the proper technology in place to detect, analyze, and mitigate, any online business is vulnerable to effects of a DDoS attack. This session examines key steps to consider in your DDoS protection plan to enhance your existing defense in depth security strategy and the Corero approach to helping customers respond to the wide variety of attacks we see today.

 

F5 Networks, Michael Giesselbach
Michael Giesselbach works for F5 since August 2013 and is responsible for Major Accounts in the DACH Region (Germany, Austria, Switzerland). He is focused  on Application Delivery  and Security Solutions, especially Business Cases for the integration and consolidation through the whole service delivery chain.
Within his 20 years of IT experience Giesselbach worked for major IT companies like NCR, SUN and HP, serving in different Management roles for Sales, Marketing, Pre-Sales and Channel. Starting with Client/Server and Data Warehouse Solutions, the last 14 years he was focused on all challenges around Data Center operations and optimization.

Presentation at the 27th of August 2014

Security at your fingertips – A Good Bye to the traditional architecture
Millions of threats, thousands of attacks, hundreds of Applications, dozens of firewalls – dedicated solutions and multi-tier architectures are complex, difficult and no longer manageable. Security is one of a few services who still decelerates IT in the times of real-time requirements.
But independent from backend architectures, the internal or external enduser will not longer accept any obstacles in Application usage. Connecting flexible, elastic and highly efficient Security with state of the art Application availability and performance could give the enduser a maximum of safety while experiencing unlimited and individual Application services. And for the service provider this is not only possible today, even in large, complex and virtualized environments, it`s reasonable from a technical and commercial point of view. It is about making every Application as safe as possible without any impact on the quality of service – today and tomorrow.

 

F5 Networks, Ralf Sydekum
Ralf Sydekum joined F5 end of 2005 as Technical Manager being responsible for the entire Pre-Sales activities in Germany, Austria and Switzerland (DACH). In his earlier carrier Ralf worked for reputable Distributors, Management Consulting companies and also for various IT vendors in the field of professional services, consulting, product marketing, sales, training and project management. He has already published more than a hundred professional articles beside a variety of books about latest network technologies.Ralf Sydekum: „F5’s solutions provide as an interface between network and applications for the majority of companies an optimum of integration capabilities that meets all requirements due to Security, Availability and performance enhancement. The Pre-Sales team will make sure those solutions are communicated to our customers and integrated in the portfolio of our partners in the most professional manner.”

Presentation at the 26th of August 2014

Shift of Paradigm; The Application Delivery Controllers are the Security Devices of the future!

Traditional security silos are no more the right choice within today’s IT infrastructure of companies.  With multifunctional Application Delivery Controllers (ADC) IT managers get enabled to strategically consolidate the critical Services of Availability, Security, Performance and Agility. An Application Delivery Controller is the „gate keeper“ of web portals and applications that are presented to users by intranet as well as internet. There is a key challenge to make those applications available and secure, protecting them against threats such as; DDoS and/or other multilayer attacks. The consolidation of the Security Infrastructure not only helps to run IT more efficient by saving cost, it also helps to simplify the implementation of new technologies without any compromise on Security needs. This presentation will demonstrate the value of ADC in the above scenario.

 

Guidance Software Inc., Heinz Mäurer
Heinz Mäurer is the Senior Account Executive DA-CH of the vendor Guidance Software Inc.. He has a long history in the software business and knows the requirements and challenges in this area very well. With his deep know how he is supporting partners and end customers in Germany, Switzerland and Austria. Heinz Mäurer worked during the last few years in various positions at well-known software producers. Most recently, he held the Key Account Management in the DACH region for HP Enterprise Security Products.

Simply monitoring network packets for looking at log files is not sufficient to detect attacks
Organizations are well aware of the unavoidable threat that cyber-attacks and other unknown risks pose to their systems and data, and have invested in signature, indicator, and heuristicbased security that promises to alert and stop these threats. For years, they have tried to build the proverbial security wall as tough as possible but with methods limited to detecting only known threats. As a result, even the most robust software can’t guarantee keeping advanced threats like zero-days, rootkits, morphing malware, or insider malfeasance from infiltrating the enterprise, leaving security professionals with only one option – to wait for a breach to happen. What would look like an ordinary activity that would not trigger a warning from installed systems protecting the perimeter, could turn out to be a major threat to your network and cause extensive damage. The reality is that enterprises are under constant siege, but these days mostly from unknown threats. To obtain insights into such unknown threats, security intelligence tools in the market focus on structured data: log files or network packets. However, simply monitoring network packets or looking at log files is not sufficient to detect the anomalous behavior of these unknown threats. There is a need to look into the endpoints (servers and end-user devices) to get to the heart of the threats.

ID Quantique, Grégoire Ribordy
Grégoire Ribordy, co-founder and CEO, has over 15 years of experience in various R&D and management roles in the field of optical measurements and communication systems. He founded ID Quantique in 2001 and has managed the company since then. Prior to this, he was a research fellow at the Group of Applied Physics of the University of Geneva between 1997 and 2001. In this position, he actively developed quantum cryptography technology and is the holder of a number of patents in the field.  Between 1995 and 1996, Grégoire Ribordy worked in the R&D division of Nikon Corp. in Tokyo.
Grégoire Ribordy is the recipient of several awards such as the 2001 New Entrepreneurs in Technology and Science prize, the 2002 de Vigier award and the Swiss Society for Optics and Microscopy 1999 prize. At the end of 2005, he was selected as one of the most innovative individuals in information technology worldwide by the World Technology Network. 

Presentation at the 26th of August 2014

Quantum computing & Quantum cryptography: Why & when you should start worrying
Quantum computers will break current public-key based encryption systems, widely used in the industry to send data over networks.
It is well known, based on Snowden documents, that at least the USA and China are investing Billions of dollars into the development of quantum computers.
Quantum cryptography is able to protect data communications against quantum computer attacks. These solutions are available, today, and necessary for the protection of data with requiring long-term protection.

When will quantum computers come up? How can you protect yourself against them? Why do you need to worry, today?

 

ID Quantique, Richard P. Straub
Richard P. Straub has over 25 years of experience in the Information & Communication Technology (ICT) industry in various senior Sales/Marketing and management roles, worldwide. He heads the market development for ID Quantique’s government practice and is ID Quantique’s representative in the German speaking part of Switzerland. Richard P. Straub has extensive market experience in ICT security and encryption products with Swiss security companies like MediaCrypt AG (Kudelski) and Omnisec AG. Prior to this he was internationally active managing standards and consortia for Digital Equipment Corp/Compaq (HP today).
With MediaCrypt AG, Richard P. Straub received the Frost & Sullivan Award for Excellence in Technology, 2005, for the development of a new encryption algorithm. He is co-author of the ‘Open Systems Handbook – A Guide to Building Open Systems’, published in 1994 by the Institute of Electrical and Electronics Engineers, Inc. (IEEE). 

Presentation at the 27th of August 2014

Quantum computing & Quantum cryptography: Why & when you should start worrying
Quantum computers will break current public-key based encryption systems, widely used in the industry to send data over networks.
It is well known, based on Snowden documents, that at least the USA and China are investing Billions of dollars into the development of quantum computers.
Quantum cryptography is able to protect data communications against quantum computer attacks. These solutions are available, today, and necessary for the protection of data with requiring long-term protection.

When will quantum computers come up? How can you protect yourself against them? Why do you need to worry, today?

 

Imperva, Martin Dombrowski
Martin Dombrowski has over ten years’ experience in the IT Security industry, and currently works as a Security Engineer at Imperva.

He is a respected and award-winning keynote speaker – including at the IT Business Academy – as well as an author of numerous articles, and lecturer on the subject of IT Security at the Technical College of Kiel.

Compromised Insider – “In the wild” examples of how critical corporate data is stolen today (incl. live demo)
The increasing number of successful data breaches and targeted attacks at the Top 50 organisations is proof that the thread landscape has changed in ways that can´t be addressed with traditional IT security solutions.
Firewalls, Intrusion Prevention Systems and Anti-Virus Solution are no longer enough.
With the help of real world examples, we´ll show you how the “Compromised Insider” scenario threatens your business. We´ll also explain how you can protect your data from this new threat and why it´s vital to have answers to the following questions: Where is my valuable data (my crown jewels)? Who has access to it, and why? Who is doing what with it – and is it permitted?

 

Ixia, Nimrod Kravicas
Nimrod Kravicas is the EMEA Business Development Manager for the Ixia security market. Nimrod has over 20 years of experience in Networking and Security, evolving from the 80’s “serial” communication to modern next-gen technologies. Nimrod is a renowned security expert for testing and validation of security solutions including Firewalls, IDS, DDOS Mitigation as well as cyber range and cyber attack simulation. He works extensively with customers from the manufacturer, service-providers, enterprise and Government sectors, identifying next-gen requirements and delivering state of the art solutions for security validation.

Cost savings with security and performance tests
Cost pressure and the complexity of networks and security are steadily increasing. We want to show you how you can maximize the security and performance of your networks, data centers and applications significantly by corresponding test solutions.
 
Starting with a brief overview of possible security tests and their basis we show you what has changed in the testing of firewalls in the past five years and illustrate interesting customer cases.
How do you ensure that your firewall is working properly even under “realistic traffic” condition? What must be taken into consideration especially for firewall testing? How can network equipment providers and integrators benefit from such test solutions?
 
With an outlook on future challenges in the security testing field the exciting journey ends.

 

Lynx Software Technologies, Avishai Ziv
Avishai Ziv, a 25 years industry veteran, is the Vice President of Cyber Security Solutions at Lynx Software Technologies, a leading provider of secure virtualization technologies. In this role, Mr. Ziv is leading Lynx’ foray into the cyber security space, introducing new class of cyber security products targeted at real-time detection and interception of targeted attacks, multi-stage APTs & sub-OS rootkits. Before joining Lynx, Mr Ziv was the founder and CEO of Netsuun, a SaaS infrastructure and security start-up; founder and CEO of Intaglio System, a hardware security start-up; Senior VP of Business Development at AdmitOne Security, authentication and identity management start-up; Vice President of Business Development at Aladdin Knowledge Systems Ltd (NASDAQ: ALDN); CEO of C.D.I. Systems and founder and CEO of ALORMAN. Mr. Ziv is speaks and writes frequently about cyber-security.

APT detection: Closing the Gaping Hole
While new solutions to tackle APTs are continuously introduced, the detection gap of APTs and stealthy cyber threats remains alarmingly long — measured in months. The main reason for the APT detection gap (i.e., the time from when the APT first infects to when it is detected) is the sophistication of infection techniques utilized by the attackers. Most of the infections occur below the infected OS, and as such cannot be detected in real-time by common detection technologies – anti-malware applications and sandboxes alike. Result: Common security solutions fail to detect the actual APT infection. Instead they focus on failed prevention attempts (using conventional anti-malware technologies) and on monitoring the already infected targets. Utilizing new unconventional methods of proactive detection – namely secure hypervisor – can resolve that problem.

 

NetIQ, Jörn Dierks
Joern’s overall responsibility as Chief Security Strategist EMEA at NetIQ, a business unit of The Attachmate Group, is the Identity, Security and Governance Management business in Europe, the Middle East and Africa. He regularly consults key enterprise customers in these geographic regions about security trends, provides market insights and educates on how to map the NetIQ portfolio to the customers’ requirements. Joern is also responsible for the strategic direction of the product line and works very closely with Product Management and Development in the USA providing the international customer and business perspective.

Before joining NetIQ, Joern studied Computer Science, majoring in Computer and Network Security, and worked for seven years as Senior Systems Engineer in IT Security focusing on firewalls, intrusion detection systems and encryption technologies. Joern is a CISSP since 2004.
http://www.cebit.de/sprecher/joern-dierks/454

 

Presentation at the 26th of August 2014

“Identity of Everything”: The New Foundation for Security and Privacy Challenges
By 2020, it is estimated that between 25 billion and 1 trillion devices will be connected to the Internet – creating a true “Internet of Everything.” This represents the most significant IT opportunity of a generation. The collision of business, privacy and security in the Internet of Everything will undoubtedly lead to greater prescriptive measures for data protection and privacy, as well as an unprecedented rate of data aggregation. These opposing outcomes must be reconciled, or the benefit of hyper-connectivity will be unrealized.

To survive, organizations have to reposition identity as the central access point between business, IT and security stakeholders. As the key that unlocks interaction between customers, partners and products, identity is the defining point that connects everything online. Join this discussion to explore the state of organizational readiness, the role of identity and the implications to privacy and security in this hyper-connected world.

 

Presentation at the 27th of August 2014

Intellectual Property Protection with NetIQ Security Solutions
In this session you will learn how the NetIQ Security Solutions can be used by your customers to protect their Intellectual Property and customer data as well as other valuable data assets. We will explain a three step solution set which provides answers to questions like “are systems configured in a secure way?”, “who has access to what?”, “who is making changes to access rights?” and “what is happening to systems and data at this time?” If your customers care about their IP and about protecting their valuable data assets, this is the right session for you, as we will not only talk about the different options of making this technology available to your customers, but also give you compelling reasons why you should work with NetIQ going forward.

 

Nexthink, Vincent Bieri
Vincent is one of the Nexthink co-founders and is Chief Product Evangelist. He is responsible for leading product marketing at Nexthink.
Vincent brings more than fifteen years of experience in technology marketing, sales, and product management, most notably at Cisco Systems. Vincent holds a degree in Computer Science and Engineering from the University of Applied Sciences in Fribourg, Switzerland.

It is 2PM … do you REALLY know what your endpoints are doing?
Why is it so hard to know what’s going on at the endpoints? SIEM logs cannot detail events, network forensics cannot see the local activity or those not on your network, endpoint DLP can only see the movement of data, EPP/AV can only see some malware! So your existing arsenal only goes so far in giving you environment visibility. A recent Gartner report suggests that advanced targeted attacks are set to render prevention-centric security strategies obsolete, going on to predict that, by 2020, securing enterprise IT will require a shift to information and people-centric security strategies focused on an infrastructure’s endpoints. With endpoint intelligence and analytics you can detect and respond faster and easier to security threats and breaches.

 

Palo Alto Networks, John Harrison
John is the Sr. Product Manager for Threat Prevention technologies, leads strategies for Threat Research and solutions for detection of advanced adversaries within enterprise networks for Palo Alto Networks.    Before joining Palo Alto Networks, John was the Group Product manager at Symantec working on endpoint protection anti-malware technologies, Intrusion Prevention Appliances and Honeypot solutions.  John also worked in product management at 3Com, Imperito Networks, National Semiconductor.   John also worked in Mac OS and IT at Apple Computer.   John is a member of the FBI InfraGard and is a regular spokesperson in the media and with customer regarding all aspects of cyber security.   John also holds one U.S. Patent on security technology.John received his MBA from St. Mary’s College and his B.S. in Electrical Engineering from The University of Texas at Austin.

Tools and Techniques Adversaries use for 0-day Malware to the latest in Targeted Attacks with live demo
In this session, you will get overview and a live demonstration of the latest techniques and tactics adversaries are using to create 0-day malware and targeted attacks impacting enterprise’s today and tomorrow. A journey on the dark side of our industry. The final station should care you whether you are a small business or large enterprise, since you need to understand the tools and tactics adversaries are utilizing to target you. This is your first requirement to start your important steps to protection your company and we will explain you the necessary tools in this talk.

 

Rapid7, Dominic Haussmann
Dominic Haussmann is the Senior Security Consultant for EMEA region at Rapid7.  Based in Germany, Dominic brings over 10 years of experience in IT Security Risk and Compliance and is focussed on helping organisations understand how to collect, contextualize and analyse the security data they need to fight an increasingly deceptive and pervasive adversary.

Know Your Enemy
In today’s world, the reality is that a determined adversary can always get in.

Social engineering. Spear phishing. Malware. These scary-sounding attack techniques can be designed to deface a  website, halt operations, or quietly steal away with an organization’s private data. Malicious intruders used to employ brute-force strategies to infiltrate a network. However, with time they’ve become savvier and far more deceptive (think sneaking in through a window and leaving without a trace, versus kicking down a door).

Today, there are different types of attacker – from hacktivisits, to state-sponsored organizations, to cyber criminals. The current proliferation of malware and other threats have created an entire cyber-crime economy. This session will explain the most commonly used (and most successful) attack
methods, offers practical guidance for prevention, detection, and containment and takes a peek at the potential attack vectors of the future.

 

SMS PASSCODE A/S, David Hald
David Hald is a founding member of SMS PASSCODE A/S, where he acts as a liaison and a promoter of the award-winning SMS PASSCODE multi-factor authentication solutions. Prior to founding SMS PASSCODE A/S, he was a co-founder and CEO of Conecto A/S, a leading consulting company within the area of mobile- and security solutions with special emphasis on Citrix, Blackberry and other advanced mobile solutions. In Conecto A/S David has worked with strategic and tactic implementation in many large IT-projects. David has also been CTO in companies funded by Teknologisk Innovation and Vækstfonden. Prior to founding Conecto, he has worked as a software developer and project manager, and has headed up his own software consulting company. David has a technical background from the Computer Science Institute of Copenhagen University (DIKU).

How do we prevent hackers from compromising our systems?
A username and password are no longer enough to authenticate your users. Weak or stolen user credentials are the preferred weapons used by hackers, and are behind approximately 76 percent of all network intrusions. Come and learn about the latest in adaptive multi factor authentication, the tendencies and the current solutions, and see an example on how you can protect your remote access solution with adaptive multi factor authentication.

 

Vormetric, Paul Ayers
Paul Ayers is VP EMEA at Vormetric.  Prior to joining Vormetric, Ayers has held the position of sales director for PGP Europe and senior sales director for Northern Europe for PGP Corporation until its acquisition by Symantec.  He also helped build value added reseller Intellect into one of the leading channel partners for McAfee encryption solutions in the UK. 

The threat from within: What we can learn from the Edward Snowden affair?
Edward Snowden was a ‘privileged user’, and these users exist in all organisations. Root Users, Domain Administrators, System Administrators or other high level computer operators often have powerful, privileged, access rights. Although they require high levels of access to enable them to conduct the tasks that they need to perform, there are significant security issues that arise when these users also have access to data stored within computer systems, and have the ability to read documents and other files, copy or change them.
This presentation delves into the reasons why organisations need to place greater controls around their data particularly given the adoption of transformation technologies such as big data and cloud.
Using the findings of the recent Vormetric Insider Threat Report, compiled by Ovum, Paul will discuss the reality of the insider threat on European enterprises and how another “Snowden” could be averted.

 

WhiteHat Security, Gareth O’Sullivan
Gareth O’Sullivan is Director Solutions Architecture EMEA and joined WhiteHat in 2012 to provide technical sales and solution definition. With a background in software engineering and QA, he has specialised in security technologies for over 7 years and been an OWASP member since 2008. Gareth’s interests include: security assessment methodologies, automation techniques for DAST/SAST, pen testing.

2014 Website Security Statistics Report: Findings and Recommendations
This presentation explores the finding from WhiteHat’s Website Security Statistics Report (14th Edition), which provides a unique perspective on the state of website security and the issues that organizations must address to avert attack.
The report covers topics ranging from remediation rates to vulnerabilities per language, and includes industry trends based on the analysis of more than 30,000 websites under management at WhiteHat Security
In addition you’ll gain insights into potential future challenges, how to quantify risks, and identify the top priorities to address to protect your web applications and minimize the financial implications to your business.

 

 

Further professional speakers

 

Christof Jungo
Christof Jungo is Head of Security Architecture and Engineering at Swisscom and is responsible for the security of the cloud. For over ten years, he brings his expertise in the development and management of security solutions in the provider environment at Swisscom. Previously, he was Chief Technology Officer and member of the management Netix specialist in network and security. Christof Jungo is the author of numerous articles around Cloud Security and a member of the Information Security Forum (ISF).

Building Secure Cloud Service
Efficient, flexible, highly automated and quickly deployed – these attributes distinguish cloud services. But how to build them profitable and safe? Christof Jungo depicts the new opportunities that resellers may use in order to realize new business ideas and he shows how they can meet highest security demands in a constantly changing environment.

 

Max Moser
Max Moser has worked for many years in the field of IT-Security. He has supported many national and international companies, public authorities and institutions to analyze and improve their security levels. He specializes in protocol analysis, research and highly specific penetration testing of complex environments. Max Moser is known within the IT-Security arena for his open-source projects such as the Linux distribution BackTrack as well as the recent Keykerikiâ research project. Within the limits of their own business activity, security professionals worldwide apply this information and these products. The imparting of knowledge tailored workshops with a strong practical element is one of his great passions. Max Moser supports companies and corporations from various market sectors including telecommunications, pharmaceuticals, Insurance and banking. He presented several research project results at well-known international security conferences and his expertise is well represented in national and international media.

Failure is not an option — it comes bundled
Many interesting security related talks will be held on the SIGS Technology Summit presenting products, showing approaches and risks. Max Moser will convey his impressions on talks and topics and refer to security risks, which started with globalization, pushed forward with excessive outsourcing and are on a journey through the virtualized universe. Is everything gold, what was virtualized? Is it acceptable to systematically ignore security basics due to the pressure on growth and agility? You are invited to get thought-provoking impulses from an experienced security analyst for  trending topics.

 

 

Mobile Menu