Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
This is a community event specifically for people who deal with the topic of cloud security, or who are interested in switching to this field or expanding their knowledge. The content is primarily technically oriented.
At this platform, sales people (incl. CEO's and Founders), vendors and all people who just like to sell their products or services are not allowed to take part.
Main Sponsors of this Event:
| |
(We are actually working on the agenda)
|
1:30 pm |
Registration
|
|
2:00 pm |
Welcome & short introduction from Maria Zidkova, Board Member at CSA Swiss Chapter and IT Security Officer at City of Zurich
|
|
2:00 pm |
Presentation from Maxim Deweerdt, Cyber Defense Expert at NVISO Security and Principal Instructor at SANS Chasing Ghosts: Detecting Token Abuse in the Microsoft Cloud:
|
|
2:30 pm |
Short presentation from Wiz
|
|
2:40 pm |
Short presentation from Gary Adams, Sales Engineering Leader at Rubrik Are you ready for Cyber Recovery? Cyber Resilience is Business Resilience!
|
|
2:50 pm |
Doron Zimmermann, Senior Manager Enterprise Cyber & Information Security at Pragmatica & Michael Rieder, Head Cloud Computing at e3 AG Third Country Intercept Risk in the Cloud When discussing cloud risk, many organisations focus on the U.S. CLOUD Act. Yet the more far-reaching intelligence authorities are FISA Section 702 and Executive Order 12333, which allow foreign intelligence collection and may require cooperation from communication service providers. For organisations in Switzerland and Europe relying on hyperscale cloud services, this raises important questions about mass surveillance via the cloud vector, jurisdiction, data access and sovereignty. This keynote outlines the foreign intelligence collection authority and process behind third-country interception risk and places them in the context of current European/Swiss regulatory developments. Beyond the security risk perspective, the session also touches on how organisations can think about managing this exposure from an information security and architecture standpoint, and why the real challenge is not only compliance but security risk management and how cloud environments are designed. The key message: a sober understanding third-country interception risk is the first step toward managing it.
|
|
3:20 pm |
Break
|
|
4:00 pm |
4 different Breakout Sessions to join - you can choose/attend two of them |
|
|
|
|
|
Breakout Session 1: Attackers Love the Cloud. Do You? |
|
|
|
|
|
Breakout Session 2: Lars Ruddigkeit, CSA Swiss Chapter Co-Lead The Shadow AI Blind Spot in the Cloud: IP and Compliance in a Policy Vacuum Instead of defining clear data-usage policies, organizations react by layering on more specialized AI-detection software—furthering the Expense in Depth cycle. This creates a dangerous Compliance gap: we buy tools to monitor the breach, yet we lack the policy to prevent the initial data handover. The fragility of this approach was recently demonstrated in March 2026, when an autonomous AI agent from the startup CodeWall hacked McKinsey’s internal AI platform, "Lilli". In just two hours, the agent exploited a SQL injection flaw in publicly exposed API documentation to gain full read-write access to 46.5 million chat messages and 728,000 files containing confidential client data. Crucially, the attacker could have poisoned the AI’s system prompts to manipulate the advice given to 40,000 consultants. This incident proves that our systemic fragility isn't caused by a lack of "AI Firewalls," but by a failure to redefine our Protect Surface to include the data flowing through AI interfaces. We are measuring "AI tools deployed" while our core mission—protecting the crown jewels—is being undermined by unmonitored endpoints and a lack of fundamental policy enforcement. |
|
|
|
|
|
Breakout Session 3: Wiz |
|
|
|
|
|
Breakout Session 4: Gary Adams, Sales Engineering Leader at Rubrik Resilience for everything: How to ensure business continuity across Cloud, AI and Identity |
|
|
|
|
5:10 pm |
Short break and change the room to the next Breakout Session of your choice
|
|
5:20 pm |
Start of the second Breakout Session round
|
|
6:30 pm |
Dinner & Networking till open end |
Event Moderator
Maria Zidkova
Board Member at CSA Swiss
Chapter and IT Security Officer
at City of Zurich
Event Speakers and Roundtable Moderator
|
Gary Adams |
Maxim Deweerdt Cyber Defense Expert and Principal Instructor at SANS |
|
|
|
|
|||
| Raul Lapaz Lead Product SecOps and IR at Roche - Author of Learning Kubernetes Security, Second Edition Book |
Markus Rieder Head Cloud Consulting at e3 AG |
||
|
|
|||
| Lars Ruddigkeit CSA Swiss Chapter Co-Lead |
Doron Zimmermann Senior Manager Enterprise Cyber & Information Security at Pragmatica |
If you have any further questions about this event, please simply send an email to info@sig-switzerland.ch