skip to Main Content

3RD ANNUAL CYBER SECURITY SUMMIT

30 SEPTEMBER – 1 OCTOBER 2020 I BERLIN I ONLINE
first-image

PAST SPEAKERS

SEE THE PREVIOUS SPEAKERS & CASE STUDIES

Ariel
LEMELSON

Head of Cyber Detection & Response

Hila
MELLER

Vice President Security Europe

Guglielmo
IOZZIA

Associate Director, IT & AI

Claudio
MIRTI

Data & AI Solution Specialist

Bob
XIE

Cyber Security Officer for Western Europe

David Martín
LINDSTRÖM

Head of Network Security

CONFERENCE TOPICS 2020

LOOK AT THE TOPICS THAT WERE DISCUSSED

  • Strategies for developing strong cyber security
  • Edge computing playing a role in cyber defence
  • Artificial Intelligence and Machine Learning
  • Customer security and data protection
  • Cyber security automation
  • How to fight cyberattacks
  • IoT security
  • Regulations and 3rd party cooperation

DESIGNED FOR

Members of board, C-level, Senior/Global Vice Presidents, Directors, Heads of departments from banking, telecom, insurance, IT & services, retail, chemical, automotive, aviation and pharma industries involved in:

  • Cyber security
  • Cyber defence
  • Cyber intelligence
  • Ethical hacking
  • Pen testing
  • Information security
  • CISO
  • IoT, AI security
  • Security analytics
  • Cyber risk analytics
  • Cyber security engineering and architecture
  • Cyber threat

CASE STUDIES

PAST CASE STUDIES INCLUDE

CASE STUDY / DAY 1

Explainable AI Application in Mitigating Adversarial Effects

Nowadays, applications of Convolutional Neural Networks are common in sensible contexts. These specific neural networks are powerful and adaptable to many computer vision tasks, but they are also vulnerable to adversarial attacks, therefore, also imperceptible perturbations added to legit input images can cause a network to fail. Some techniques have been proposed to mitigate this risk: the challenge is in the black box nature of Deep Neural Networks. In this presentation, the speaker will pick up one of the most advanced mitigation techniques and show how Explainable AI can help validating it.

  • Convolutional Neural Networks (CNN) overview
  • Adversarial attacks to CNNs
  • Explainable AI (XAI) 101
  • Validation of mitigation defense through XAI

Guglielmo
IOZZIA

Associate Director, IT & AI

Bob
XIE

Cyber Security Officer for Western Europe

CASE STUDY / DAY 1

Risk Mitigation – A Shared Responsibility in the 5G Ecosystem

5G has been fuelling EU headlines for the past years. As a result, EU commission published Risk Assessment Report and ENISA wrote a 5G Threat Landscape. Both documents are highlighting the importance of collaboration and sharing information between the different actors.Building the necessary trust goes beyond the words, Huawei will present its view on how to collaborate with ecosystem stakeholders to raise E2E security.

  • Example of a risk-based approach for a vertical sector
  • Setting up collaboration within an ecosystem and establishing trustworthiness
  • Role of standards and regulations

CASE STUDY / DAY 2

Network Security Evolution Beyond SASE and Zero Trust

New concepts such as SASE and Zero trust promise seamless integration of multiple network and security services at scale. All industry vendors are adapting their value proposition to adapt to this new paradigm and it is crucial to understand how much is already available or mature and how much is just an ongoing trend so that we can make the right investments. Telco MSSPs have the experience on secure access and authenticated services and can play an important role in the evolution of the connectivity.

  • Network security evolution
  • SASE and Zero trust
  • Are current services offered meeting the expectations?
  • How to plan the evolution of your network

Alberto
SEMPERE BLANCO

Global Director for Digital Security Products

Ariel
LEMELSON

Head of Cyber Detection & Response

CASE STUDY / DAY 2

The Paradigm Shift in Modern Threat Detection & Response Strategies

This session reviews different approaches to modern Incident Response at scale, leveraging cyber security automation and orchestrations, SOAR and Threat Intelligence. Can the TIER-1 be replaced with an automated function? What is the paradigm shift between classic IR and modern Threat Detection and Response?

  • Classic Incident Response vs. modern Threat Detection and
    Response – The paradigm shift
  • Leveraging automation, orchestration and SOAR
  • Making real utilisation of Threat Intelligence
  • Scale, alert fatigue and headcount considerations

SPONSORS 2020

A SPECIAL THANK YOU TO OUR SPONSORS

STAY UPDATED FOR THE 2021 EDITION

Provide us with your contact details and our team will get back to you with all the updates regarding the upcoming edition of this event.

Back To Top