6th Annual Cyber
Security Summit
Event is Over
Stay Updated for 2024 edition
Past Speakers
SEE THE PREVIOUS SPEAKERS & CASE STUDIES
CASE STUDY
The Evolving Landscape of Cyber Security Regulation
Cyber security regulation is evolving rapidly around the world. While there are commonalities, there are also divergences in approach. This presentation provides an overview of cyber security regulation and touches on complexities with a specific focus on IT/OT topics and the industrial internet of things.
- 01Landscape of existing and upcoming regulation, including the EU Network and Information Security Directive (NIS 2) and the draft EU Cyber Resilience Act (CRA)
- 02Approaches to regulation
- 03Complexities in an IT/OT environment
Andreas Haberlehner
Head of Sales Public & Healthcare/Leader Government Affairs & Public Policy Austria
CASE STUDY
Cybersecure Digitalization
Cybersecure Digitalization is the building block for Emerging technologies and Future of Work use cases – to drive innovations, improve productivity and create new customer experience.
- 01The origin of the channel. How to build it, and where are the hurdles?
- 02Main KPIs you should take care of
- 03The Business Case. Does it fly?
- 04Should you move customers between channels? How to?
CASE STUDY
How to Improve Your Company’s Cyber Security Posture by Implementing the Right KPIs
From Patch Management to Phishing Simulations, from Red Teaming or your organizational set up:
By defining, tracking and reporting KPIs, you can improve your organizations cyber posture significantly and heighten the security awareness of your top management.
- 01Mindset
- 02Shared values
- 03Measurement of experience
CASE STUDY
An Adversarial Viewpoint to Identify High Value Targets for Increased Cyber Resilience
This talk proposes an add-on methodology to significantly increase an organization’s cyber resilience posture against advanced adversaries by accounting for the value that these threat actors place on a given asset instead of solely focusing on the asset’s value from a business criticality or informational value perspective. This methodology is an overlay to Special Publication NIST 800-160, MITRE Cyber Resiliency Engineering Framework, US CISA High Value Asset definition and tied to the MITRE ATT&CK Framework where possible.
- 01Define your most desirable skill sets, expand your talent pool and secure top talent with winning employee value propositions which appeal to today’s workforce, stand out in a competitive market, and suit your organisation’s long-term needs
- 02Define a purpose and create a resilient workforce which allows staff to see their future with the business to dramatically increase agent retention
CASE STUDY
Lessons Learned from the SOC Frontline: Why APT is not your biggest threat
Having investigated multiple APT campaigns across multiple industries, this speaker tends to disagree. In this talk we will discuss some hard truths if you’re a target to an APT campaign but more importantly what real threats actually occur on a daily basis but do not receive the same attention.
- 01APTs: Discussion of motivations, targets, techniques, difficulty of detection and intrusion prevention
- 02Investigating an advanced intrusion from start to finish, its challenges, and strategies to eradicate
- 03Discussing why other threats are more significant and damaging (Commodity Threat Actors, Insider Threat, etc)
- 04Formulating a strategy to protect, detect and action said threats.
CASE STUDY
The Evolving Landscape of Cyber Security Regulation
Cyber security regulation is evolving rapidly around the world. While there are commonalities, there are also divergences in approach. This presentation provides an overview of cyber security regulation and touches on complexities with a specific focus on IT/OT topics and the industrial internet of things.
- 01Landscape of existing and upcoming regulation, including the EU Network and Information Security Directive (NIS 2) and the draft EU Cyber Resilience Act (CRA)
- 02Approaches to regulation
- 03Complexities in an IT/OT environment
Andreas Haberlehner
Head of Sales Public & Healthcare/Leader Government Affairs & Public Policy Austria
CASE STUDY
Cybersecure Digitalization
Cybersecure Digitalization is the building block for Emerging technologies and Future of Work use cases – to drive innovations, improve productivity and create new customer experience.
- 01The origin of the channel. How to build it, and where are the hurdles?
- 02Main KPIs you should take care of
- 03The Business Case. Does it fly?
- 04Should you move customers between channels? How to?
CASE STUDY
How to Improve Your Company’s Cyber Security Posture by Implementing the Right KPIs
From Patch Management to Phishing Simulations, from Red Teaming or your organizational set up:
By defining, tracking and reporting KPIs, you can improve your organizations cyber posture significantly and heighten the security awareness of your top management.
- 01Mindset
- 02Shared values
- 03Measurement of experience
CASE STUDY
An Adversarial Viewpoint to Identify High Value Targets for Increased Cyber Resilience
This talk proposes an add-on methodology to significantly increase an organization’s cyber resilience posture against advanced adversaries by accounting for the value that these threat actors place on a given asset instead of solely focusing on the asset’s value from a business criticality or informational value perspective. This methodology is an overlay to Special Publication NIST 800-160, MITRE Cyber Resiliency Engineering Framework, US CISA High Value Asset definition and tied to the MITRE ATT&CK Framework where possible.
- 01Define your most desirable skill sets, expand your talent pool and secure top talent with winning employee value propositions which appeal to today’s workforce, stand out in a competitive market, and suit your organisation’s long-term needs
- 02Define a purpose and create a resilient workforce which allows staff to see their future with the business to dramatically increase agent retention
Ahmed Nasr
Operations Director Egypt and Director Milk Africa & Turkey
Khaled Elsharkawy
Integrated Supply Chain Senior Director
Mueen Uddin Siddique
Senior Director – Access Network Procurement
Shannon Hore
Senior Vice President Procurement and Logistics
Sandeep Sharma
Director Group Procurement & International Markets Supply Chain
Hottest topics
LOOK AT THE TOPICS THAT WERE DISCUSSED
- 01The usage of AI-powered intrusion detection systems
- 02What practices can be used for the detection, reduction and prevention of ransomware attacks?
- 03Detection of new vulnerabilities in mobile apps and their proper treatment
- 04Espionage, eavesdropping and other IoT security threats that require special attention
- 05What is managed cloud security, and how can it mitigate the risks associated with moving to the cloud?
- 06Is it safe to say that Zero Trust is the future of endpoint security, and why?
- 07New strategies to perform a cyber risk assessment
- 08Estimating the impact of the war in Ukraine on cyber security
Testimonials
What our users say about our conferences
Sponsors
Our Trusted Sponsor at This Summit
STAY UPDATED FOR THE 2024 EDITION
With All the Updates Regarding the Upcoming Edition of This Event.