4th Annual Cyber Security Summit

8 - 9 September 2021 | Vienna / Online

PAST SPEAKERS

SEE THE PREVIOUS SPEAKERS & CASE STUDIES

Matt LEMON

CISO

Steven BROWN

Director, Cyber Security

Istvan RAGO

Head of Digital Security

Alberto Sempere BLANCO

Cyber Security P&S Director

Nir CHERVONI

Head of Data Security

CONFERENCE TOPICS 2021

LOOK AT THE TOPICS THAT WERE DISCUSSED

  • Creating a culture of cyber security in your organisation
  • How is COVID-19 affecting the activity of cyber security department: Ways of adaptation
  • The best practices in detecting and stopping synthetic identity fraud
  • How to protect yourself while using insufficiently secured personal devices and home routers: What are the most successful strategies?
  • Data, analytics and cyber security: How to achieve harmony?
  • The potential of Zero Trust security model in strict identity verification process
  • The role of Cloud services in remote worker security policy
  • Ways to make your business 5G-ready

Designed for

Members of board, C-level, Senior/Global Vice Presidents, Vice Presidents, Directors, and Heads of departments from banking, IT & services, retail, aviation, hospitality, chemicals, pharma, insurance, telecom industries involved in the next departments:

  • AI Research
  • AI and Governance
  • CISO
  • Cloud Services and Security
  • Customer Data Program
  • Cyber Compliance
  • Cyber Defence
  • Cyber Detection and Response
  • Cyber Intelligence
  • Cyber Risk Analytics
  • Cyber Security
  • Cyber Security Engineering and Architecture
  • Cyber Security Intelligence
  • Cyber Security Strategy
  • Cyber Threat
  • Cyber Threat Management
  • Data Analytics
  • Data Operations
  • Data Privacy
  • Ethical Hacking
  • GDPR & Data Protection
  • Identity and Access Management
  • Information Security
  • IoT, AI Security
  • IT Security
  • Security Analytics
  • Security Engineering
  • Security Risk

Matt LEMON

CISO

CASE STUDY / DAY 1

The Role of Zero Trust Security Model in Cyber Security

In most modern enterprise environments, corporate networks consist of multiple interconnected segments, cloud-based services and infrastructure, connections to remote and mobile environments, and increasingly, connections to non-conventional IT, such as IoT devices. The traditional approach of trusting devices within a perceived corporate perimeter, or devices connected to it via VPN, makes less sense in such highly diverse and distributed environments. The zero trust approach advocates mutual authentication, including checking the identity and integrity of devices irrespective of location, and providing access to applications and services based on the confidence of device identity and device health in combination with user authentication. The main concept behind zero trust is that devices should not be trusted by default, even if they are connected to a managed corporate network such as the corporate LAN and even if they were previously verified.

  • What is Zero Trust?
  • How can it benefit organisations?
  • What are some best practice implementations?
  • What are the key points gotcha’s?
CASE STUDY / DAY 1

“The Eye of the Cyber” with Mastercard

As we seek to protect our digital ecosystem and operational integrity from the cyber attacks and data breaches, organised criminal groups and nation states continue to perform targeted and persistent reconnaissance against our network. Recent events have demonstrated the critical nature of third-party compromise and how we must improve our third-party risk management, increase our cyber resilience and proactively address those vulnerabilities that exist, in order to secure out networks.

  • Safeguarding an evolving ecosystem goes beyond protecting the transaction
  • Identification, Automation, Prioritisation & Mitigation
  • Cyber Resilience superseding Cyber Security

Steven BROWN

Director, Cyber Security

Istvan RAGO

Head of Digital Security

CASE STUDY / DAY 2

How COVID-19 Changed Trends and Methods of Cyber Fraud in Online Banking

Customers of online banking solutions have always been in the focus of fraudsters. COVID-19 has fundamentally changed life and criminals also adjusted methods and tools they use in order to maximise their financial gain.

 

  • Pre-COVID cyber fraud landscape
  • Methods for deception
  • Techniques used for the actual fraud
  • Possible approaches for defence
CASE STUDY / DAY 2

From Cloud Security to Cloud Ready Security

Understanding how moving to the cloud requires much more than just acquiring the new solutions in the market around Cloud security (CSPM, CWPP, CASB, etc.). Most of the activities need to be reconsidered and revamped to work as consistently as possible in the new hybrid environments.

• What areas of the security activity need to be review
• The need of a Cloud security
• How to collaborate with the rest of the organisation on the trip to the cloud

Alberto Sempere BLANCO

Cyber Security P&S Director

Nir CHERVONI

Head of Data Security

CASE STUDY / DAY 2

Data Protection in The New Era – Effective Approach

The new era of cloud, Microservices architecture, and distributed data stores, brings a different security risk which is more challenging to mitigate, mainly at scale – at least from a practical standpoint. In this session, we will review the data security challenges in the new era, potential risk mitigation strategies and tactics, and how to approach it effectively.

 

  • Short historical review
  • Data dimensions
  • Key data security challenges in cloud
  • Data security tactics and techniques
  • Conclusions

SPONSORS

Great quality and calibre of peers. Sharing real-world experience

Head of EMEA Cyber Security Ecosystem, Amazon Web Services

STAY UPDATED FOR THE 2022 EDITION

Provide Us With Your Contact Details and Our Team Will Get Back to You With All the Updates Regarding the Upcoming Edition of This Event.