5th Annual Cyber Security Summit

7 – 9 September 2022 | Berlin

PAST SPEAKERS

SEE THE PREVIOUS SPEAKERS & CASE STUDIES

Marc SAMSON

Chief Information Security Officer

Shrey TIWARI

Vice President - Risk Analytics, Rates Technology

Adrien DIARRA

Head of Trust & Safety, Africa

Andy PURDY

Chief Security Officer

Sonia VERHAEGHE

Head of Security Engineering

CONFERENCE TOPICS 2022

LOOK AT THE TOPICS THAT WERE DISCUSSED

  • New Tech Trends that Will Impact 2022
  • Cyber Insights on Supply Chain Attacks
  • In Zero We Trust. The Current Stage
  • Possibilities and Benefits of 5G
  • The Integration of AI In Cybersecurity: New Insights
  • Remote and Hybrid Work. Solutions to Stay Secure
  • A Pandemic Era that Is Impacting the Cyber Security Sector
  • 2022 Predictions: New View on Cybersecurity Skills

Designed for

Members of board, C-level, Senior/Global Vice Presidents, Directors, Heads of departments from banking, pharmaceuticals, chemical/petrochemical, aviation, telecom, retail, hospitality, automotive industries involved in:

  • AI Research
  • AI and Governance
  • CISO
  • Cloud Services and Security
  • Customer Data Program
  • Cyber Compliance
  • Cyber Defence
  • Cyber Detection and Response
  • Cyber Intelligence
  • Cyber Risk Analytics
  • Cyber Security
  • Cyber Security Intelligence
  • Cyber Security Engineering and Architecture
  • Cyber Security Strategy
  • Cyber Threat
  • Cyber Threat Management
  • Data Analytics
  • Data Operations
  • Data Privacy
  • Ethical Hacking
  • GDPR & Data Protection
  • Identity and Access Management
  • Information Security
  • IoT, AI security
  • IT Security
CASE STUDY / DAY 1

Welcome to The Shift-Left Security Culture Journey!

Agile, DevOps or DevSecOps or SecDevOps, Site Reliability Engineering, and all the important frameworks and methodologies that IT can apply are just scratching the surface of the real shift-left culture. But what does it mean to have a real shift-left security culture? How to achieve it? This talk is about how the change could occur and what we did at TUI to start the journey. Welcome onboard!

  • Early beginning
  • Embarking on the journey
  • Lessons learned
  • Key takeaways and the future

Sonia VERHAEGHE

Head of Security Engineering

Shrey TIWARI

Vice President - Risk Analytics, Rates Technology

CASE STUDY / DAY 2

Risk Analytics – Transformation Using

The presentation will cover interesting applications of Cloud & Machine Learning to solve risk compute problems in Banking.

  • Market making – servicing clients
  • Pricing and risk distributed compute
  • Case study 1: Cloud for elastic compute
  • Case study 2: Machine learning for optimization
CASE STUDY / DAY 2

Cyber Resilience in A Post-Pandemic World

The recent global pandemic has forced organizations to revaluate what it actually means to be cyber resilient: the ability to prepare for, respond to, and recover from cyber threats. In many cases, security has noticeably taken a back seat to business continuity. Join me, as we explore some of the hard-earned lessons that Covid-19 has taught us when it comes to securing our workforce, balancing security and agility, and regaining trust.

  • What Are the Key Steps Organizations Should Take to Prepare for Emerging Threats In 2022 And beyond?
  • Lessons Learned: How Has Covid-19 Impacted Our Work
  • Balancing Flexibility and Security
  • The CISO Of the Home Office: On the Internet Complexities of Securing A Remote Workforce

Marc SAMSON

Chief Information Security Officer

Andy PURDY

Chief Security Officer

CASE STUDY / DAY 3

Collaboration for Enhanced 5G Security and Resilience

Addressing risk in cyberspace in a 5G world is a shared responsibility among telecom owners and operators, suppliers, partners, standard bodies, and governments. Collaboration is essential to better assess and manage risk and promote resilience. There need to be consensus-based standards and best practice requirements, independent conformance, and testing protocols, with adequate visibility/transparency.

  • Governments have great concerns over 5G security, and it requires joint efforts to build trust in the supply chain
  • Security responsibilities are shared by different parties in the entire 5G network process, from equipment to network deployment, and O&M
  • Apply the zero-trust principle to supply chain management, enabling carriers to better manage network risks
  • Industry best practices should be followed in the E2E process from development to delivery
  • Carriers formulate security baselines for network devices and applications and periodically perform security evaluation and hardening
  • Supplier information security management systems should comply with industry best practices
  • Carriers should have strict account management, access control regulations and processes, and continuously record network behavior for audit and analysis
  • Suppliers should provide security and trustworthiness statements for products and services, and carriers should cooperate with multiple parties to supervise the implementation
  • Using Zero Trust Concept, Carriers Can Better Manage Telecom Network Risks
CASE STUDY / DAY 3

Securing Tech Adoption in Frontier Markets

FinTech, EdTech and Social Media are just a few examples of industries that are experiencing stronger penetration in frontier markets in Africa, LatAm or South Asia. One of the key success factors of these ventures includes successfully bridging cyber risks, often tight to user’s low digital literacy, and increasingly demanding regulatory environment for better safety, and the need to deliver business outcomes. In this talk, Adrien will be sharing his experience leading cybercrime and cybersecurity matters for Meta in the African region, working with cybercrimes agencies and law enforcement of 49 nations. He will also be making suggestions to better set up new and existing ventures for success while keeping their cyber risk posture low.

Adrien DIARRA

Head of Trust & Safety, Africa

I liked the distribution, variety of the topics and the quality of the presentations.

– Group Chief Information Security Officer, Commerzbank

STAY UPDATED FOR THE 2022 EDITION

Provide Us With Your Contact Details and Our Team Will Get Back to You With All the Updates Regarding the Upcoming Edition of This Event.