Cybersecurity is about humans, skills, and knowledge. So is the KuppingerCole's Cybersecurity Leadership Summit in Berlin, Germany (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. The summits represent the new thinking that really matters for a secure digital transformation of your enterprise. At the Berlin summit, you will find an impressive line-up of world-class keynote speakers, panel moderators, panelists, best practice presenters and professionals facing the same challenges as you do.
#CSLS18 will consist of two parallel streams. The keynotes, single presentations, and panel discussions will focus on the future of digital business security, increasing social engineering threats and innovative ways and strategies for mastering various security challenges. The speakers and panelists will discuss the current state and the future of IoT security, effective endpoint management, security requirements for governance and privacy and other relevant topics (see below). In our Berlin summit, you will get guidance for decisions critical for the security of your organization, interact with an engaged audience and enjoy an unparalleled content depth. Participate in the Cybersecurity Leadership Summit and navigate through the world of uncertainty and innovation!
The Future of Digital Business Security
Social Engineering: Threats and Prevention
Cyber Threat Intelligence: Importance & Effective Use
IoT and Industrial IoT: Risks and Concerns
Critical Infrastructure Security
Application Security, Agility & Development
Endpoint Management & Security: Getting It Right
The Role of AI, Machine Learning & Deep Learning
Blockchain & Cybersecurity: What Does the Future Hold?
Security as a Requirement for Governance & Privacy
12:00 - 17:00
Conference Check-In
Room: COUNTER
12:30 - 13:00
Welcome Coffee & Networking
13:00 - 18:00
CSLS Pre-Conference Workshop
Focusing Your Cybersecurity Investments: What Do You Really Need for Mitigating Your Cyber-risks?
Martin Kuppinger, Principal Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Paul Simmonds, Fellow Analyst, KuppingerCole
08:00 - 17:00
Check-in & Registration
Room: COUNTER
08:30 - 09:00
Welcome Coffee & Networking
Room: EXPO AREA
09:00 - 09:20
User Behaviour: The Link between CyberSecurity and Identity Management
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: Historische Kassenhalle
09:20 - 09:40
How Zero Trust is Creating a Game-Changing Security Experience
Dr. Torsten George, Product Evangelist, Centrify
Room: Historische Kassenhalle
09:40 - 10:00
Digital Transformation Journey for Industrial IOT – Cybersecurity Perspective
Alam Mohammad, Head of Cybersecurity & Privacy, Voith Digital Ventures
Room: Historische Kassenhalle
10:00 - 10:20
DevOps & Service Layers
Tim Hobbs, Microservices Evangelist, iC Consult
Room: Historische Kassenhalle
10:20 - 10:40
TBD
Dr. Michael von der Horst, Senior Director Cybersecurity Germany, Cisco
Room: Historische Kassenhalle
10:40 - 11:10
Coffee & Networking
Room: EXPO AREA
Zero Trust: Introducing a New Way of Thinking Into Your Cyber Strategy
Moderator: Martin Kuppinger, KuppingerCole
Room: Historische Kassenhalle
11:10 - 12:10
Building Blocks of a Future Proof Zero Trust Approach
From Network Protection to Data Security
Paul Simmonds, KuppingerCole
Zero Trust Model: Evolving Your Enterprise Security Strategy
12:10 - 13:10
Path to Zero Trust Security
Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional
Dragan Pendic, Accenture
Panel - Risk Assessment and Security Design
Dr. Torsten George, Centrify
Dragan Pendic, Accenture
Paul Simmonds, KuppingerCole
Social Engineering: Threats and Prevention
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard
11:10 - 12:10
Penetration Testing & Prevention Techniques
Evolution of Social Engineering Tactics and Defenses
John Tolbert, KuppingerCole
Social Engineering: Attack Techniques and Prevention
Richard De Vere, The AntiSocial Engineer Limited
TBD
Zoe Rose, Baringa Partners
12:10 - 13:10
Developing Awareness
Panel - Combating Social Engineering
Enrico Frumento, Cefriel
Zoe Rose, Baringa Partners
Richard De Vere, The AntiSocial Engineer Limited
The Evolution of Social Engineering 2.0 and Its Role in the Modern Cybercrime. The Experience of the Project DOGANA
Enrico Frumento, Cefriel
Moderne Trends und Strategien in Access Management
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm
11:10 - 12:10
Zukunft des Consumer Identity & Access Managements
CIAM: Die Kernherausforderung – Zurück zu den Wurzeln
Dr. Barbara Mandl, FOSTER FORE
Panel - Ein Blick in die Zukunft: CIAM Trends
Dr. Barbara Mandl, FOSTER FORE
Andre Priebe, iC Consult
Ann-Kathrin Schmitt, BioID GmbH
Agil & Sicher: Bereitstellen neuer Services für Kunden mit einer zentralen Sicherheitsplattform
Thomas Balmer, Pintail
12:10 - 13:10
Moderne Trends in IAM
Über OAuth hinaus: Sichern von APIs mit Richtlinien und Attribute-Based-Access-Control (ENG)
Mans Hakansson, Axiomatics
Die Evolution der Digitalen Identität - Von Personen hin zu Services und Dingen
Gerhard Zehethofer, ForgeRock
Vortrag 3 - Ping Identity
Erfolgreiche Berechtigungs- und Rollenoptimierung im laufenden Betrieb
Dr. Ludwig Fuchs, Nexis GmbH
Warum ein reines Access Management alleine nicht genug ist - Secure Access Hub
Thomas Kohl, Ergon Informatik
Vortrag 6 - Sailpoint
13:10 - 14:10
Lunch Break
Room: EXPO AREA
The New World of Security: User Behaviour Analytics
Moderator: Martin Kuppinger, KuppingerCole
Room: Historische Kassenhalle
14:10 - 15:10
Finding the Needle in Data Haystack
Leveraging UBA Solutions for Enterprise Security
User Behaviour Analytics (UBA) - The Enterprise Value Proposition
Chris Burtenshaw, Strata Security Solutions
15:10 - 16:10
Advanced Analytical Tools for Detection and Prevention of Cyber Attacks
Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber Leadership
Dr. Rachel Suissa, University of Haifa / National Security Program
Panel - AI and the Future of Cybersecurity
Yaniv Avidan, MinerEye
Dr. Doron Chema, L7 Defense
Martin Mangold, DriveLock SE
Dr. Rachel Suissa, University of Haifa / National Security Program
Cyber Threat Intelligence: Importance & Effective Use
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard
14:10 - 15:10
Implementation & Decision Making
Panel - Operationalizing Threat Intelligence
John Bryk, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)
John Unsworth, Revak
Ammi Virk, Hexegic B.V.
TBD
Richard Struse, Mitre
Information, Intelligence, and Human Factors
John Bryk, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)
15:10 - 16:10
Trends & Evolution
Panel - Cyber Threat Intelligence Best Practices
Mike Hart, FireEye
Ammi Virk, Hexegic B.V.
Aviram Zrahia, Juniper Networks
TBD
John Unsworth, Revak
Ammi Virk, Hexegic B.V.
DSGVO - Schaffung neuer Geschäftsmöglichkeiten
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm
14:10 - 15:10
DSGVO – Chance und Herausforderung
GDPR: So machen Sie mehr aus Ihrem Customer Data Management
Dr. Heiko Klarl, iC Consult
Panel - Datensouveränität im Kontext der digitalen Identität
Dirk Groesser, UBDG
Dr. Heiko Klarl, iC Consult
Marc Schieder, DRACOON GmbH
Philipp Schneidenbach, Ventum Consulting
15:10 - 16:10
Datenschutz durch Technik
Die DSGVO als Chance der digitalen Durchdringung - IT-Governance, Workflows und Compliance
Philipp Schneidenbach, Ventum Consulting
TBD
Dirk Groesser, UBDG
16:10 - 16:40
Coffee & Networking
Room: EXPO AREA
16:40 - 17:00
What is the Role of a CISO in 2020?
Dimitri Chichlo, Senior IT Security Advisor, UBP
Room: Historische Kassenhalle
17:00 - 17:20
Cybersecurity Start-Up Presentations
AI Powered Data Herding in Hybrid Cloud Environments
Yaniv Avidan, CEO-Co Founder, MinerEye
Case Study: From Thousands to Hundreds: How a Policy Based Approach Dramatically Improved Access Control and Authorization
Gal Helemski, Co Founder & CIPO, PlainID
Room: Historische Kassenhalle
17:20 - 17:40
Can You Trust UBA? -- Evaluating Machine Learning Algorithms in Practice
Peter Gyongyosi, Product Manager, One Identity
Room: Historische Kassenhalle
17:40 - 18:00
Keynote 9
Room: Historische Kassenhalle
18:00 - 18:20
Keynote 10
Room: Historische Kassenhalle
19:00 - 22:00
Cybersecurity Innovation Night
Machine & Deep Learning for the Secure Future
Room: Lounge
08:00 - 17:00
Check-in & Registration
Room: COUNTER
08:30 - 09:00
Welcome Coffee & Networking
Room: EXPO AREA
09:00 - 09:20
Defense-in-Depth: New Kinds of Tools for All the Layers
John Tolbert, Lead Analyst, KuppingerCole
Room: Historische Kassenhalle
09:20 - 9:40
Build Up a Security Operation Center and Provide Added-Value to Business Operations
Peter Dornheim, Head of IT Security, Festo AG & Co. KG
Room: Historische Kassenhalle
09:40 - 10:00
Developing a Strategy for Managing Incidents
Richard Bell, Director – Security & Privacy, TenIntelligence
Room: Historische Kassenhalle
10:00 - 10:20
CIAM as a Building Block of an Online-Success Story
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Room: Historische Kassenhalle
10:20 - 10:40
Your Move to “the Cloud” Secured
Martin Zeitler, Sr. Staff of CSO EMEA and Sr. Manager, Systems Engineering, Palo Alto Networks
Room: Historische Kassenhalle
10:40 - 11:10
Coffee & Networking
Room: EXPO AREA
IoT and Industrial IoT: Risks and Concerns
Moderator: Alexei Balaganski, KuppingerCole
Room: Historische Kassenhalle
11:10 - 12:10
Real Problems, Real Solutions
The Sorry State of Consumer IoT Security and How Can We Possibly Fix it
Alexei Balaganski, KuppingerCole
Cyber Security as Part of Industry 4.0
Marko Vogel, KPMG
12:10 - 13:10
Securing Critical Infrastructure in the Age of IoT
Effective Countermeasures For Securing Critical Infrastructure – A View On The Human Aspect
Tom Hofmann, EY
Panel - Future of Critical Infrastructure Security
Richard Bell, TenIntelligence
Tom Hofmann, EY
Dr. Danny Hughes, VersaSense
Marko Vogel, KPMG
Endpoint Management & Security: Getting It Right
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard
11:10 - 12:10
Endpoint Security Challenges
The State of the Art of Anti-Malware Protection
John Tolbert, KuppingerCole
Outsmarting Malware: The Big (Data) Picture
Aviram Zrahia, Juniper Networks
12:10 - 13:10
Future of Mobile Security
Panel - Case Studies on Endpoint Management
Mike Hart, FireEye
Nishant Kaushik, Uniken
Dr. Christian Schlaeger, Giesecke + Devrient Mobile Security GmbH
Improving Your Mobile Threat Defense Strategy
Blockchain ID für Unternehmen
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm
11:10 - 12:10
Blockchain und Self Sovereign Identity
Blockchain ID: Die Zukunft oder nur ein Hype? Konzepte, Status Herausforderungen
Martin Kuppinger, KuppingerCole
Panel - Self Sovereign Identity, DIDs und zukünftige Standards der Blockchain-Identität
Dr. André Kudra, esatus AG
Maximilian Möhring, Keyp
12:10 - 13:10
Blockchain ID und „Recht auf Vergessen“
Die Zukunft Digitaler Identität ist Dezentral – Aber Nicht Blockchain
Maximilian Möhring, Keyp
TBD
Dr. André Kudra, esatus AG
13:10 - 14:10
Lunch Break
Room: EXPO AREA
Application Security, Agility & Development
Moderator: Alexei Balaganski, KuppingerCole
Room: Historische Kassenhalle
14:10 - 15:10
Embracing Microservices & APIs
Containers, Microservices, APIs: The Latest DevOps Security Trends
Alexei Balaganski, KuppingerCole
Security By Design
15:10 - 16:10
Security in the Modern Application World
Application Security - Achieving Security at Speed and Scale
Dragan Pendic, Accenture
Panel - Achieving Consistent Enterprise Security
Kevin Bocek, Venafi
Tim Hobbs, iC Consult
Dragan Pendic, Accenture
Security as a Requirement for Governance & Privacy
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard
14:10 - 15:10
GDPR and the Global State of Privacy
Three Factors Marginalising the Historical Role of the CISO
Jean-Christophe Gaillard, Corix Partners
Panel - Life Under GDPR and Its Implications on Cybersecurity
Jean-Christophe Gaillard, Corix Partners
Alexander von Keller, Kaspersky Lab
Philipp Schneidenbach, Ventum Consulting
John Unsworth, Revak
Balkanization and IT Business Risk - How to Engage with a Divided Internet
Daniel Schnok, Deutsche Cyber Sicherheitsorganisation DCSO
15:10 - 16:10
Your Path To Compliance
Protecting What Matters (and Knowing How Well You Are Doing It…..!)
John Unsworth, Revak
GDPR as a Driver for Business Process Security
Philipp Schneidenbach, Ventum Consulting
Die neue Welt von Microservices und APIs
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm
14:10 - 15:10
Was sind die aktuellen Herausforderungen?
Microservices & API für Identity Management
Eleni Richter, EnBW
CIAM & API Management
Andre Priebe, iC Consult
15:10 - 16:10
Workshop
Workshop - Mobile Apps und Single Sign-On
Andre Priebe, iC Consult
16:10 - 16:40
Coffee & Networking
Room: EXPO AREA
16:40 - 17:00
The Future of Digital Business Security
Jochen Werne, Director, Bankhaus August Lenz
Room: Historische Kassenhalle
17:00 - 17:10
Closing Remarks
John Tolbert, Lead Analyst, KuppingerCole
Room: Historische Kassenhalle
Medium