Cybersecurity Leadership Summit 2018

About Cybersecurity Leadership Summit 2018

Cybersecurity is about humans, skills, and knowledge. So is the KuppingerCole's Cybersecurity Leadership Summit in Berlin, Germany (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. The summits represent the new thinking that really matters for a secure digital transformation of your enterprise. At the Berlin summit, you will find an impressive line-up of world-class keynote speakers, panel moderators, panelists, best practice presenters and professionals facing the same challenges as you do.

#CSLS18 will consist of two parallel streams. The keynotes, single presentations, and panel discussions will focus on the future of digital business security, increasing social engineering threats and innovative ways and strategies for mastering various security challenges. The speakers and panelists will discuss the current state and the future of IoT security, effective endpoint management, security requirements for governance and privacy and other relevant topics (see below). In our Berlin summit, you will get guidance for decisions critical for the security of your organization, interact with an engaged audience and enjoy an unparalleled content depth. Participate in the Cybersecurity Leadership Summit and navigate through the world of uncertainty and innovation!

Key Topics

The Future of Digital Business Security

Social Engineering: Threats and Prevention

Cyber Threat Intelligence: Importance & Effective Use

IoT and Industrial IoT: Risks and Concerns

Critical Infrastructure Security

Application Security, Agility & Development

Endpoint Management & Security: Getting It Right

The Role of AI, Machine Learning & Deep Learning

Blockchain & Cybersecurity: What Does the Future Hold?

Security as a Requirement for Governance & Privacy

Speakers

Dr. Ed Amoroso
CEO
Philipp Schneidenbach
Principal
Marc Miller
Partner
John Tolbert
Lead Analyst
Alexei Balaganski
Lead Analyst
Lisa Tuttle
CISO
View More (2)
Richard Struse
Chief Strategist, Cyber Threat Intelligence
Chase Nolin
CEO

Agenda

12:00 - 17:00
Conference Check-In
Room: COUNTER

12:30 - 13:00
Welcome Coffee & Networking

13:00 - 18:00
CSLS Pre-Conference Workshop
Focusing Your Cybersecurity Investments: What Do You Really Need for Mitigating Your Cyber-risks?
Martin Kuppinger, Principal Analyst, KuppingerCole
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Paul Simmonds, Fellow Analyst, KuppingerCole

08:00 - 17:00
Check-in & Registration
Room: COUNTER

08:30 - 09:00
Welcome Coffee & Networking
Room: EXPO AREA

09:00 - 09:20
User Behaviour: The Link between CyberSecurity and Identity Management
Martin Kuppinger, Principal Analyst, KuppingerCole
Room: Historische Kassenhalle

09:20 - 09:40
How Zero Trust is Creating a Game-Changing Security Experience
Dr. Torsten George, Product Evangelist, Centrify
Room: Historische Kassenhalle

09:40 - 10:00
Digital Transformation Journey for Industrial IOT – Cybersecurity Perspective
Alam Mohammad, Head of Cybersecurity & Privacy, Voith Digital Ventures
Room: Historische Kassenhalle

10:00 - 10:20
DevOps & Service Layers
Tim Hobbs, Microservices Evangelist, iC Consult
Room: Historische Kassenhalle

10:20 - 10:40
TBD
Dr. Michael von der Horst, Senior Director Cybersecurity Germany, Cisco
Room: Historische Kassenhalle

10:40 - 11:10
Coffee & Networking
Room: EXPO AREA

Zero Trust: Introducing a New Way of Thinking Into Your Cyber Strategy
Moderator: Martin Kuppinger, KuppingerCole
Room: Historische Kassenhalle

11:10 - 12:10
Building Blocks of a Future Proof Zero Trust Approach

From Network Protection to Data Security
Paul Simmonds, KuppingerCole

Zero Trust Model: Evolving Your Enterprise Security Strategy

12:10 - 13:10
Path to Zero Trust Security

Path to Zero Trust Security - Data Veracity, When Truth Is Essential and Trust Optional
Dragan Pendic, Accenture

Panel - Risk Assessment and Security Design
Dr. Torsten George, Centrify
Dragan Pendic, Accenture
Paul Simmonds, KuppingerCole

Social Engineering: Threats and Prevention
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard

11:10 - 12:10
Penetration Testing & Prevention Techniques

Evolution of Social Engineering Tactics and Defenses
John Tolbert, KuppingerCole

Social Engineering: Attack Techniques and Prevention
Richard De Vere, The AntiSocial Engineer Limited

TBD
Zoe Rose, Baringa Partners

12:10 - 13:10
Developing Awareness

Panel - Combating Social Engineering
Enrico Frumento, Cefriel
Zoe Rose, Baringa Partners
Richard De Vere, The AntiSocial Engineer Limited

The Evolution of Social Engineering 2.0 and Its Role in the Modern Cybercrime. The Experience of the Project DOGANA
Enrico Frumento, Cefriel

Moderne Trends und Strategien in Access Management
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm

11:10 - 12:10
Zukunft des Consumer Identity & Access Managements

CIAM: Die Kernherausforderung – Zurück zu den Wurzeln
Dr. Barbara Mandl, FOSTER FORE

Panel - Ein Blick in die Zukunft: CIAM Trends
Dr. Barbara Mandl, FOSTER FORE
Andre Priebe, iC Consult
Ann-Kathrin Schmitt, BioID GmbH

Agil & Sicher: Bereitstellen neuer Services für Kunden mit einer zentralen Sicherheitsplattform
Thomas Balmer, Pintail

12:10 - 13:10
Moderne Trends in IAM

Über OAuth hinaus: Sichern von APIs mit Richtlinien und Attribute-Based-Access-Control (ENG)
Mans Hakansson, Axiomatics

Die Evolution der Digitalen Identität - Von Personen hin zu Services und Dingen
Gerhard Zehethofer, ForgeRock

Vortrag 3 - Ping Identity

Erfolgreiche Berechtigungs- und Rollenoptimierung im laufenden Betrieb
Dr. Ludwig Fuchs, Nexis GmbH

Warum ein reines Access Management alleine nicht genug ist - Secure Access Hub
Thomas Kohl, Ergon Informatik

Vortrag 6 - Sailpoint

13:10 - 14:10
Lunch Break
Room: EXPO AREA

The New World of Security: User Behaviour Analytics
Moderator: Martin Kuppinger, KuppingerCole
Room: Historische Kassenhalle

14:10 - 15:10
Finding the Needle in Data Haystack

Leveraging UBA Solutions for Enterprise Security

User Behaviour Analytics (UBA) - The Enterprise Value Proposition
Chris Burtenshaw, Strata Security Solutions

15:10 - 16:10
Advanced Analytical Tools for Detection and Prevention of Cyber Attacks

Mapping the Comprehensive Cyber Human Factor with Implications on AI and Future Cyber Leadership
Dr. Rachel Suissa, University of Haifa / National Security Program

Panel - AI and the Future of Cybersecurity
Yaniv Avidan, MinerEye
Dr. Doron Chema, L7 Defense
Martin Mangold, DriveLock SE
Dr. Rachel Suissa, University of Haifa / National Security Program

Cyber Threat Intelligence: Importance & Effective Use
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard

14:10 - 15:10
Implementation & Decision Making

Panel - Operationalizing Threat Intelligence
John Bryk, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)
John Unsworth, Revak
Ammi Virk, Hexegic B.V.

TBD
Richard Struse, Mitre

Information, Intelligence, and Human Factors
John Bryk, Downstream Natural Gas Information Sharing and Analysis Center (DNG-ISAC)

15:10 - 16:10
Trends & Evolution

Panel - Cyber Threat Intelligence Best Practices
Mike Hart, FireEye
Ammi Virk, Hexegic B.V.
Aviram Zrahia, Juniper Networks

TBD
John Unsworth, Revak
Ammi Virk, Hexegic B.V.

DSGVO - Schaffung neuer Geschäftsmöglichkeiten
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm

14:10 - 15:10
DSGVO – Chance und Herausforderung

GDPR: So machen Sie mehr aus Ihrem Customer Data Management
Dr. Heiko Klarl, iC Consult

Panel - Datensouveränität im Kontext der digitalen Identität
Dirk Groesser, UBDG
Dr. Heiko Klarl, iC Consult
Marc Schieder, DRACOON GmbH
Philipp Schneidenbach, Ventum Consulting

15:10 - 16:10
Datenschutz durch Technik

Die DSGVO als Chance der digitalen Durchdringung - IT-Governance, Workflows und Compliance
Philipp Schneidenbach, Ventum Consulting

TBD
Dirk Groesser, UBDG

16:10 - 16:40
Coffee & Networking
Room: EXPO AREA

16:40 - 17:00
What is the Role of a CISO in 2020?
Dimitri Chichlo, Senior IT Security Advisor, UBP
Room: Historische Kassenhalle

17:00 - 17:20
Cybersecurity Start-Up Presentations
AI Powered Data Herding in Hybrid Cloud Environments
Yaniv Avidan, CEO-Co Founder, MinerEye

Case Study: From Thousands to Hundreds: How a Policy Based Approach Dramatically Improved Access Control and Authorization
Gal Helemski, Co Founder & CIPO, PlainID
Room: Historische Kassenhalle

17:20 - 17:40
Can You Trust UBA? -- Evaluating Machine Learning Algorithms in Practice
Peter Gyongyosi, Product Manager, One Identity
Room: Historische Kassenhalle

17:40 - 18:00
Keynote 9
Room: Historische Kassenhalle

18:00 - 18:20
Keynote 10
Room: Historische Kassenhalle

19:00 - 22:00
Cybersecurity Innovation Night
Machine & Deep Learning for the Secure Future
Room: Lounge

08:00 - 17:00
Check-in & Registration
Room: COUNTER

08:30 - 09:00
Welcome Coffee & Networking
Room: EXPO AREA

09:00 - 09:20
Defense-in-Depth: New Kinds of Tools for All the Layers
John Tolbert, Lead Analyst, KuppingerCole
Room: Historische Kassenhalle

09:20 - 9:40
Build Up a Security Operation Center and Provide Added-Value to Business Operations
Peter Dornheim, Head of IT Security, Festo AG & Co. KG
Room: Historische Kassenhalle

09:40 - 10:00
Developing a Strategy for Managing Incidents
Richard Bell, Director – Security & Privacy, TenIntelligence
Room: Historische Kassenhalle

10:00 - 10:20
CIAM as a Building Block of an Online-Success Story
Matthias Reinwarth, Lead Advisor & Senior Analyst, KuppingerCole
Room: Historische Kassenhalle

10:20 - 10:40
Your Move to “the Cloud” Secured
Martin Zeitler, Sr. Staff of CSO EMEA and Sr. Manager, Systems Engineering, Palo Alto Networks
Room: Historische Kassenhalle

10:40 - 11:10
Coffee & Networking
Room: EXPO AREA

IoT and Industrial IoT: Risks and Concerns
Moderator: Alexei Balaganski, KuppingerCole
Room: Historische Kassenhalle

11:10 - 12:10
Real Problems, Real Solutions

The Sorry State of Consumer IoT Security and How Can We Possibly Fix it
Alexei Balaganski, KuppingerCole

Cyber Security as Part of Industry 4.0
Marko Vogel, KPMG

12:10 - 13:10
Securing Critical Infrastructure in the Age of IoT

Effective Countermeasures For Securing Critical Infrastructure – A View On The Human Aspect
Tom Hofmann, EY

Panel - Future of Critical Infrastructure Security
Richard Bell, TenIntelligence
Tom Hofmann, EY
Dr. Danny Hughes, VersaSense
Marko Vogel, KPMG

Endpoint Management & Security: Getting It Right
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard

11:10 - 12:10
Endpoint Security Challenges

The State of the Art of Anti-Malware Protection
John Tolbert, KuppingerCole

Outsmarting Malware: The Big (Data) Picture
Aviram Zrahia, Juniper Networks

12:10 - 13:10
Future of Mobile Security

Panel - Case Studies on Endpoint Management
Mike Hart, FireEye
Nishant Kaushik, Uniken
Dr. Christian Schlaeger, Giesecke + Devrient Mobile Security GmbH

Improving Your Mobile Threat Defense Strategy
Blockchain ID für Unternehmen
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm

11:10 - 12:10
Blockchain und Self Sovereign Identity

Blockchain ID: Die Zukunft oder nur ein Hype? Konzepte, Status Herausforderungen
Martin Kuppinger, KuppingerCole

Panel - Self Sovereign Identity, DIDs und zukünftige Standards der Blockchain-Identität
Dr. André Kudra, esatus AG
Maximilian Möhring, Keyp

12:10 - 13:10
Blockchain ID und „Recht auf Vergessen“

Die Zukunft Digitaler Identität ist Dezentral – Aber Nicht Blockchain
Maximilian Möhring, Keyp

TBD
Dr. André Kudra, esatus AG

13:10 - 14:10
Lunch Break
Room: EXPO AREA

Application Security, Agility & Development
Moderator: Alexei Balaganski, KuppingerCole
Room: Historische Kassenhalle

14:10 - 15:10
Embracing Microservices & APIs

Containers, Microservices, APIs: The Latest DevOps Security Trends
Alexei Balaganski, KuppingerCole

Security By Design

15:10 - 16:10
Security in the Modern Application World

Application Security - Achieving Security at Speed and Scale
Dragan Pendic, Accenture

Panel - Achieving Consistent Enterprise Security
Kevin Bocek, Venafi
Tim Hobbs, iC Consult
Dragan Pendic, Accenture

Security as a Requirement for Governance & Privacy
Moderator: John Tolbert, KuppingerCole
Room: Carl von Gontard

14:10 - 15:10
GDPR and the Global State of Privacy

Three Factors Marginalising the Historical Role of the CISO
Jean-Christophe Gaillard, Corix Partners

Panel - Life Under GDPR and Its Implications on Cybersecurity
Jean-Christophe Gaillard, Corix Partners
Alexander von Keller, Kaspersky Lab
Philipp Schneidenbach, Ventum Consulting
John Unsworth, Revak

Balkanization and IT Business Risk - How to Engage with a Divided Internet
Daniel Schnok, Deutsche Cyber Sicherheitsorganisation DCSO

15:10 - 16:10
Your Path To Compliance

Protecting What Matters (and Knowing How Well You Are Doing It…..!)
John Unsworth, Revak

GDPR as a Driver for Business Process Security
Philipp Schneidenbach, Ventum Consulting

Die neue Welt von Microservices und APIs
Moderator: Matthias Reinwarth, KuppingerCole
Room: Caroline & Wilhelm

14:10 - 15:10
Was sind die aktuellen Herausforderungen?

Microservices & API für Identity Management
Eleni Richter, EnBW

CIAM & API Management
Andre Priebe, iC Consult

15:10 - 16:10
Workshop

Workshop - Mobile Apps und Single Sign-On
Andre Priebe, iC Consult

16:10 - 16:40
Coffee & Networking
Room: EXPO AREA

16:40 - 17:00
The Future of Digital Business Security
Jochen Werne, Director, Bankhaus August Lenz
Room: Historische Kassenhalle

17:00 - 17:10
Closing Remarks
John Tolbert, Lead Analyst, KuppingerCole
Room: Historische Kassenhalle

Medium+

Start:
Nov 13, 2018, 9:00 AM
End:
Nov 13, 2018, 6:00 PM
Planning an ICO? We can help with a wide range of support for all stages of your ICO