Networking, Exchange and Strategic Update for Cybersecurity Professionals

Cybersecurity is a never-ending war game. New tech trends – like 5G, AI, Web3, IoT, remote work and a vastly scaling cloud infrastructure – cause a further increase of touchpoints, data, speed, applications and complexity – offering new opportunities for attackers, as well as for defenders. On top of the tech challenges erupting military and economic conflicts cause a more heterogenous and capable spectrum of attackers - urging security professionals to tackle powerful state players, organized crime and untrustworthy companies even more. Last, but not least the ongoing shortage of internal cybersecurity skills remains to be a challenge. At this intensive 1-day networking conference corporate executives, scientists, experts and solution providers exchange views on the latest cybersecurity developments, models, threats, strategies and technologies in various formats: Assembly, one-on-one meetings, group meetings and workshops. Meetings can be prepared with our networking app.

Interactive Networking Format

  • Inspiring talks (Cutting-edge business cases, strategies, technology, best management practices, analysis, methods)
  • Workshops
  • Networking meetings
  • Online archive and community

Topics (Selection)

  • Current Strategic Threats
  • Strategic Models
  • Cybersecurity Management Models
  • MDR (Managed Detection and Response)
  • Realistic and feasible ways to create more awareness and skills
  • E-Learning and Gamification to build skills
  • XDR (Extended Detection and Response)
  • SIEM (Security Information and Event Management)
  • SOAR (Security Orchestration, Automation and Response)
  • Cybersecurity Technology Stack (Visibility, Boundary Defense, Access Control, Device Handling, Threat Detection and Response)
  • Cyber Defense Matrix
  • Critical Infrastructure
  • IAM (Identity and Access Management)
  • AI / ML Impacts on Cybersecurity (good and bad)
  • Threat Intelligence
  • Application Security
  • User & Entity Behavioral Analytics
  • Endpoint Protection
  • Cloud Security
  • Data Security
  • Zero Trust
  • SASE (Secure Access Service Edge)
  • CIEM (Cloud Infrastructure Entitlements Management)
  • CSPM (Cloud Security Posture Management)
  • PAM (Privileged Access Management)
  • Ransomware
  • New Challenges in Mobile Security / 5G
  • IS / OS Convergence
  • IoT Threats
  • Major Regulation and Compliance Trends
  • Securing Remote Work and Distributed Teams

Das Networking hat sehr gut geklappt, wunderbar! Die Vorträge waren spannend!

Marko Wolter, HR Director EMEA, DMG Mori AG

Ich möchte mich nochmals für den Swiss Leaders Dialog Digital HR Disruption bedanken. Die Inputs der Referenten haben angeregt und die Netzwerkgespräche waren bereichernd.

Rolf Arnet, Head Human Resources Management, Aduno Gruppe

Besten Dank für die Organisation des Events, ich war von der Qualität vieler Vorträge positiv überrascht.

Patrick Berchtold, Product Marketing Manager, hubware

Zunächst möchte ich mich für den tollen Anlass bedanken. Es waren einige spannende Impulsvorträge dabei und die Organisation des Events war vorbildlich.

Andreas Schnurrenberger, Sales Manager Industrial Systems & HVSG, Bucher Hydraulics AG

Es war eine wirklich tolle und ergiebige Veranstaltung. Sowohl die Inhalte als auch das Networking waren perfekt. Ich möchte mich bei Ihnen noch einmal für Ihre sehr gute Organisation bedanken.

Angela Koch, Marketing Manager, apetito AG

Clara Maathuis, PhD, Assistant Professor in AI & Cyber Operations, Open University of the Netherlands

Offensive Glasses in Cyber Security and AI

  • Current major security threats
  • Offensive cybersecurity
  • AI security and privacy attacks
  • AI generation and detection of social media manipulation
  • Cyber warfare

Dirk-Andrew Heil, CIO, BDO Germany

How to Balance Security Requirements and Business Processes in AI-Driven Applications

  • Regulatory request regarding AI/ML in financial business applications
  • New testing demands, driven by business logic and security requirements alike
  • New threat vectors (e.g. poisoning deep neural networks by providing poisoned data)
  • How to deal with this ambivalence from CIO´s perspective

Manfred Rieck, VP Individual Solution Development, DB Systel (Deutsche Bahn)

Post Quantum Cryptography in Practice - an Answer Towards Quantum Threats

  • Quantum computing progress – the worldwide ecosystem becomes mature: I’ll give some details about the worldwide development of the systems for the hardware and the software stack
  • Threats through quantum computing for the IT: The threat for asymmetric encryption is already known, the adoption of our PKI systems needs to be initiated
  • Answers and call for action today: There are worldwide activities on how to proceed, e.g. from NIST and the German Federal Office for Security in Information Technology. I’ll give some good practices how to start.

Nouri Alnahawi, PHD Candidate, Darmstadt University of Applied Sciences, Department of Computer Sciences & Nils von Nethen, IT Security Manager, Finanz Informatik

Anticipating Cryptographic Risks in the Dawning Age of Quantum Computing

  • Crypto-Agility Maturity Model (CAMM)
  • Agile replacement of cryptographic building blocks is enabling long-term context-aware security
  • CAMM can determine the crypto-agility of IT ecosystems
  • Cryptographically relevant quantum computers (CRQC) will soon be able to break today’s prevalent classic cryptography
  • Post-quantum cryptography (PQC) must be available before CRQC enter the market
  • Migration from classic cryptography to PQC

Zakki Ghauri, Director of Digital & IT, City of London Corporation

How to Improve the Security Culture of an Organisation

Monika Atanasova, CISM, Cyber TPRM, Information Security, Raiffeisen Banking Group

Best Practice Cyber TPRM Automation and Digitalization: Cyber Risk Cockpit

  • Security assessments workflow automation
  • Comprehensive cyber TPRM profiling
  • Reporting: KPIs/KRIs in our cyber risk cockpit
  • AI & threat intelligence
TimeActivity
07:30Start Registration
08:30Opening by the chairman
08:45Use Case / Strategy Insights / Management Practices

TBA

09:15Use Case / Strategy Insights / Management Practices

TBA
09:45Use Case / Strategy Insights / Management Practices

TBA
10:15Use Case / Strategy Insights / Management Practices

TBA
10:45Coffee break with networking
11:15Workshop 1

TBA

Workshop 2

TBA

Or individual networking – arrange meetings with our app

11:30
11:45
12:00Lunch with networking
13:00Use Case / Strategy Insights / Management Practices

TBA
13:30Use Case / Strategy Insights / Management Practices

TBA
14:00Use Case / Strategy Insights / Management Practices

TBA
14:30Coffee break with networking
15:00Workshop 1

TBA

Workshop 2

TBA

Or individual networking – arrange meetings with our app

15:15
15:30
16:00Use Case / Strategy Insights / Management Practices

TBA
16:30Use Case / Strategy Insights / Management Practices

TBA
17:00Use Case / Strategy Insights / Management Practices

TBA
17:30Closing discussion and wrap-up
TimeActivity
07:30Start Registration
08:30Opening by the chairman
08:45Use Case / Strategy Insights / Management Practices

TBA

09:15Use Case / Strategy Insights / Management Practices

TBA
09:45Use Case / Strategy Insights / Management Practices

TBA
10:15Use Case / Strategy Insights / Management Practices

TBA
10:45Coffee break with networking
11:15Workshop 1

TBA

Workshop 2

TBA

Or individual networking – arrange meetings with our app

11:30
11:45
12:00Lunch with networking
13:00Use Case / Strategy Insights / Management Practices

TBA
13:30Use Case / Strategy Insights / Management Practices

TBA
14:00Use Case / Strategy Insights / Management Practices

TBA
14:30Coffee break with networking
15:00Workshop 1

TBA

Workshop 2

TBA

Or individual networking – arrange meetings with our app

15:15
15:30
16:00Use Case / Strategy Insights / Management Practices

TBA
16:30Use Case / Strategy Insights / Management Practices

TBA
17:00Use Case / Strategy Insights / Management Practices

TBA
17:30Closing discussion and wrap-up

Dorint Airport Zürich, Riethofstrasse 40, CH-8152 Opfikon, Phone +41 44 808 10 00


Registration

    I book ticket/s for 349 CHF each

    First Name

    Family Name

    Company/Organisation

    Street

    Postal code

    City

    Country

    E-Mail

    Phone

    Your Ticket Includes

    • Access to all parts of the program (on-site or online, as you prefer)
    • Access to our networking app (if you like) to arrange meetings (on-site or online)
    • Access to online community with decks, videos and contacts
    • Full catering (for on-site participants)
    • Certificate of completion

    Send us a message