Cyber Summit - Geneva

Cyber Summit - Geneva

By Kudelski Security

Date and time

Thursday, November 30, 2017 · 12 - 6:30pm CET

Location

Geneva

Hotel President Wilson Quai Wilson 47 1211 Genève Switzerland

Description

Kudelski Security Cyber Summit - Geneva

At the beginning of 2017 we hosted the first edition of our Cyber Summits in Geneva and Zürich, today we bring you the latest edition in Geneva on the 30th November 2017.

Join us for a technical workshop in the morning delivered by Crowdstrike and an afternoon filled with insights into the latest capabilities and techniques that better defend you against the ever-changing cybersecurity landscape. The event will close with a rich networking cocktail.


* If you are interested in both the morning and the afternoon sessions, please select both tickets.

** Press & marketing agencies as well as IT & IT security resellers are not authorized to take part.





Après la 1ère édition de nos ‘Cyber Summits’ organisée à Genève et Zürich en début d’année, nous avons le plaisir de vous inviter à notre prochaine édition qui aura lieu à Genève le 30 novembre 2017.

Rejoignez-nous dans la matinée pour assister à un atelier technique présenté par Crowdstrike, l'un de nos partenaires technologiques. Durant l’après-midi, nos experts et nos partenaires vous présenteront de nouvelles technologies et des approches innovantes qui vous permettront de compléter votre arsenal de lutte contre la cyber criminalité et ainsi répondre à l’évolution constante des cyber menaces.
L'évènement se terminera avec un apéro dînatoire qui vous permettra d'étendre votre réseau de connaissances.


* Si vous êtes intéressé(e) par l'atelier technique du matin et le séminaire de l'après-midi, sélectionnez les 2 tickets.

** Les agences marketing et de presse, ainsi que les revendeurs de solutions IT & IT security ne sont pas autorisés à participer à cet événement.



AGENDA


10:45 - 12:00 CrowdStrike - Technical Workshop


12:00 - 13:00 Welcome and buffet lunch


13:00 - 13:40 Introduction & Secure Blueprint
Presenter: Philippe Borloz — Vice President - EMEA Sales & Martin Dion — Vice President EMEA Delivery
Kudelski Security


13:40 - 14:20 The art of deception


Presenter: Uli Peled — Regional Manager
Illusive Networks


When advanced attackers compromise a network, they relentlessly advance towards a clearly defined target. To reach their goal, these persistent, highly skilled attackers repeatedly collect data, analyze it, and use it to move laterally. Deception technology is the most effective way to detect advanced attackers early as it uses their own persistence and iterative tactics against them. Using fake information such as user-credentials, servers, and websites, you can detect attackers before they reach sensitive data. To remain one step ahead, state-of-the-art, network-optimized deceptions automatically and dynamically construct a deceptive layer over your entire network, with zero IT footprint and no agents installed. By constantly creating an environment where attackers cannot tell real information from fake information, deceptions ensure that the data attackers collect is always unreliable. And if attackers cannot rely on collected data, they cannot proceed and the attack is neutralized.


14:20 - 15:00 Threats are evolving. A new approach to cybersecurity is required
Presenter: Stefan Schweizer — Sales Manager
LogRhythm


It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.

TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:
• Advanced machine analytics, which are key to discovering potential threats quickly.
• Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.

Key take aways:
• Determine if your spending is focused on the right areas.
• Understand how to prevent high-impact cyber incidents.
• Discover how can you lower your TCO and maximise the ROI of your security technology.


15:00 - 15:20 Coffee break & demo


15:20 - 15:40 Swiss Threat Landscape – A security operations view
Presenter: Olivier Spielmann — Director EMEA MSS Operations
Kudelski Security


This presentation will provide an overview of the Swiss threat landscape in 2017 as seen from a Security Operations point of view. Some real threat examples will be presented in perspective with the current exposure as well as typical mitigations paths that could be followed.



15:40 - 16:20 Where identity meets data
Presenter: Geoffroy Hy — Senior Sales Engineer
SailPoint


Managing access to information systems and company data is becoming more and more critical, as evidenced by recent events.

The goal of this event is to present SailPoints vision as the leader in their field, and to introduce you to their innovative solutions which enable businesses to meet these challenges as well as giving management the visibility and control over who has access to what information, who does what within the information system, whether they are compliant with security policies and, of course, whether they can show this in the event of an audit.



16:20 - 17:00 Why using intelligence is crucial for your business


Presenter: Jason Teplitz — Solutions Architect
CrowdStrike


Synopsis: In this session, you will learn the importance of Intelligence in preventing your environment. We will present how to identify Threat Actors at play and how you can operationalise this data into your environment effectively.

We will offer real-world strategic insight into the current threat landscape, offering practical tips on how you can utilise intelligence to protect your organisation.


17:00 - 18:30 Cocktail & Networking


Organized by

Sales Ended