e-Crime Germany 2013 Jan. 31, 2013 to Jan. 31, 2013, Germany,Frankfurt

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome to the e-Crime Germany "chairman's Welcome" N/A Security
Spending is pretending - from denial to self delusion to compliance: lessons from the coal face on achieving effective security risk reduction John Delaney Denial as a strategy: past and present Self delusion and its potential costs Getting it ...
Mapping the path toward information security and business continuity maturity: a risk based approach Ali Baccouche Challenges and solutions: critical factors required to make a risk based approach successful The start ...
How to automate vulnerability management to make it more effective Linus Degrell Dealing with vulnerability management and vulnerabilities in your network is today an enourmous task unless ...
Preparing for future attacks: implementing the right security strategy now Stefano Rebulla "Cybercrime is becoming a popular subject of discussion in the boardroom. Recent malware incidents have ...
Myths versus Reality when fighting DDoS attacks Ron Meyran "Organizations today face a tremendous wave of financially motivated and Hacktivist attacks that threaten their ... Security
Total control: taking control of enterprise SSL Matthias Senft "It's a heart stopping moment, it's Friday evening a non-managed SSL certificate has expired putting ... Security
Assessing the information security of 3rd party data processors Heinrich Lottmann Understanding compliance regulations to assess data processors in Germany: what is required? Implementing a programme ...
Delivering effective IT risk management: a case study an EU organization Krisztian Piller Why are we doing IT risk management? Communicating value to management Defining roles and processes ...
Implementing a data leakage prevention project Frank Rinkens "The start of the journey: getting business buy-in, winning senior management support and key challenges ...