15theCrime&CybersecurityDACH 2020 June 25, 2020 to June 25, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Panel: "Lessons from lockdown" Frank Bertisch N/APractical security for the work-from-home workforceCloud and cloud security strategies in the rush to digitalisationBending ...
How to Keep Business Continuity and Control Costs in Turbulent Times Julian Totzek-hallhuber Join this session to learn more about:Leveraging the cloud so that you can begin securing ...
Ransomware’s Evolution from blunt tool to sophisticated weapon Israel Barak Though ransomware attacks dropped significantly in early 2018, they have re-emerged with a vengeance with ...
Cybersecurity and the Home Office Florian Stahl Home office cybersecurity challengesOrganizational measures (guidelines, employee training, ...)Technical measures (VPN, encryption, secure video conference ...
NextGen Networks and Security - What does it look like? Sergej Epp What are the lessons learned with legacy networks, connectivity, and network security?Why does network security ...
Stopping Breaches Faster: Can you meet the 1/10/60 Minute Challenge? David Weber 1 Minute: Time to Detection — organizations should set a goal of allowing only one ...
The Human Factor – your people as last line of defense Henning Hanke Threat landscape and threat actors 2020Security awareness – not just knowledge transfer but behavioural changeCybersecurity ...
COVID-19, remote working and e-commerce: how are companies adapting to the evolving cybersecurity challenges? Frank Augenstein Security teams are at the forefront of protecting the distributed enterprise. Cybersecurity must be integrated ...
Panel: "Data protection for the New Normal" Dr. Steffen Beutlich , Dr. Matthias Orthwein Protecting data, exploiting data: the business challenge of data protectionManaging multi-country complianceEmployee surveillance and data ...
Building an effective training program for your cyber-pros Rupert Collier Learn cutting-edge training technologies and strategies for security team leadersOvercome limited budgets, time, as well ...
Next Generation Offensive Security Testing Thomas Hornung The noise within security circles has become overwhelming, making it difficult to focus on what ...
Communicating a (confirmed) data breach in the right way Branko Džakula Overview of top threats resulting in recorded data breachesWhere did big players fail in communication?How ...