15theCrime&CybersecurityDACH 2020 June 25, 2020 to June 25, 2020, Virtual, Virtual
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Panel: "Lessons from lockdown" | Frank Bertisch | N/APractical security for the work-from-home workforceCloud and cloud security strategies in the rush to digitalisationBending ... | |
How to Keep Business Continuity and Control Costs in Turbulent Times | Julian Totzek-hallhuber | Join this session to learn more about:Leveraging the cloud so that you can begin securing ... | |
Ransomware’s Evolution from blunt tool to sophisticated weapon | Israel Barak | Though ransomware attacks dropped significantly in early 2018, they have re-emerged with a vengeance with ... | |
Cybersecurity and the Home Office | Florian Stahl | Home office cybersecurity challengesOrganizational measures (guidelines, employee training, ...)Technical measures (VPN, encryption, secure video conference ... | |
NextGen Networks and Security - What does it look like? | Sergej Epp | What are the lessons learned with legacy networks, connectivity, and network security?Why does network security ... | |
Stopping Breaches Faster: Can you meet the 1/10/60 Minute Challenge? | David Weber | 1 Minute: Time to Detection — organizations should set a goal of allowing only one ... | |
The Human Factor – your people as last line of defense | Henning Hanke | Threat landscape and threat actors 2020Security awareness – not just knowledge transfer but behavioural changeCybersecurity ... | |
COVID-19, remote working and e-commerce: how are companies adapting to the evolving cybersecurity challenges? | Frank Augenstein | Security teams are at the forefront of protecting the distributed enterprise. Cybersecurity must be integrated ... | |
Panel: "Data protection for the New Normal" | Dr. Steffen Beutlich , Dr. Matthias Orthwein | Protecting data, exploiting data: the business challenge of data protectionManaging multi-country complianceEmployee surveillance and data ... | |
Building an effective training program for your cyber-pros | Rupert Collier | Learn cutting-edge training technologies and strategies for security team leadersOvercome limited budgets, time, as well ... | |
Next Generation Offensive Security Testing | Thomas Hornung | The noise within security circles has become overwhelming, making it difficult to focus on what ... | |
Communicating a (confirmed) data breach in the right way | Branko Džakula | Overview of top threats resulting in recorded data breachesWhere did big players fail in communication?How ... |