TEISS 2020 Oct. 27, 2020 to Oct. 29, 2020, Amsterdam, Netherlands
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Cyber and the Board: Security means Business | Steven Durbin | Enterprise risk management must be extended to create risk resilienceApproaches to managing the changing technological ... | |
Panel discussion: Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases | Sarah Janes , Zari Haji Rasoul , Daniel Norman | The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitativeRecognising ... | |
Current developments in cybersecurity and cybercrime in a post-COVID-19 world | Marco Gercke | How megatrends such as 5G, AI and Quantum Computing impact the cybersecurity landscapeBeyond “quantity and ... | |
Panel discussion: Threat trends for 2021 and beyond; Ransomware, data theft and reputational attacks | Marco Goettl | Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter ... | |
Continuous Vulnerability Management – Striving for a 14 Day SLA | Chris Goettl | When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ... | |
Enabling and securing employees in today’s work-from-anywhere world | Ross Asquith | Is 2020 the beginning of the end for traditional data centre security stacks?What’s the best ... | |
Panel discussion: Evaluating and minimising information security risks across multi-Cloud estate | Martijn Nykerk , Peter Asquith | Best practice in identifying, mitigating and managing multi-cloud risks – are there fundamental differences for ... | |
Reducing the Data Attack Surface: Overcoming barriers to cyber resilience | Yves Gheeraert | How to securely remove sensitive data at home and on-prem for a remote workforceHow to ... | |
Measuring your organisation’s information security posture – which metrics help you evaluate your posture? | Victoria Gheeraert | Overcoming communication challenges around communicating the guidelines for measuring and improving your information security postureData ... | |
The Infosec Colour Wheel: Blending the skills of Development, Red and Blue Teams for a rainbow of multi-disciplinary Security strengths | Sebastian Avarvarei | What can Developers (Yellow Team), Attackers (Red Team) and Defenders (Blue Team) learn from each ... | |
Panel discussion: Challenges and pitfalls in the drive to SOC modernisation | Sebastian Avarvarei , Greg Gaast , Matthias Maier | Communication and clarity – what is the SOC team responsible for, and for what are ... | |
Security Secrets: Why leading SOC teams have Cloud-y vision | Matthias Maier | Why it is key for Security Leaders to understand the business transformation and cloud strategy ... | |
Combatting cyber risk: enterprise detection and response | Ashish Khanna | How are SOC’s evolving today and ChallengesInsight on how to deliver a programmatic and structured ... | |
The changing needs of the CISO: Moving from hard technical skills to a soft skills focus | Quentyn Taylor | N/A | |
Panel discussion: Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas | Quentyn Taylor , Jay Moloo , Miguel Pieters | Running a risk assurance programme on 3rd party and critical suppliersReviewing supplier risk assessments – ... | |
Changing Cyber Landscapes: The Battle of Algorithms | Miguel Pieters | Paradigm shifts in the cyber-threat landscapeAdvancements in offensive AI attack techniquesHow defensive AI can fight ... |