CybersecurityLeadershipSummit 2020 Nov. 9, 2020 to Nov. 11, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cybersecurity Trends in the Age of Work from Home Martin Kuppinger The way people are working has changed fundamentally. Cybersecurity is even more essential than before. ...
The Cyber Security Skills Gap: Real Problem or Self-inflicted Pain? Jean-christophe Gaillard You don’t have to go far these days to find security professionals complaining about skills ...
COVID-19 Cybersecurity Attacks Flavio Aggio Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. ...
The Evolution of Application Security Mario Van Riesen , Major Account Manager , Shape F5) Cyberattacks have rapidly evolved since the advent of online transacting almost 25 years ago, with ...
Choosing the Right IAM solution to secure your Hybrid Cloud Environment Matt Berzinski In 2020 organizations have been forced to accelerate their digital transformation plans to meet the ...
Business Continuity – Learnings in the Light of the Corona Crisis Rolf von Roessing N/A
Need for Speed: How DevOps is Changing Cybersecurity Sergej Ward Is your cybersecurity as fast as your business? Finding the right strategy to secure the ...
Cyber Resilience - Regulatory Developments in the Financial Services Industry (and Beyond) Steffen Minkmar Cyber resilience, a term often heard but never fully understood, has made headlines for many ...
The Confessions of an X-CISO: Identity Centric Security @ Enterprise Scale Darran Rolls N/A
IT-OT Convergence of Security Enrico Frumento Experts define Operational Technology (OT) as «hardware and software that detects or causes a change, ...
Panel - Zero Trust Paradigm for the Future of Security Morey J. Haber , Max Rolls N/A
Improving Operational Maturity with an Automation First Strategy Bryan Christ In his keynote, Bryan will talk on how automating Identity and Access Management can evolve ...
The Future Role of the CISO Greg Gaast , Head Security , University Of Salford N/A Home Grown Machine Learning Implementation for the SOCBrennan Lodgehttps://www.kuppingercole.com/watch/csls2020_2020_11_10_lodgeN/AThe machine learning deployment, integration, and ...
Panel - Accelerating Digital Transformation with Secure Cloud Access Sergej Epp , Matt Berzinski , Raif Mehmet N/A
Panel - European Cybersecurity Job Market and the Gender Perspective President , Jean-christophe Gaillard , Anett Mádi-nátor , Rayna Stamboliyska N/A
Safer With Security - How Fabrics Can Be Used to Manage the Complexity of Your Enterprise Security Christopher Schuetze A flexible architecture is an absolute must in order to keep pace with new challenges ...
Cyber Navigation in Turbulent Times – How Cyber Maturity Assessments Provide a Sense of Direction Martin Rohrer When navigating a big ship, it is crucial to know your position and the course ...
C-Level Cybersecurity Awareness – Does the C-Suite Fall Behind in Understanding the Importance of Cybersecurity Services? Anett Mádi-nátor In the crisis created by Covid-19 it is even more obvious how C-level are reacting ...
Security by Design IoT Development and Certificate Framework Ana Fernández-cuesta Next-generation of Smart IoT Systems needs to manage the closed loop from sensing to actuation ...
Minimising Risk from Cyber Threats: Focus on Reducing Time to Containment Jan Tietze N/A
No Chance for Hackers and Spies. Why Thyssenkrupp Takes a Completely Different Approach to Security Joerg Malewski Markus Malewski, Head of SOC / SIEM at thyssenkrupp gives an insight how thyssenkrupp re-formed ...
A Small Leak Can Sink A Great Ship - Cybersecurity Warfare & SAP Jochen Fischer Security is Culture – and culture starts with people (not technology!) The complex topic of ...
Social Engineering - Exploiting the Human Factor Espen Otterstad N/A Panel - Assuring the Security of Your Enterprise - Social Engineering and PentestingEspen Otterstad, ...
EU Cybersecurity Policy Actions and Priorities Jakub Boratyński Applications of artificial intelligence (AI) for cybersecurity tasks are attracting greater attention from the private ...
The CAP-A Best Practice: Towards Enabling a Privacy-Friendly Apps Market by Applying a Crowdsourcing-Based Evaluation Approach Ioannis Chrysakis N/A