Agenda 2019

"A good plan today is better than a perfect plan tomorrow. Don't wait for an inspired ending to come to mind. Work your way to the ending and see what comes up."
Andy Weir

You will learn:

  • How to develop Strategic Plans
  • How to create an effective Security Policy
  • How to embed design thinking in strategy creation
  • How to develop a Security Operation Centre
  • How to manage on-premise, cloud and hybrid environments
  • How to integrate CyberSecurity Principles into the Company’s culture
  • How to use Artificial Intelligence in CyberDefence
  • How IAM is becoming the main orchestrator of your IT environment

Attendees: CIO’s, CTO’s, CISO’s, IT Engineers and IT Architects

CPE Credits: Earn up to 8 CPEs for attending this conference. Please request a confirmation.

Location: Forum Genève, Rue de Lausanne 11-19, Geneva, Switzerland


8:00 - 8:30Registration & Welcoming coffee
8:30 - 8:45Welcome to the Zero-Day conference
Introduction given by PSYND
Mária Bicsi
Mauro Verderosa
8:45 - 9:00Opening keynote
The National Strategy for the Protection of Switzerland against Cyber Risks (NCS) and its importance for the Economy
Dr. Manuel Suter
Part I: Cybersecurity Strategy Planning
9:00 - 9:20The Market Place for Zero-Day Vulnerabilities
Alexandre Curty
Trend Micro
9:20 - 9:45Yet another Cybersecurity Framework for Financial Services?
Olivier Busolini
BNP Paribas Suisse
9:45 - 10:15Zero Trust
What does it mean and how do you achieve it with Cisco and Duo?
Alexis Gastaldello
10:15 - 10:35Cybersecurity Strategy based on Threat Hunting
Diogo Pata
Panda Security
10:35-11:10Coffee Break
Part II: Cloud Security
11:10 - 11:30Security and Compliance in the Cloud Era
Best practices to allow a secure migration to the Public Cloud
Michael Joffe
11:30 - 11:55How to migrate on-prem Solution smoothly and securly to the Cloud
Beate Fiedler
11:55 - 12:25Managing Encryption across multiple Clouds/Hybrid IT
Simple, Manageable, Safe?
Gary Marsden
Gemalto/Thales Group
12:25 - 12:45Your users don’t care about the network, so why try and push them there
Decoupling your users and applications from the network
Claus Vaupel
12:45 – 13:45Lunch break
Part III: Identity and Access Management
13:45 - 14:15How to reconciliate Cloud and Security thanks to Identity and Access Management?
Brice Mauclaire
14:15 - 14:40The Key of your Defense
Embed PAM into your Cybersecurity Strategy
Mauro Verderosa
14:40 - 15:10How AI became key in Identity Governance
Michael Briand
15:10 - 15:30How to protect your Value Chain in an API Ecosystem
Martin Zahner
15:30 – 15:55Coffee break
Part IV: Network and Application Security
16:00 - 16:20Mitigating the Risk of using Open Source Code in Application Development
Nabil Bousselham
16:20 - 16:50Approaches and Toolchains to Optimize SOC Operations
Chris Meidinger
16:50 - 17:10Quantum Computing
Disruptive Threat or Opportunity?
Dr. Eduardo Solana
University of Geneva
17:10 - 17:30Closing keynote
AI: Opportunities and Threats in the Cyberspace
Marc Andre Ryter
Swiss Armed Forces
17:30 – 17:45Closing Ceremony
17:45 - 19:00Cocktail Party

Join our conference

Register Now Save the date