Agenda 2019
"A good plan today is better than a perfect plan tomorrow. Don't wait for an inspired ending to come to mind. Work your way to the ending and see what comes up."
Andy Weir
You will learn:
- How to develop Strategic Plans
- How to create an effective Security Policy
- How to embed design thinking in strategy creation
- How to develop a Security Operation Centre
- How to manage on-premise, cloud and hybrid environments
- How to integrate CyberSecurity Principles into the Company’s culture
- How to use Artificial Intelligence in CyberDefence
- How IAM is becoming the main orchestrator of your IT environment
Attendees: CIO’s, CTO’s, CISO’s, IT Engineers and IT Architects
CPE Credits: Earn up to 8 CPEs for attending this conference. Please request a confirmation.
Location: Forum Genève, Rue de Lausanne 11-19, Geneva, Switzerland
Agenda:
8:00 - 8:30 | Registration & Welcoming coffee | |
8:30 - 8:45 | Welcome to the Zero-Day conference Introduction given by PSYND | Mária Bicsi Mauro Verderosa |
8:45 - 9:00 | Opening keynote The National Strategy for the Protection of Switzerland against Cyber Risks (NCS) and its importance for the Economy | Dr. Manuel Suter MELANI |
Part I: Cybersecurity Strategy Planning | ||
9:00 - 9:20 | The Market Place for Zero-Day Vulnerabilities | Alexandre Curty Trend Micro |
9:20 - 9:45 | Yet another Cybersecurity Framework for Financial Services? | Olivier Busolini BNP Paribas Suisse |
9:45 - 10:15 | Zero Trust What does it mean and how do you achieve it with Cisco and Duo? | Alexis Gastaldello CISCO |
10:15 - 10:35 | Cybersecurity Strategy based on Threat Hunting | Diogo Pata Panda Security |
10:35-11:10 | Coffee Break | |
Part II: Cloud Security | ||
11:10 - 11:30 | Security and Compliance in the Cloud Era Best practices to allow a secure migration to the Public Cloud | Michael Joffe Barracuda |
11:30 - 11:55 | How to migrate on-prem Solution smoothly and securly to the Cloud | Beate Fiedler Alpiq |
11:55 - 12:25 | Managing Encryption across multiple Clouds/Hybrid IT Simple, Manageable, Safe? | Gary Marsden Gemalto/Thales Group |
12:25 - 12:45 | Your users don’t care about the network, so why try and push them there Decoupling your users and applications from the network | Claus Vaupel Zscaler |
12:45 – 13:45 | Lunch break | |
Part III: Identity and Access Management | ||
13:45 - 14:15 | How to reconciliate Cloud and Security thanks to Identity and Access Management? | Brice Mauclaire Okta |
14:15 - 14:40 | The Key of your Defense Embed PAM into your Cybersecurity Strategy | Mauro Verderosa PSYND |
14:40 - 15:10 | How AI became key in Identity Governance | Michael Briand SailPoint |
15:10 - 15:30 | How to protect your Value Chain in an API Ecosystem | Martin Zahner Airlock |
15:30 – 15:55 | Coffee break | |
Part IV: Network and Application Security | ||
16:00 - 16:20 | Mitigating the Risk of using Open Source Code in Application Development | Nabil Bousselham Veracode |
16:20 - 16:50 | Approaches and Toolchains to Optimize SOC Operations | Chris Meidinger CrowdStrike |
16:50 - 17:10 | Quantum Computing Disruptive Threat or Opportunity? | Dr. Eduardo Solana University of Geneva |
Conclusion | ||
17:10 - 17:30 | Closing keynote AI: Opportunities and Threats in the Cyberspace | Marc Andre Ryter Swiss Armed Forces |
17:30 – 17:45 | Closing Ceremony | |
17:45 - 19:00 | Cocktail Party |