Rahmenprogramm 2019
International Forum 10.1
Alle Vorträge
© NürnbergMesse / Heiko Stahl
Zusätzlich zu den vier deutschsprachigen Foren, finden in Halle 10.1 im International-Forum Themenübergreifend alle Präsentationen ausschließlich in englischer Sprache statt.
Unabhängige Experten bieten gratis Einblicke in aktuelle Entwicklungen, Strategien, rechtliche Rahmenbedingungen und Trends in der Informationssicherheit sowie im Datenschutz.
Besucher können sich in allen fünf Foren gratis und unverbindlich informieren.
______________________________________________
Halle 10.1 / Standnummer 10.1-830
Alle Vorträge im Überblick
- Dienstag 08. Oktober
- it-sa insights: German IT Security Law 2.0 loading and connecting to European cybersecurity legal...
- Datto - Minimise your customers’ downtime – experience Datto’s technology live in action!
- SPRI - Cybersecurity as a Compefitiveness Enabler and Local Employment Key Driver: A practical...
- Countercraft - Tool up your threat hunting team with deception technology
- Tosibox - Cyber Security must be transparent and built-in
- EY - Business centric managed security services" - bridging the gap between business and technology
- Spike Reply - Secure Clouding with Reply International
- Fraunhofer IEM - Enabling DevSecOps with the new Generation of Static Analysis
- Tanium - How to Answer the Hard Questions about your IT Infrastructure
- LogMeIn - Modern Identity: Unifying Access and Authentication
- Lucy - Crime in the 21st Century
- it-sa insights: Risk and Challenges of Cyber Attacks for the European Economy
- Darktrace - Using AI in Cyber Attacks – The Next Arms Race?
- CLAROTY - The Challenges and lessons learned in Running an OT SOC
- CenturyLink - Stemming the tide on DDoS: Protecting today’s critical businesses
- Globetesting - SecDevOps, secury always goes first
- SOFTPROM - Cyber Security Solutions for Industrial Control Systems (ICS)
- One Identity - Can you protect your privileged accounts in the cloud?
- Forescout - Security in the IT-OT Era: Device Visibility and Control
- SySS - Live Hacking: The Future of Hacking. Attacks on current and future technologies
- Mittwoch 09. Oktober
- Live-Hacking: Security Awareness 2020 - Hacking like it's 2005?
- Proofpoint - One always clicks... Employees in the focus of the attacker
- Uniscon/TÜV Süd - Master the challenges of regtech-compliance with zero-knowledge cloud technology
- Extreme Networks - Secure networks through AI / ML, proper access protection, micro segmentation...
- CYOSS - Where blue teams often go wrong: Lessons learned in 2 years of cyber simulation training
- NTT / NTT Security - New cyber risks on the way to smart society and a new social model Society 5.0
- dacoso/ID Quantique - How can quantum technologies be integrated into a future proof security...
- RUCON - Raising Resilience - Why it's the Management's Job
- CenturyLink - Stemming the tide on DDoS: Protecting today’s critical businesses
- it-sa insights: Heavyweight-Meeting: European approach for a common digital market
- Datto - Ransomware in numbers: How bad is it really? The results of the 2019 Datto Ransomware Survey
- Juniper - The game of cybercat and cybermouse: Improving the mousetrap
- KUDELSKI - How CISOs gain trust in the boardroom
- BeyondTrust/Bomgar - P?M - to understand Privileged Access Management (PAM)
- IKERLAN - Industrial Cybersecurity Challenges in the Basque Industry: blockchain applications in...
- Tecnalia - Building Trust in the Machine Economy
- KEYNETIC - Hardening of industrial networks, decreasing the attack surface of Industry 4.0
- Secardeo - Office 365 OME or S/MIME with an automated certificate management -
- Veracode - Mitigating the risk of using Open Source code in Application Development
- Compass - Live Hacking - Hackers: What do they want and how do they get it?
- Donnerstag 10. Oktober
- it-sa insights: Project cyberwatching.eu - **CANCELLED**
- RSA Security - 5 Ways to Transform Access and Secure the Digital Enterprise
- Rhebo - Cyberwar and Downtimes - How industry 4.0 challenges Critical Infrastructures
- S21SEC - Where does my ATM infrastructure fit and how to approach Cybersecurity?
- One Identity - Privileged Account Governance - Close the gap between privileged access and...
- SaltStack - Security is the responsibility of every member of your IT organisation
- Synack - How Offensive Security Testing with Crowdsourced Teams Replaces Pen Testing as More...
- Verizon - Quantifying Risk Reduction: From War Room to Board Room
- SPECIAL SPEAKER: The Vitruvian Paradox - The Changing Face of the Human in Cyber Security
- Oneconsult - PowerShell for Post-Exploitation Activities – Basics, Attacks, Forensic Analysis and...
- it-sa insights: Blockchain and the new data security paradigm