SC Congress Amsterdam 2016 opens it's doors today to some of Europe's finest information security practitioners. Check the sessions below and make sure to tweet @scmagazineuk using the #SCAMST hashtag if you have any questions for the speakers!
Editorial Session 1
- Are you ready for the new EU General Data Protection Regulation
Are you ready for the new EU General Data Protection Regulation - and what are the other main regulations you need to ensure that you are both aware of and in compliance with? And what about threats from US legislation to access data in Europe? Are national clouds necessary? Cross border issues – How to tackle conflicting jurisdictions and requirements. What are the unifying principles, and what are the main differences to consider?
Sponsor Session 1 | Theater 2
- Monitor and Audit Your 3rd-party / Vendor Access
Encryption is the cornerstone of security but also hides potential misuse of privileged access – both interactive and machine-to-machine. IT administrators, 3rd-party vendors, and cloud/data hosting companies are just a few of those privileged users who have access to your most critical information. However, shared accounts and encrypted communications make it difficult to know which privileged user is doing what, where and when, making privileged access vulnerable to severe attacks. In this session, we will show how to audit your network in a compliant way, establishing visibility into encrypted admin and 3rd-party access securely without compromising productivity and while keeping changes at minimum.
Sponsored by : SSH COMMUNICATIONS SECURITY
Sponsor Session 2 | Theater 3
- Mobile is the New Desktop
This presentation covers the growing market trend of organizations embracing mobile devices as the new desktop. In essence, this means that employees are starting to do more of their job and access more information from mobile devices. Moving well beyond using mobile for email, calls or texting, the mobile device is becoming the “terminal” for interacting with CRM, ERP, collaboration ( etc.) tools. In this session, Sam Linford, Regional Sales Manager at Entrust Datacard, will explore the challenges that arise around how identities and authentication is managed as the mobile device becomes the preferred desktop.
Sponsored by : ENTRUST DATACARD
Sponsor Session 3 | Theater 4
- The Enterprise Immune System: Using Machine Learning to Detect ‘Unknown Unknown' Threats
•Learn why ‘immune system' technologies represent a fundamental innovation for cyber defence •Discover how to apply machine learning and mathematics to detect advanced, internal threats •Understand how to gain 100% network visibility to investigate emerging anomalies in real time •Hear real-world Enterprise Immune System case studies
Sponsored by : DARKTRACE
Expo Floor Opens (Networking and Beverage Break)
Editorial Session 2
- Cyber-crime - avoiding data breach and theft
Around the world cyber-crime is overtaking physical crime, with every level of criminal getting in on the act, from low level scammers to international organised crime with nation-state type capabilities, robbing banks, corporations and individuals. Technology has allowed criminals to operate cross border, at scale, and even offer their services to others. So how do we combat such a threat? At SC Congress Amsterdam we'll consider the threat, and our response, how we might become equally and better organised than our opponents, with deep cooperation and sharing of intelligence, resources and skills to defend our common interests.
Sponsor Session 4 | Theater 2
- Gaining visibility to Indicators of Exposure to shrink the attack surface and more effectively contain incidents.
The layers of the attack surface and associated Indicators of Exposure The use of network modeling and simulation as enabling technologies to visualize and analyze the enterprise's attack surface How to measure Indicators of Exposure such as vulnerability density, remediation latency and network zoning compliance The best strategies for targeted elimination of Indicators of Exposure to reduce the attack surface and respond quickly to new threats Why CISOs are empowered when everyone from security administrators to company executives has a level of visibility of the attack surface and understanding of threat exposures The business impacts of using Indicators of Exposure, such as response time improvements and risk reductions
Sponsored by : NTT COM SECURITY
Sponsor Session 5 | Theater 3
- Evolution of cyber attacks on financial organizations
Knowing the dynamics and the ways, how threat actors develop and tune their industry-specific attacks is vital to be one step ahead cybercriminals. Anunak, Corkow and Buhtrap represent different stages of evolution of technologies, that are used to actively attack banks. Due to the constantly evolving threat landscape, the necessity to keep your security strategy and tactics up to pace with it has never been more crucial. We are devoted to staying ahead of the curve and providing the industry with the latest cyber threat intelligence about attacks, targeting financial organizations.
Sponsored by : GROUP-IB
Sponsored Session 6 | Theater 4
- A New Approach To Next Generation Endpoint Security – Stopping Breaches.
A fundamental shift is starting to occur where cyber security activity around the world is governed by political and economic events between various countries in hot spots around the world. These clashes are manifesting themselves in cyber threats at the endpoint from hacktivists, cybercriminals and nation states, seen by CrowdStrike across billions of events via the Falcon endpoint technology platform and global crowdsource community. Trends identified by CrowdStrike show that companies who ignore the cyber ripple effects from these international developments do so at their own peril. During this presentation Mr East will disclose: - Hard-hitting new facts and insights into recent global attacks and insight into European trends - Advanced targeted intrusions and eCrime targeting corporations - Provide important lessons about how you can identify and defend against all types of attacks, both malware and malware-free.
Sponsored by : CROWDSTRIKE
Networking Lunch and Expo Floor
Editorial Session 3
- Information everywhere - protecting the connected world, beyond the network perimeter
Information everywhere - protecting the connected world, beyond the network perimeter - from mobiles & tablets to cars & critical infrastructure - Transport, Finance, Water, Sewerage, Cars, SCADA.
- Keeping out cyber-warriors, nation state espionage attackers and the criminals who have adopted APT techniques
Cyber warfare, espionage and propaganda – it's not just the military that's under attack from hostile nation states and politically motivated groups – everyone's a target now. But what can you do and who can you turn to for support if you suspect you're being hacked by foreign intelligence? And what steps can you take to thwart a sophisticated attacker? What's the role of NATO and the CCDCOE.