Michael Hochenrieder |
As a licensed ISMS ISO 27001 Lead Auditor (also based on BSI IT-Grundschutz), ITSM ISO 20000 Auditor, BCMS ISO 22301 Auditor, Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC), his consulting focuses primarily on the areas of security assessments / audits, introduction of company-wide security guidelines / processes, social engineering and ICT forensic analyses. In addition to his coaching activities, Michael Hochenrieder also communicates his knowledge in workshops on the topics of information security management, security risk management, incident handling or information and communication forensics as well as co-authoring textbooks on information security. He is also listed at the German Federal Office for Information Security (BSI) as auditor for § 8a (3) BSIG.In 2002 he founded HvS-Consulting AG with Frank von Stetten. |
Presentation Title: Challenges of Incident Response in a Real Life example This talk gives participants an overview of practical incident response based on a real life example where both speakers were in charge of incident coordination & response. Content: |
|
|
Freddy Dezeure Former Head CERT- EU
|
Freddy Dezeure is the founder and former Head of CERT-EU. Since 2017 he is an independent strategic Advisor in cyber security and risk management. He is a very experienced senior executive with a demonstrated track record in cyber security operations, policy, technology and risk management. He has extensive operational management experience, both in line and support functions and is highly successful in setting up, managing and growing new departments in an international environment. He has strong experience in supporting mature private and public organizations in improving their security posture and cyber risk management at strategic level. He has hands on experience with high tech, research and entrepreneurship and is Member of the Board and Advisor in several high-profile startup companies. Freddy Dezeure is a recognized thought leader in security, risk and privacy and has a high level of peer recognition and access to a very extensive network in the cyber security community. He is a sought after speaker at conferences, sharing best practices in threat Intelligence, SOC operations, prevention programs, risk management. |
Presentation Title: What does it take to set up a Cyber Defence Center What does it take to set up a Cyber Defence Center? How do you organise your defence in a context of an ever-evolving threat landscape and the increasing complexity of your infrastructure? The presentation will share practical lessons learnt from setting up one of the most sophisticated and respected CERTs in Europe. What are the main building blocks of a successful CDC, which are the best sources of information, how to attract and retain expertise? What are the quick starts and low hanging fruits? How to be successful in the long run? |
|
|
Andrew Ginter VP Industrial Security
|
Andrew Ginter is the VP Industrial Security at Waterfall Security Solutions and anAdjunct Assistant Professor at Michigan Technological University (MTU). At Waterfall, Andrew leads a team responsible for industrial cyber-security research, contributions to standards and regulations, as well as security architecture recommendations for industrial sites. At MTU, Andrew is responsible for a graduate engineering course on industrial cyber risk assessment. Before Waterfall, Andrew managed software development teams for control system products, IT/OT middleware products and industrial cybersecurity products. He holds a number of middleware and cybersecurity patents. Andrew is also the co-chair of ISA SP-99 WG1, a co-author of the Industrial Internet Consortium Security Framework, and the author of two books: Secure Operations Technology and SCADA Security - What's broken and how to fix it. He is a frequent contributor to ICS cyber-security standards and post-secondary curricula. Andrew holds a BSc in Applied Mathematics and an MSc in Computer Science, both from the University of Calgary |
Maximilian Möhring
|
Maximilian C. Moehring is co-founder and CEO of Keyp. Prior to Keyp, Maximilian has founded a series of (tech) companies including Ende Music, SixReasons, addsura (acquired by the Allianz Group), Year of the X, mazel and #neuland (acquired by JR Spaces & Events). Out of his curiosity and his critical innovation-driven thinking he dived into multiple industries (from automotive to insurance) and worked with C-Levels in various fields of digital innovation (from Internet-of-Things to Blockchain). His latest business, Keyp, is Europe's fastest growing open digital identity ecosystem and develops an ID-Infrastrucutre-aaS that lets enterprises combine any number of already established identity solutions and can be integrated into any (existing) identity management system. As part of an independent and decentralised digital identity infrastructure, it provides the fastest, most straightforward way to conduct legally compliant identity checks. In his private life Maximilian is driven by new technology and science, too. In order to optimise his health and wellbeing he started hacking his own system, his body. By becoming a biohacker he changed his eating behaviour, quit smoking, lost 40+ kilograms of weight and boosted his productivity. With a Master’s in Business and as a serial tech entrepreneur he combined the things he loves most: developing disruptive digital businesses. Maximilian graduated as Master of Arts in Business Administration at the University of Applied Sciences in Munich in 2013. During his studies, he also completed several semesters abroad, among others at the City University of New York. He earned his Bachelor of Arts in Management & Law from Management Center Innsbruck in 2010. |
Presentation Title: The future of digital identity is decentral, but not Blockchain Let Maximilian lead you through his comprehensive and interdisciplinary talk on why not just identities, but any identity-related information should not be stored on a blockchain. The main technical reason being that none of the blockchain USPs is applicable when it comes to identity (-related) data, especially assertions. The legal and business reason being that blockchain is not (yet) compatible with and accepted in our legal and regulatory framework. So what is the way to go? There's not many other areas where security and decentralisation is as important as when we're dealing with identity data. Maximilian will explain how to take advantage of already-existing technology (even edge technology) to ensure convenience for the enterprises as well as cost reduction while at the same time making sure there is maximum convenience for the identity owners (humans, machines and other enterprises). |
|
|
Jan Harrie |
Jan Harrie is a security analyst of the German company ERNW, one of the leading security providers in Germany. He has over 5 years’ experience in cyber security from builder as well from breaker perspective. Jan’s actual mission is to identify vulnerabilities before they get exploit-ed. He designs software lifecycles, performs trainings, audits infrastructures and defines risk reduction strategies for modern landscapes. Together with his team he brings cutting edge technology in small companies as well as into the lifecycles of global players. His offensive security background from attacking complex systems and sophisticated social engineering campaigns let him know his enemy and how to stop him!
|
Coming soon! |
Christoph Klaaßen |
Christoph is a Senior Security Consultant working with the Information Security Team at the Germany-based specialist consultancy ERNW. He is interested in a broad range of topics as e.g. Virtualization and Cloud security, risk management as well as security of the complete tech stack used in agile environments. His daily business comprises both security advisory for very large enterprises as well as performing audits of complex IT environments.
|
Coming soon! |