> back to overview
The Information Security Hub invites you to the first ISH Conference in May, 2019.
Be part of it!
Option 1 - 09.00 - 17.00
Summit I: Incident Response - Lessons learned & best practice //Summit II: Docker, CI/CD & DevOps Security |
Option 2 - 09.00 - 17.00Summit III: Active Directory Security: On-Prem-Security, Secure Extension into the Cloud & Secure Operations |
Option 1
Summit I: Incident Response - Lessons learned & best practice
Session: 09.00 - 12.30
Michael Hochenrieder & Markus Pölloth, HvS Consulting AG
WHAT TO EXPECT
Based on a case study from a real-life cyber-attack the speakers will discuss the challenges & best practices of incident response in a guided roundtable.
CONTENT
-
Success factors for Incident Response
- Organization
- Processes
- Resourced
- Tools
-
- Ordinary Incident
- IT Emergency
- Company Crisis
-
The optimal distribution of tasks in Incident Response
-
Prerequisites you should meet
Summit II: Docker, CI/CD & DevOps Security Summit
Session: 13.30 - 17.00
Discuss live with participants out of the industry about security aspects of modern and agile software development, -deployment and -operation.
WHAT TO EXPECT
-
Two lectures
-
A case study out of the industry
-
Four round-table discussions
-
Agile Software Development &Security
-
Technical security aspects of Docker, Kubernetes and OpenShift
-
Public Cloud Service & Security
-
Governance Challenges in DevOps Environments
TARGET AUDIENCE
- Technican, Project Manager & IT Manager
- IT security officers
- Security Architects & Developers
- Infrastructure Engineers & Architects
REASONS TO PARTICIPATE
Software development and operation is currently subject to rapid evolution, which breaks with familiar concepts and requires the development of new concepts for the integration of security processes into the development cycle. Learn directly what (positive and negative) developments experts in safety testing have observed in the recent past and discuss together the advantages and disadvantages of different approaches.
Option 2
Summit III: Active Directory Security: On-Prem-Security, Secure Extension into the Cloud & Secure Operations
Session: 09.00 - 17.00
Friedwart Kuhn, ERNW
Discuss relevant security aspects of current Active Directory implementations live with industry experts and ERNW!
WHAT TO EXPECT
- Presentation of the current threat situation and Active Directory Security Best Practices by Friedwart Kuhn (ERNW)
- Case study/lecture on recent security challenges
- Further case study/lecture on Active Directory Security
- Implementation and operational challenges
- Round-table discussions
TARGET AUDIENCE
The event targets interested experts working in the field of Active Directory security, which concern themselves professionally or otherwise professionally with the topic. Through presentations, case studies and active round-table discussions, you will learn to assess current Active Directory security issues, methods and ways to address them.
You will also have the opportunity to network with other Active Directory managers from business and industry on Active Directory security topics.
The Active Directory Security Summit is particularly suitable for- CIO, CISO, IT security officers
- Windows & Active Directory Administrators
- Infrastructure & System Architects
- Technican, Project Manager & IT Managers