> back to overview
The Information Security Hub invites you to the first ISH  Conference in May, 2019.
Be part of it!
Option 1 - 09.00 - 17.00
Summit I: Incident Response - Lessons learned & best practice //
Summit II: Docker, CI/CD & DevOps Security
 
Option 2 - 09.00 - 17.00
Summit III: Active Directory Security: On-Prem-Security, Secure Extension into the Cloud & Secure Operations
 
Option 1
Summit I: Incident Response - Lessons learned & best practice
Session:  09.00 - 12.30
Michael Hochenrieder & Markus Pölloth, HvS Consulting AG 
WHAT TO EXPECT

Based on a case study from a real-life cyber-attack the speakers will discuss the challenges & best practices of incident response in a guided roundtable.

CONTENT
  • Success factors for Incident Response
    • Organization
    • Processes
    • Resourced
    • Tools
  • Difference between
    • Ordinary Incident
    • IT Emergency
    • Company Crisis
  • The optimal distribution of tasks in Incident Response
  • Prerequisites you should meet
 
Summit II: Docker, CI/CD & DevOps Security Summit
Session:  13.30 - 17.00

Discuss live with participants out of the industry about security aspects of modern and agile software development, -deployment and -operation.

WHAT TO EXPECT
  • Two lectures
  • A case study out of the industry
  • Four round-table discussions
The titles and speakers of the lectures will be announced in a contemporary way.
  • Agile Software Development &Security
  • Technical security aspects of Docker, Kubernetes and OpenShift
  • Public Cloud Service & Security
  • Governance Challenges in DevOps Environments
TARGET AUDIENCE
The event is suitable for those interested in the field of security in agile software development. Through the case studies and the active discussion rounds you will get to know current problems as well as methods and possibilities, which can be implemented in your everyday life for the safe and modern development of software.
  • Technican, Project Manager & IT Manager
  • IT security officers
  • Security Architects & Developers
  • Infrastructure Engineers & Architects

REASONS TO PARTICIPATE

Software development and operation is currently subject to rapid evolution, which breaks with familiar concepts and requires the development of new concepts for the integration of security processes into the development cycle. Learn directly what (positive and negative) developments experts in safety testing have observed in the recent past and discuss together the advantages and disadvantages of different approaches.

 
Option 2
Summit III: Active Directory Security: On-Prem-Security, Secure Extension into the Cloud & Secure Operations
Session:  09.00 - 17.00
Friedwart Kuhn, ERNW

Discuss relevant security aspects of current Active Directory implementations live with industry experts and ERNW! 


WHAT TO EXPECT
  • Presentation of the current threat situation and Active Directory Security Best Practices by Friedwart Kuhn (ERNW)
  • Case study/lecture on recent security challenges
  • Further case study/lecture on Active Directory Security
  • Implementation and operational challenges
  • Round-table discussions
TARGET AUDIENCE

The event targets interested experts working in the field of Active Directory security, which concern themselves professionally or otherwise professionally with the topic. Through presentations, case studies and active round-table discussions, you will learn to assess current Active Directory security issues, methods and ways to address them.

You will also have the opportunity to network with other Active Directory managers from business and industry on Active Directory security topics.

The Active Directory Security Summit is particularly suitable for
  • CIO, CISO, IT security officers
  • Windows & Active Directory Administrators
  • Infrastructure & System Architects
  • Technican, Project Manager & IT Managers