On April 6th and 7th, cyber security analysts, IT-Risk consultants, CISOs and information security experts from around Europe came together to the 2016 Cyber Security Summit in the beautiful city of Prague. Our event introduced a dynamic cyber-mix of presentations, discussions and hands-on workshops, all of which were tailor-made for the needs of our attendees.
“The organization was perfect and the sessions were very interesting.” Petar Yonchev, ITR Services
Day 1: Strategic Morning, Masterful Afternoon
The first morning of the Cyber Security Summit was full of case studies and presentations on cybercrime, security risks and management and adoptive strategies against cyberterrorists. Lars Hilse kicked off the event, sharing his experience on global cyber terrorism based on years of analysis of cyber terrorism attacks and provided attendees with an overview of the threat landscape in a cyber. Next, Stefan Mardak from Akamai talked about solutions that put the changing landscape of Internet migration services to the cloud in order to adapt safety systems for implementation and integration within both public and private clouds. Kaleem Ahmad from Pak Arab Refinery followed with his case study on current and emerging terrorist threats/patterns looming around the world, and Torben Jorgensen from Vestas talk about how to reduce costs on your organization by introducing risk intelligence. Right before lunch, Joey Hernandez from International Industry Representative gave his insights on targeting in cyberspace and the fundamentals of cyber intelligence and Don Randall from Don Randal Associates kicked off the workshop sessions with an advanced workshop on the cyber threat landscape from the CISO/CIO perspective.
After lunch followed our break-out sessions by industry. They were designed to cater our attendees’ industry-specific needs. You could choose from seven streams and eight different industries: finance, electricity/oil and gas, transportation, manufacturing and retail, government, telecom and pharma and medical devices.
“CSS is great a summit with high level topics and presentations.
At the same time, it’s a great opportunity to meet different security professionals and shareholders with
the possibility to have evolving and concrete discussions about security topics.” Jan Kristian Roemer, Region Midtjtlland
The afternoon of the first day was dedicated to hands-on, practical and strategic workshops. Peter van Eijk from Club Cloud Computing Society moderated Workshop II about cloud security. Tudor Enache from aeCERT/OWASP talked out advance mobile application hacking on Workshop III and helped participants understand advanced mobile application attack vectors in a platform-agnostic environment. In Workshop IV, Kal Roer from CLTRe explained how to build a security culture in your organization and Ahmed Neil from OWASP talked about digital forensics on Workshop V. Leading, negotiating and collaborating successfully across cultures was the theme of Workhop VI moderated by Michael Gates from Said Business School, University of Oxford.
Day 2: 5 industry-specific streams, networking and round-table discussions
The second day of the Cyber Security Summit started with Steve Soar from Darktrace who spoke about how to apply probalistic mathematics and machine learning in order to discover cyber threats. Next, Tomas Wandel from Blue Coat Systems shared his insights on how to get maximum protection for your complete computing environment while minimizing impact on network performance and enabling you to fully embrace cloud applications and services.
After our morning coffee and engaging networking, attendees had the opportunity to join one of five main streams of presentations and case studies. Track A was dedicated to “Security Infrastructure Architecture”. Jan Vaclavik from Fortinet, Thomas Malmberg from Aktia, Tobias Hummel from SEB and Vittorio Tronci from Terna discussed about fraud prevention, how cyber security has changed, how to manage risks in your organization and how to ensure your plan will reflect on the current cyber-attack methods.
During Track B “The Internet of Things”, Ivan Sanchez from Sanitas Bupa Group presented a case study on Biohacking and product security while Robert Griffin from RSA talked about how to use security analytics to transform IoT security. Injam Shazad Khokhar from Nordea Bank shared his insights on biometrics in the finance world and Karl O. Feger from Saxon State Government explained how to use the attack chain model to plan security monitoring.
In Track C, attendees had the opportunity to join the interactive panel and learn more about “Cloud and Data Security” from Vittorio Tronci from Terna, Thomas Malmberg from Aktia Bank and Jan Vaclavik from Fortinet. Tarun Samtani from Express Gifts presented a case study on cloud adoption barriers followed by Mustafa Komut from Vodafone who elaborated on data classification. Lastly, Dejan Stankovic from the Ministry of Defence of Montenegro talked about building a high-level cloud security with low-level budget.
Meanwhile, in Track D Injam Shazad Khokhar from Nordea Bank, Ivan Sanchez from Sanitas and Karl O. Feger from Saxon State Government discussed about IoT & IPv6 Addressing Space followed by Jerome Saiz from EPITA Engineering School who gave attendees a fresh look on how to bridge the gap between physical and IT security. Milica Djekic, Cyber Security Researcher, explained the most challenging aspects of online work while Mauriche Kroos from Enexis talked about the challenge of engaging cyber security with business.
Last but not least, Track E was dedicated to real-life scenarios and future trends in cybersecurity. Louis Marinos from Enisa presented the current developments in Enisa’s threat landscape. Next, Kristof Lamont from Eurocontrol pointed out the security trends in the safety-oriented aviation world while Viktor Larionov from Omniva presented targeted multi-vector attacks by real life scenarios. For the final interactive panel, Louis Marinos, Kristof Lamont, Milica Djekic and Robert Griffin shared their experiences in crisis management processes and strategies and invited attendees to describe their public-private partnership.
Wrapping up the Cyber Security Summit, we knew that it was not just presentations and workshops. Attendees and speakers had the opportunity to expand their horizons, meet other professionals and share their insights and knowledge with their peers. We would like to thank each and every one of you for your support. You inspire us to build really unique and enlightening events that are here to stay!