Swiss CISO Summits take place three times a year. This overview details past events.
Third Party Security and Patching: How to face this major vulnerability? In analyzing root causes of incidents, third party security and patching is strongly represented as a solution to attacks around
Third Party Security and Patching: How to face this major vulnerability?
In analyzing root causes of incidents, third party security and patching is strongly represented as a solution to attacks around 80% of the time. It is, thus, an utmost and urgent issue that needs addressd.
From the perspective of attackers, it is essential to run the attack-business well, which is why they invest 10-20% of their time investigating the weakest point in the targets’ defense concepts. Well protected multi-billion-dollar global companies are hard targets to hit, but their suppliers, their contractors, their clients and partners are often protected on a SME level only.
Against this background, the weakest links are often represented by a third party, which is an ideal situation for hackers to get an easy hook in to the well protected castle.
There are many statistical reports on patching., With an observed share of 50% of patched systems functioning 10 days after a patch has been implemented, it is clear that the patching sequence is in many cases far less effective than what it should be. However, the other 50% of systems are vulnerable with known weaknesses for which attack suits can be downloaded from the internet or the darknet. For any hacker, these are easy targets that can be conquered at very low cost.
The theory behind the topic is really very easy to understand, however, counter measures need many careful steps. There are two enlightening presentations on this topic in this summit. The first one deals with third party and patching issues in procurement and creates a binding framework for security issues in partnerships. The second one is based on real-time measurements in which the partners are controlled with software and information will be presented on the real important issues of how the observed weaknesses can be presented and eliminated.
As usual, the goal of Summit 16 is to learn from the speakers, from each other and from the material distributed before the meeting in order to explore today’s most compelling trends in addressing the information and cyber security challenges with the best set of controls.
For a long time it has been well-known and well-recognized that information security policies are the cheapest and most effective tool to increase security.
For a long time it has been well-known and well-recognized that information security policies are the cheapest and most effective tool to increase security. However a proper strategy to reach the precious goals set in the policy is needed. This is where things start getting complicated in practice: The implementation of Information Security Strategies.
More often than not the term “Information Security Strategy” is defined circumstantially and thusdoes not possess a commonly agreed upon, well established meaning. It could represent the real implementation strategy of a security policy, but it is often used as an umbrella term for several high- level documents forming the foundation for information security governance in a company. In general, the Information Security Strategy needs to be well-tuned to the enterprise needs and socio-cultural ecosystem. If this is done successfully the implementation of and adherence to the strategy will fall into place smoothly. If the socio-cultural eco- system is not ready, a change program will help to pre- pare for the next steps.
The Information Security Strategy is a context related document, and must be different before the cloud, with the cloud, with anywhere / any time work and with massive IoT inclusion in to the com- pany’s network. In addition, changes in society and new behavior of youngsters will challenge the CISO for having a buy-inn. To be successful in the long term, societal change needs to be modelled,understood and taken into account. Careful, early verification of the applied models can help to avoidobstacles and lengthy discussions.
At the 14th Swiss CISO Summit you will hear two leading speakers. One giving a retrospective on theexperience of aligning the strategy during his first 100 days in his new position as CISO, and the otherproviding a research and innovation perspective which will give some essential background and intro- duce the round table discussions.
As usual, the goal of Summit 14 is to learn from the speakers, from each other and from the material distributed before the meeting for exploring today’s most recent tendencies in preparing, governing and implementing successfully high-level information security steering documents.
IoT and Industrial Control Systems (ICS) – Concepts, Risks, and the new Role for the CISO Internet of Things (IoT) services, Industrial Control Systems (ICS)
IoT and Industrial Control Systems (ICS) – Concepts, Risks, and the new Role for the CISO
Internet of Things (IoT) services, Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are connected today to internet via the corporate network. In many corporationsthese systems are in separate network security zones, with strong firewalls in-between. The securityrisks of these technologies come from many sides, internal devices as well as mass installation from outside such as DDoS attacks from COTS cameras world-wide directed on a few servers. For both security risks CISO must elaborate security plans. With two leading speakers, one from research and innovation, one from an early adopter of the upcoming technologies the discussion at the round table will be introduced and stimulated.
IoT services, Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), Industry 4.0 and Digital Transformation are pending issues in any enterprise, and future business success will depend on timely and proper application and integration of these new concepts. In this context the CISO’s organisation must be included in such projects and provide solutions for security and resilience in the three phases „protect, detect and response“.
As usual, the goal of Summit 13 is to learn from the speakers, from each other and from the background material which will be distributed before the meeting for exploring today’s baseline and designingeffective and efficient security solutions in these new fields.
Keynote I: How to crack the problem of insider threats – practical experiences Speaker: Igor Podebrad The starting point and rst line of defense against insider threats is
Keynote I: How to crack the problem of insider threats – practical experiences
Speaker: Igor Podebrad
The starting point and rst line of defense against insider threats is always a well-designed awareness campa- ign. But awareness itself is just a piece in a complex puzzle. Identifying core information assets and its threat model leads to the risks. These risks will be evaluated with a business impact analysis such that transparency of the risk exposure is reached and can trigger an internal discussion for addressing this topic on executive level.
As second and third line of defense measures such precise description of processes i.e. process frameworks, multidimensional attribution of data, four or multiple eyes principle during execution and control, Chinese Walls (the strict segregation of duties and critical or contradicting roles), as well as technical measures such as log- ging of relevant actions and their context frameworks, adequate monitoring, evaluation and alarming schemes are effective in mitigation of insider threats. In special areas additional cameras will help to defend against insi- der threats and have evidence, in case it happens anyway. Experience, which measures have proven as effective, and which measures did not meet the expectation, will be shared.
Igor Podebrad is Group Chief Information Security Of cer at Commerzbank AG, Germa- ny. In addition, he is adjunct professor for digital forensics and cybercrime at university of applied sciences Brandenburg at Havel, owns a PhD from Freie Universität Berlin and relevant research experience in secure computer architectures in collaboration with Helmut Schmidt Universität of the German defense forces in Hamburg. His work experience comprises management positions with tasks in IT security standards, thread analysis, digital forensics and threats mitigation & defense.
Keynote II: What kind of insider threats must we expect and how can we optimize effective counter measures?
Speaker: Andrea Gergen
The cyber security industry is developing more and more sophisticated solutions to make it even more complex for external attackers and insiders to steal the crown jewels of the company. Besides implementing these new solutions, companies are concentrating on implementing policies and awareness programs to mitigate the risk that arising from insiders, the weakest link in the cyber security processes.
Trends are showing that on the one hand the attack surface, i.e. motivations and possibilities for insider threats, is continuing to grow and on the other hand the cyber security programs are concentrating to build more com- plex solutions, additional barriers and more awareness programs. The speaker presents a holistic view about the current state, future trends and a potential way, how to get more out of the current measures by taking an insider-type-centric view.
Andrea Gergen is director in the area of cybersecurity and privacy at PwC Switzerland. In her function as lead of the Cyber-as-a-Service (CaaS) team she is supporting clients in transforming security solutions into an end to end working, risk and cost optimized security platform. Andrea has over 15 years of experience in IT- and strategy consulting in different industries like nancial services, telecommunication, pharma, chemical and automotive focusing on the implementation and transformation of IT security service management, process- and service optimization and standardization, IT strategy ma- nagement and innovation as well as Business Transformation Management.
Zunfthaus zur Schmiden, Zurich
Marktgasse 20, Zurich
Keynote I: Addressing General Threats and APT: Experience with an all-in-one approach Speaker: Stefan Lüders Like any other enterprise, university and organization, CERN is under permanent cyber-attack: automatic scans, script-kiddies, white hats, hacktivists,
Keynote I: Addressing General Threats and APT: Experience with an all-in-one approach
Speaker: Stefan Lüders
Like any other enterprise, university and organization, CERN is under permanent cyber-attack: automatic scans, script-kiddies, white hats, hacktivists, but also through advanced persistent threat (APT) actors trying to infiltrate the organization. Given CERN’s academic environment, however, CERN cyber-security must be well balanced with CERN’s academic mandate and the free and open operation of its assets. This presentation shall outline CERN’s computing environment, the identified cyber-risks associated with it, and the various measures implemented and deployed in order to prevent, protect and detect any kind of cyber-attack.
Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. 2009 on-going, he is heading the CERN Computer Security Incident Response Team as CERN’s Computer Security Officer with the mandate to coordinate all aspects of CERN’s computer security – office computing security, computer centre security, GRID computing security and control system security – whilst taking into account CERN’s operational needs. Dr. Lüders has presented on computer security and control system cyber-security topics at many different occasions to international bodies, governments, and companies, and has published several articles.
Keynote II: Communication throughout incidents and crisis
Speaker: Juan Carlos Lopez Ruggiero
The communication concept in security incidents and crisis management is a subject that involves three disciplines with common elements: Security, Risk and Compliance. By identifying how to communicate, it means knowing how to handle it. The speaker will bring up communication processes and notions used in case of incidents and crises and share some “do and dont’s” from real environments with an eye on the imminent GDPR regulation. Three basic aspects of the speech are:
- The Incident must stay underground.
- The Incident can be communicated internally, but to a limited group (still secret).
- The Incident must be brought to media.
Juan Carlos Lopez Ruggiero is global Risk and Security Executive with 20+ years experience in implementing complex IT solutions in Risk Management, Cyber Security, Regulatory Compliance and Quality Management across multiple countries and industries. He lead IT organizations in implementing COSO, COBIT, ERM, ISO 27001, 6SIGMA, ISO 31000 and CMMI tenets, Lean Manufacturing strategies, and metric-based management. Having been the global CISO and Chief Risk Officer for Royal Philips, Juan Carlos is currently the CSO for DXC Technology in Switzerland and GDPR Lead for the EMEA region. He owns a degree in Law and speaks at least 7 languages fluently.
Culture and Congress Centre Luzern (KKL)
Europaplatz 1, 6005 Luzern
Keynote: Security Startups: Global trends in security startup investments and the digital identity revolution in Switzerland Speaker: Thomas Dübendorfer, President Swiss ICT Investor Club (SICTIC) Information security is in dire need of innovation
Keynote: Security Startups: Global trends in security startup investments and the digital identity revolution in Switzerland
Speaker: Thomas Dübendorfer, President Swiss ICT Investor Club (SICTIC)
Information security is in dire need of innovation as attackers are getting more and more sophisticated, better funded and run better targeted attacks. Thanks to security startups, new cyber defense methods and more secure systems are transferred from research or military to products used daily by corporations around the globe. The talk will show investments in security startups globally that are contributing to innovation and which areas are especially hot. Furthermore, the talk will discuss how to work with a security startup as a corporate customer and which risks to be aware of. Finally, I‘ll highlight some recent developments on digital identities in Switzerland, which will be essential for the security of online business transactions as they are at the core of many digital business processes.
Thomas Dübendorfer is the president of the Swiss ICT Investor Club (SICTIC), an IT security expert and angel investor. He is the co-founder of several Internet technology based start-ups in Switzerland, including Contovista, Frontify, Spontacts and YES Europe AG. He has shaped the Information Security Society Switzerland (ISSS) as president for five years. He has lectured on network security for ten years at ETH Zurich and is the co-founder and chairman of swisssecurity.org, which connects the leaders of all key information security organizations active in Switzerland. He has served in a variety of technology leadership, research, development, teaching, board and consulting roles. He has worked as software engineer in Silicon Valley and seven years as tech lead for fraud detection, security and privacy engineering projects at Google and has received three prestigious EMG awards from the Google founders.
First-hand presentations from startups
Instead of a second speaker we have been inviting eight well selected and distinguished security startups (Futurae, Notakey, Cybellum, IRONSCALE, Minerva, Morphisec, Dathena, and Fireglass) to present in a Pecha Kucha style presentation (7 Minutes) the company and the strategy, functional specification and early adopter case studies of the product.
Innovative “World Coffee” style discussion
The discussions will be between the participants and the startups representative in world coffee style: 15 minutes discussion with each founder / delegate in small groups of 3-5 participants.
Keynote 1: Best of Breed Security Architecture: Protection Level and Borders of State-of-the-Art Speaker: Rajesh Nair, Detecon (Schweiz) AG Moving on from the traditional focus of defense in depth, there is a need
Keynote 1: Best of Breed Security Architecture: Protection Level and Borders of State-of-the-Art
Speaker: Rajesh Nair, Detecon (Schweiz) AG
Moving on from the traditional focus of defense in depth, there is a need to come ever closer to being able to understand security from a business context. Architecting a security solution then becomes even more an integra- ted approach between the IT and Business teams, with Operations becoming more central in the entire chain. Additionally the architecture design extends outside the organizational boundaries speci cally in highly integrated environments. This presentation will explain state-of-the-art security architecture from a different «highest security» perspective.
Rajesh Nair worked with Swissgrid from 2009 in various roles covering Strategy, Archi- tecture, Cyber security and as the Chief Information Of cer. The main focus of his work in Swissgrid was the design and implementation of Swissgrid Architecture, building up a central capability to monitor and control the Swiss National Transmission grid. He led a team of over 120 ICT experts. He was responsible for the Corporate and Industrial IT of Swissgrid as well as for the design and operation of certain critical pan European ICT infrastructures. Rajesh has been in the Energy industry for over 20 years and has worked for ABB, Deloitte Consulting, Suntec and Alstom. He has also had various functional roles leading from Financial controlling, Product development, Strategy, Project Executi- on and General Management in these companies, which gives him a balanced corporate view on technology. From Oct 2016, Rajesh has been a part of the Detecon team, working on a number of strategic initiatives mainly on the topics Cyber Security, Big data and New technologies.
Keynote 2: Detection and Response: Empowered by Intelligence led Security Operations
Speaker: Will Semple, PwC
Observing the market, a relevant shift in security budgets has happened towards detection and response in recent years: By today it is a well-known fact, that anybody will be breached. Readiness for detection and response is the key for mastering the situation and means storing data over a long period (two or more years), understanding the intelligence management lifecycle on strategic, tactical operational and technical level as well as the attack models. Content Detection needs threat intelligence, security analytics and use cases, against which the data are screened. Finally, knowing about a potential breach, in the rst step a veri cation is necessary: if the breach is con rmed prepared measures which can be invoked timely help to master the situation.
This presentation highlights background on the functional principles, how detection and response really work.
Will Semple is a Leader in the PwC Cyber Security Practice responsible for Managed Threat Detection and Response Services, Advanced Security Operations and a Security Analytics SME. Will works with PwC clients globally helping to solve some of the their most challenging cyber risk questions. Prior to PwC Will has served as Head of Global Threat for the New York Stock Exchange, managing cyber risk from nation state attackers, industrial espionage, hacktavism and cybercrime related incidents. Will was later appointed CISO for the European, APAC and Commercial business units of the NYSE overseeing EU and US Regulator interactions for the Exchange on Cyber matters. Will has actively contributed to the industry by serving as Chair of a European Council working group on Network Information Sharing and Incident Response and assisted in the formulation of policy and legislation for Cyber Security in the EU.
Zunfthaus zur Schmiden, Zurich
Marktgasse 20, Zurich
Keynote 1: Protecting the enterprise: IT risk and security in the overall corporate context Speaker: Domenico Salvati How does information technology contribute to the protection of the enterprise? What is its role in
Keynote 1: Protecting the enterprise: IT risk and security in the overall corporate context
Speaker: Domenico Salvati
How does information technology contribute to the protection of the enterprise? What is its role in the overall corporate security context? Domenico Salvati highlights the context in which corporate boards perceive cyber security. While the important role of cyber security is unquestioned today, IT risk and security experts tend to overlook the fact that it is (only) one piece of the overall security puzzle. To further advance cyber security, the CISO needs to position it within a corporate security framework.
To sharpen the role of cyber security in the corporate context, Domenico merges the Governance, Risk and Compliance (GRC) and the Three Lines of Defense models and positions cybersecurity within this comprehensive view of the enterprise. A third concept rests on terminology and is concerned with “events” and (security) “measures”. As will be shown, the aforementioned concepts underlying information technology are also suited to position other corporate risk and compliance functions in a corporate context (cybersecurity being one of them). In conse- quence, this view of the overall corporate security context yields the opportunity to create a well-tuned reporting system including other functions such as compliance management or data protection to name a few.
For over ten years Domenico Salvati has worked in positions such as “IT Risk Response & Mitigation”, “IT Risk Compliance and Oversight” and “Operational IT Security” most of these for a large Swiss bank. During this period, he also researched the “Management of Information System Risks” at the Swiss Federal Institute of Tech- nology in Zurich (ETHZ) for which he gained his PhD. Since 2010 he holds the position of Enterprise Risk Manager for a large health insurer in Switzerland. With the change from information security to enterprise risk management, Domenico gained a new view on cyber and IT security and will share this with the audience.
Keynote 2: Cyber insurance: What is the scope and by when insurance option is a valuable option?
Speaker: Willi Stössel, Swiss Re Corporate Solutions
Cyber insurance has emerged from data risks and business continuity risk coverage to holistic approaches in order to help enterprises dealing with residual risk. Insurance is the last line of defense for many enterprises before self-carrying the nancial loss of risks. Bruce Schneier introduced the following philosophical concept cybersecurity measures are good to reduce the insurance fee, but there are little arguments only to stretch this border. In the presentation Willy Stössel, a senior experts from SwissRe provides insights on expected corporate cybersecurity measures and their impacts as well as dependencies when offering insurance contracts.
Willy Stössel, is Head of Cyber, Technology & Construction at Swiss Re Corporate Solutions 2007 on-going. The team is responsible for writing primary and excess liability covers for large industrial companies on a worldwide basis. Willy has been instrumental in launching Swiss Re‘s Cyber Liability products and building a large worldwide portfolio of Technology E&O related risks. Prior to this role, he was responsible for the underwriting various other industry segments including heavy machinery, utilities and pharmaceutical companies. He has close to 20 years of experience in the insurance industry and has been always focused on risk transfer of large cooperations.
Keynote 1: Corporate Security is an Ecosystem Speaker: Alain Beuchat, UBS Corporate Security cannot be successfully implemented without including employees, clients, vendors and third-parties in an overall security concept. This seems straightforward and
Keynote 1: Corporate Security is an Ecosystem
Speaker: Alain Beuchat, UBS
Corporate Security cannot be successfully implemented without including employees, clients, vendors and third-parties in an overall security concept. This seems straightforward and logical. However it is a difficult undertaken as the perception of risk, the amount of resources and budget and priorities is usually quite different across the several actors. This presentation will show some of the challenges and potential ways to integrate clients and third-parties in a Corporate Security ecosystem.
Alain Beuchat is Group Information Security Officer at UBS. Alain focuses on adapting the bank‘s Cyber Security defense and Data Protection framework to the evolving threat landscape. Alain has more than 20 years of experience in the domains of IT risk management and information security primarily in the financial and telecommunication industry. He has occupied several positions as information security officer, security consultant and security engineer.
Keynote 2: Threat Intelligence – A Key Piece Towards Achieving Improved Understanding
Speaker: Mark Barwinski, PwC
Increasingly information is under threat of corruption, destruction, or theft. Better understanding the context of these attacks and who is behind them may lead to not just faster recovery from a compromise, but also proactive defence against known tactics, techniques, and procedures. Integrating a Cyber Threat Intelligence Fusion Center into your architecture complements a holistic defensive posture through enriched pertinent information.
Mark Barwinski is Director for Threat Intelligence and Incident Response at PwC Switzerland. He joined PwC following 11 years of cyber related experience attained at the U.S. Department of Defense in Washington D.C., Germany, Afghanistan, and Canada. He has served in a variety of leadership and liaison roles supporting military operations, defending the Global Information Grid (GiG), and promoting joint discovery and response efforts among partner states. Focused on leveraging actionable information acquired from intelligence and incident response activities, he will highlight the benefits of an integrated Cyber Threat Intelligence Fusion Center into a corporate security architecture.
Keynote 1: Privacy 2.0: What to expect from the new data protection laws in Europe? Speaker: David Rosenthal, Homburger AG: Privacy 2.0 20 years after their creation, the data protection laws in Europe are
Keynote 1: Privacy 2.0: What to expect from the new data protection laws in Europe?
Speaker: David Rosenthal, Homburger AG: Privacy 2.0
20 years after their creation, the data protection laws in Europe are being revised completely. This is true also for Switzerland. While in some areas life will become easier, in particular for multinationals, overall, the costs of data protection compliance will increase. In addition, fines will increase in case of non-compliance. This presentation will provide an update on what is going on, an overview of key changes in law to expect in the upcoming years, and the resulting challenges companies will have to deal with, with a particular focus on Switzerland.
David Rosenthal, counsel at Homburger AG, is one of the opinion leaders in the area of data protection in Switzerland. He has authored a commentary on the Swiss Data Protection Act. He also regularly advises companies on data protection compliance issues and disputes as well as the Swiss government, e.g. in connection with its projects to revise Swiss law. He co-heads the IT law practice at Homburger, one of the largest Zurich business law firms, acts as the secretary of the Swiss Association of Corporate Data Protection (VUD) and the Swiss Association of E-Discovery and Investigations (SeDIV) and he lectures at ETHZ and at the University of Basel. Before getting in to the legal profession, he worked as a journalist and software developer.
Keynote 2: Integration of Information Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges and experience sharing
Speaker: Marek Pietrzyk, UBS AG
Integration of Digital Rights Management (DRM) in IT Infrastructure and Business Processes: challenges and experience sharing. The initial step in DRM is policy development in order to protect bank‘s sensitive customer data from unauthorized internal access and uncompliant disclosure, as well as to fulfil bank‘s regulatory obligations, protect its reputation and avoid financial fines. Evaluation of efficient data protection solutions is the base for a successful implementation. Application of leading edge technology for mastering both, usability and overall complexity was of paramount importance when implementing and deploying DRM. A review of the impact on daily business processes and end-user experience of the data protection solution is assessing DRM’s business performance. Recommendations in form of a six-step program for establishing a balanced ecosystem for managing sensitive data conclude the presentation.
Marek Pietrzyk, director and program manager of the UBS client data confidentiality programme DRM is responsible for cost effective implementation of the bank’s sophisticated cyber defence requirements on client data protection. In various positions such as business analyst, strategy consultant, IT architect and project manager, he gained more than twenty years of experience as information security practitioner in the financial industry. He is an author of several publications on software architecture and requirements management and is distinguished speaker at major information security, identity management and e-crime conferences with focus on data protection.
EMA House, Zürich
Nordstrasse 1, 8006 Zürich
Keynote 1: Swisscom‘s approach for the secure Workspace of tomorrow Speaker: Marco Wyrsch, Swisscom Open and unlimited collaboration is part of Swisscom’s business strategy, including a “Bring your Own Device” strategy, approved
Keynote 1: Swisscom‘s approach for the secure Workspace of tomorrow
Speaker: Marco Wyrsch, Swisscom
Open and unlimited collaboration is part of Swisscom’s business strategy, including a “Bring your Own Device” strategy, approved by the board of directors, as well as all employee preferably working with smartphone and tablets. The strategy even developed such that Swisscom’s employees demand support of HoloLens, smartwatches and Surface Hub for accessing corporate data. This obviously poses security challenges for addressing according risks. This presentation will share Swisscom’s security approaches and progress as well as state-of-the-art challenges we are working on.
Marco Wyrsch launched PocketPC.ch in 2001, one of the most popula websites about mobile technology in Switzerland. He has experience in developing, designing and implementation of mobile services and secure architectures for the mobile enterprise. After launching mobile related services on the market he change to Swisscom as mobile security consultant. He supported Swisscom clients in securing their mobile workforce. Today, he serves by introducing secure mobile workspace of tomorrow within Swisscom and supports implementing Swisscom’s security vision.
Keynote 2: New Trends in Secure Mobility
Speaker: Michael Maurer, Microsoft
Mobility is the new «normal» but the challenges for keeping platforms secure are coming up every day. The market is driven by consumerisation, from the use of personal devices, to providing consumer-like social tools supporting access to line-of-business (LO B) apps from smartphones. Businesses are focused on protecting intellectual property while IT should enable access on a broad range of mobile devices by carefully balancing information security classification with the trustworthiness of the device and point of connection. New and upcoming technologies help your employees to be more agile and productive and to inspire a new generation of workers. The session will share some key lessons learned in securing mobile platforms.
Michael Maurer has more than 10 years’ experience in deploying and securing Enterprise client systems. Based on Businesses’ requirements the entry point to access corporate data and applications has moved to mobile scenarios across mobile Operating System Platforms. He is specially focused on protecting mobile devices, protecting content and securing corporate identities. Michael has been speaker at various events to present the business value of mobile working scenarios. Based on use case scenarios he presents the lesson’s learned and recommended practices to secure and manage mobile workers
Keynote: Next generation security awareness Speaker: David Lacey In a hyper-connected world there are no secure boundaries. Physical and technical measures alone will not guarantee security. Professional attacks penetrate enterprises through mistakes
Keynote: Next generation security awareness
Speaker: David Lacey
In a hyper-connected world there are no secure boundaries. Physical and technical measures alone will not guarantee security. Professional attacks penetrate enterprises through mistakes by users who can be persuaded to click on infected web pages or email attachments. The only solution is continuous education and reminders in the nature of the risks to users and their own security responsibilities. It is not an exact science, and demands knowledge, skills and artifacts which are not adequately addressed in computer science courses. This presentation examines the state of the art in security awareness and the techniques needed to achieve the maximum impact on users.
David Lacey has more than 25 years professional experience in directing security for leading enterprises such as Shell, Royal Mail and the British Foreign & Commonwealth Office. He is now a freelance researcher, writer and consultant, as well as a keen innovator who has developed many contemporary standards and ideas, including the original text behind ISO 27001. He founded the Jericho Forum, and developed the first fraud detection system based on the human immune system. David is the author of the books «Managing the Human Factor for Information Security», «Managing Security in Outsourced and Off-shored Environments», «Business Continuity Management for Small and Medium Sized Companies», “Advanced Persistent Threats” and “A Practical Guide to the Payment Card Industry Data Security Standard”. He is a visiting senior research fellow of the University of Portsmouth, a member of IO Active‘s Strategic Advisory Board, and a member of the Infosecurity Europe «Hall of Fame». He writes a security blog for Computer Weekly and has published many white papers and media articles.