What threat potential do artificial intelligence and machine learning offer? Why does the use of clouds still create a not inconsiderable need for security? What do the concepts for securing hybrid clouds and networks mean? Where do the dovetailing and convergence of cyber security, physical security, business continuity management and crisis management lead? What will be the implementation experiences after the DSGVO comes into force?
Answers to these and many other questions will be given in lectures, discussions and workshops at the IT and Information Security Strategy Summit in Berlin.
- IT Security Strategy & Processes
- Cyber Crime Protection / Prevention
- Information Security Management System (ISMS)
- Mobile Security
- Cloud Security (Data, Apps, Services)
- Data Security / Encryption
- IT Security KPIs, Security Monitoring
- Governance, Risk & Compliance
- Business Continuity Management
- Security Awareness (Employees & Management)
- IT Security Audit
- Outsourcing & Managed Security Services
- Web & Social Media – New Security Risks
- CIO / CISO
- Heads of: IT Security / Information Security, Cyber Defense, IT Infrastructure, IT Risk Management
- Leading IT Security Officer with budget responsibility
Radisson Blu Hotel
Radisson Blu Hotel, Karl-Liebknecht-Str. 3, 10178 Berlin
427 guest rooms and suites in a purist design combine timeless elegance with modern comfort. The warm colours and dark woods of the furniture set cosy accents and create a pleasant ambience. The room price includes WLAN and high-speed Internet access. All rooms are equipped with air conditioning, international TV programmes, laptop-sized safe, trouser press, hair dryer and a minibar – some also have a private or French balcony.
The HEat restaurant surprises with its open show kitchen and large terrace overlooking the Berlin Cathedral. In the HEat we serve the rich breakfast buffet from 6 o’clock in the morning.
and spoil our guests with fresh, international cuisine at the highest level. The offer is supplemented with wines from all over the world.
BitSight transforms how companies manage third and fourth party risk, underwrite cyber insurance policies, benchmark security performance, and assess aggregate risk with objective, verifiable and actionable Security Ratings. The BitSight Security Ratings Platform gathers terabytes of data on security outcomes from sensors deployed across the globe. From our data, we see indicators of compromise, infected machines, improper configuration, poor security hygiene and potentially harmful user behaviors. BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence and then map it to a company's known networks, creating an overall rating of that organization’s security performance. These objective ratings, based on externally accessible data, give visibility into a company's security posture over time. For further information please click here
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves. With no dependencies on signatures or attack pattern matching, the BOTsink deception server is designed to accurately and efficiently detect the reconnaissance and lateral movement of advanced threats, stolen credential, ransomware, man-in-the-middle, and phishing attacks. The Attivo Multi-Correlation Detection Engine (MCDE) captures and analyzes attacker IPs, methods, and actions that can then be viewed in the Attivo Threat Intelligence Dashboard, exported for forensic reporting in IOC, PCAP, STIX, CSV formats or can be used to automatically update SIEM and prevention systems for blocking, isolation, and threat hunting. The ThreatOps offering simplifies incident response through information sharing, incident response automation, and the creation of repeatable playbooks. For further information please click here
Micro Focus helps organizations run and transform their business. Driven by customer-centric innovation, our software provides the critical tools they need to build, operate, secure, and analyze the enterprise. By design, these tools bridge the gap between existing and emerging technologies - enabling faster innovation, with less risk, in the race to digital transformation. For further information please click here
Der Bundesverband IT-Sicherheit e.V. (TeleTrusT) ist ein Kompetenznetzwerk, das in- und ausländische Mitglieder aus Industrie, Verwaltung, Beratung und Wissenschaft sowie thematisch verwandte Partnerorganisationen umfasst. Durch die breit gefächerte Mitgliederschaft und die Partnerorganisationen verkörpert TeleTrusT den größten Kompetenzverbund für IT-Sicherheit in Deutschland und Europa. TeleTrusT bietet Foren für Experten, organisiert Veranstaltungen bzw. Veranstaltungsbeteiligungen und äußert sich zu aktuellen Fragen der IT-Sicherheit. TeleTrusT ist Träger der "TeleTrusT European Bridge CA" (EBCA; PKI-Vertrauensverbund), der Expertenzertifikate "TeleTrusT Information Security Professional" (T.I.S.P.) und "TeleTrusT Professional for Secure Software Engineering" (T.P.S.S.E.) sowie des Vertrauenszeichens "IT Security made in Germany". TeleTrusT ist Mitglied des European Telecommunications Standards Institute (ETSI). Hauptsitz des Verbandes ist Berlin.