Top Banner
11.00 – 11.45 am Reception and breakfast 11.45 am – 12.00 pm Welcoming speech from Olaf Siemens, Global Vice President Information Security, TÜV Rheinland 12.00 – 1.00 pm KEYNOTE On the Frontline of Cyber War – Lessons learned from protecting Israel’s infrastructure* Ofir Hason, Chief Executive Officer, CyberGym Ltd. The wars of tomorrow will be waged digitally, e.g. by switching off all power plants and paralyzing the infrastructure of a country. How can IT experts from industry and government be prepared for the defense against these criminal attacks from cyberspace? The CyberGym in Israel is a professional training center for IT staff from around the world and devoted to the task to qualify IT professionals in cyber apology. The trainers are ex-cyber-soldiers of the Israeli military, the technological infrastructure for the simulation of cyber attacks is unique. An insight into philosophy, strategy and the ‘exercises‘ of the CyberGym. 1.00 – 1.30 pm COFFEE BREAK | EXHIBITION 21.05.2014 FOCUS ISSUES & INNOVATIONS 1.30 – 3.15 pm 4.15 – 6.00 pm Workshop 1.1 Governance, Risk & Compliance - Integration using RSA Archer Lars Rudolf, Management Consultant, TÜV Rheinland Dr. Michael Teschner, Business Development, RSA, the Security Division of EMC Compliance with statutory requirements, conducting audits and assessments, implementing internal control systems and management reporting are just some of the issues that are always associated with higher costs for companies. We will show you how you can map complex corpo- rate processes in GRC in a tool, leverage synergies and significantly reduce costs. Generate updated reports at a press of a button and communicate meaningfully at all times with both customers and management. Workshop 2.1 Governance, Risk & Compliance - Integration using RSA Archer Lars Rudolf, Management Consultant, TÜV Rheinland Dr. Michael Teschner, Business Development, RSA, the Security Division of EMC Workshop 1.2 Secure mobile file sharing for smartphones and tablets using Accellion Andreas Unrath, Senior Security Consultant, TÜV Rheinland Paul Steiner, EMEA Managing Director, Accellion Smartphones and tablets have become an integral part of corporate life. How can you ensure that access to corporate data remains safe? We can develop a filesharing solution in such a way that it is as easy to use as Dropbox, for example, while still satisfying German data protection requirements. The pioneer and specialist for secure data transfer, Accellion, has developed a platform with which com- panies and public authorities can retain control of their data storage and permit the integration of iPhones, iPads, and Android and Blackberry devices Workshop 2.2 Secure mobile file sharing for smartphones and tablets using Accellion Andreas Unrath, Senior Security Consultant, TÜV Rheinland Paul Steiner, EMEA Managing Director, Accellion Workshop 1.3 Information Rights Management - Information does not have any boundaries, unless we define them Jürgen Engel, Senior Consultant, TÜV Rheinland Günter Thiel, Senior Consultant, TÜV Rheinland Do you want to protect important data and still be able to exchange it? Information Rights Management (IRM) is a highly-promising technology that can be the key to the solution. Sensitive electronic data is encrypted when stored. When DLP (data leakage prevention) reaches its technical limits, IRM extends the scope of information protection - in storing, transferring and editing - within and outside the company. Workshop 2.3 Information Rights Management - Information does not have any boundaries, unless we define them Jürgen Engel, Senior Consultant, TÜV Rheinland Günter Thiel, Senior Consultant, TÜV Rheinland 6.00 – 7.00 pm From 7.00 pm Tour of the Fürstenfeldbruck monastery Visit the history-charged Fürstenfeldbruck monastery. Be sure to also taken in the Barock church St. Mariä Himmelfahrt (Ascension of St Mary), a key work of decorative art in Bavaria. NETWORK & DINE Workshop 1.4 Flight under the radar: Innovative protection against advanced persistent threats with FireEye* Frank Melber, Head of Business Develop- ment Security Solutions, TÜV Rheinland Alex Lanstein, Senior Security Researcher, FireEye Around 95 % of all corporate networks are highly at risk of assault from advanced malware and other targeted, complex attacks or advanced persistent threats. Traditional signature-dependent security solutions are helpless against refined and complex cyber-strikes. FireEye has developed a security platform based on virtualization technology especially for the real-time defense from threats. This protects companies from all significant attack vectors at each phase of the offense. Please note that the topics for the first and second sessions are identical. The six parallel workshops take place in two successive sessions. Please select a topic for the first and second session Workshop 2.4 Flight under the radar: Innovative protection against advanced persistent threats with FireEye* Frank Melber, Head of Business Develop- ment Security Solutions, TÜV Rheinland Alex Lanstein, Senior Security Researcher, FireEye Workshop 1.5 Next Generation Firewalling: Automated security in software defined infrastructure with Palo Alto Networks Kristofer Heidenreich, Head of Professional Service, TÜV Rheinland Michael Weisgerber, Channel Systems Engineer DACH, Palo Alto Networks Virtualisation solutions can have a significant impact on the efficiency and availability of IT resources and applications. Previously, provision and configuration were only possible with manual intervention if security measures were to be complied with. Now, VMWare and Palo Alto have developed a virtualisation solution with ‚autopilot‘. With the help of the VMWare, NSX network virtualisztion, the next generation of network security can be automatically provided and distributed in virtualised data centres. This combination cuts investment and operating costs. Workshop 2.5 Next Generation Firewalling: Automated security in software defined infrastructure with Palo Alto Networks Kristofer Heidenreich, Head of Professional Service, TÜV Rheinland Michael Weisgerber, Channel Systems Engineer DACH, Palo Alto Networks Workshop 1.6 Application Delivery Firewall – rethink your security strategy! Comprehensive protection for data centres, webservers and applications Raimar Melchior, Senior Security Consultant, TÜV Rheinland Peter Held, Senior Field Systems Engineer, F5 Networks Consolidating security in data centres saves investment, operating and servicing costs. With greater flexibility you can implement new business requirements much quicker. The F5-Intelligent-Services-Platform enables you to tailor the implementation of Layer 3-7 DDoS mitigation, security for web-based applications and unified access solutions for single-sign-on – regardless of whether you are working with applications in the data centre, in the cloud or SaaS. Workshop 2.6 Application Delivery Firewall – rethink your security strategy! Comprehensive protection for data centres, webservers and applications Raimar Melchior, Senior Security Consultant, TÜV Rheinland Peter Held, Senior Field Systems Engineer, F5 Networks 1. Session 2. Session Get to know congress speakers, delegates and experts of our IT Security Congress in a relaxed atmosphere. 3.15 – 4.15 pm COFFEE BREAK | SNACKS | EXHIBITION Please note that the topics for the first and second sessions are identical. The six parallel workshops take place in two successive sessions. Please select a topic for the first and second session *Programme items in English
1

21.05.2014 FOCUS ISSUES & INNOVATIONS Reception and ......iPads, and Android and Blackberry devices Workshop 2.2 Secure mobile file sharing for smartphones and tablets using Accellion

Sep 19, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 21.05.2014 FOCUS ISSUES & INNOVATIONS Reception and ......iPads, and Android and Blackberry devices Workshop 2.2 Secure mobile file sharing for smartphones and tablets using Accellion

11.00 – 11.45 am Reception and breakfast

11.45 am – 12.00 pm Welcoming speech from Olaf Siemens, Global Vice President Information Security, TÜV Rheinland

12.00 – 1.00 pm KEYNOTE

On the Frontline of Cyber War – Lessons learned from protecting Israel’s infrastructure* Ofir Hason, Chief Executive Officer, CyberGym Ltd.

The wars of tomorrow will be waged digitally, e.g. by switching off all power plants and paralyzing the infrastructure of a country. How can IT experts from industry and government be prepared for the defense against these criminal attacks from cyberspace? The CyberGym in Israel is a professional training center for IT staff from around the world and devoted to the task to qualify IT professionals in cyber apology. The trainers are ex-cyber-soldiers of the Israeli military, the technological infrastructure for the simulation of cyber attacks is unique. An insight into philosophy, strategy and the ‘exercises‘ of the CyberGym.

1.00 – 1.30 pm COFFEE BREAK | EXHIBITION

21.05.2014 FOCUS ISSUES & INNOVATIONS

1.30 – 3.15 pm

4.15 – 6.00 pm

Workshop 1.1

Governance, Risk & Compliance - Integration using RSA Archer

Lars Rudolf, Management Consultant, TÜV Rheinland

Dr. Michael Teschner, Business Development, RSA, the Security Division of EMC

Compliance with statutory requirements, conducting audits and assessments, implementing internal control systems and management reporting are just some of the issues that are always associated with higher costs for companies.

We will show you how you can map complex corpo-rate processes in GRC in a tool, leverage synergies and significantly reduce costs. Generate updated reports at a press of a button and communicate meaningfully at all times with both customers and management.

Workshop 2.1

Governance, Risk & Compliance - Integration using RSA Archer

Lars Rudolf, Management Consultant, TÜV Rheinland Dr. Michael Teschner, Business Development, RSA, the Security Division of EMC

Workshop 1.2

Secure mobile file sharing for smartphones and tablets using Accellion

Andreas Unrath, Senior Security Consultant, TÜV Rheinland

Paul Steiner, EMEA Managing Director, Accellion

Smartphones and tablets have become an integral part of corporate life. How can you ensure that access to corporate data remains safe? We can develop a filesharing solution in such a way that it is as easy to use as Dropbox, for example, while still satisfying German data protection requirements.

The pioneer and specialist for secure data transfer, Accellion, has developed a platform with which com-panies and public authorities can retain control of their data storage and permit the integration of iPhones, iPads, and Android and Blackberry devices

Workshop 2.2

Secure mobile file sharing for smartphones and tablets using Accellion

Andreas Unrath, Senior Security Consultant, TÜV Rheinland

Paul Steiner, EMEA Managing Director, Accellion

Workshop 1.3

Information Rights Management - Information does not have any boundaries, unless we define them

Jürgen Engel, Senior Consultant, TÜV Rheinland

Günter Thiel, Senior Consultant, TÜV Rheinland

Do you want to protect important data and still be able to exchange it? Information Rights Management (IRM) is a highly-promising technology that can be the key to the solution. Sensitive electronic data is encrypted when stored.

When DLP (data leakage prevention) reaches its technical limits, IRM extends the scope of information protection - in storing, transferring and editing - within and outside the company.

Workshop 2.3

Information Rights Management - Information does not have any boundaries, unless we define them

Jürgen Engel, Senior Consultant, TÜV Rheinland

Günter Thiel, Senior Consultant, TÜV Rheinland

6.00 – 7.00 pm

From 7.00 pm

Tour of the Fürstenfeldbruck monasteryVisit the history-charged Fürstenfeldbruck monastery. Be sure to also taken in the Barock church St. Mariä Himmelfahrt (Ascension of St Mary), a key work of decorative art in Bavaria.

NETWORK & DINE

Workshop 1.4

Flight under the radar: Innovative protection against advanced persistent threats with FireEye*

Frank Melber, Head of Business Develop-ment Security Solutions, TÜV Rheinland

Alex Lanstein, Senior Security Researcher, FireEye

Around 95 % of all corporate networks are highly at risk of assault from advanced malware and other targeted, complex attacks or advanced persistent threats. Traditional signature-dependent security solutions are helpless against refined and complex cyber-strikes. FireEye has developed a security platform based on virtualization technology especially for the real-time defense from threats. This protects companies from all significant attack vectors at each phase of the offense.

Please note that the topics for the first and second sessions are identical. The six parallel workshops take place in two successive sessions. Please select a topic for the first and second session

Workshop 2.4

Flight under the radar: Innovative protection against advanced persistent threats with FireEye*

Frank Melber, Head of Business Develop-ment Security Solutions, TÜV Rheinland

Alex Lanstein, Senior Security Researcher, FireEye

Workshop 1.5

Next Generation Firewalling: Automated security in software defined infrastructure with Palo Alto Networks

Kristofer Heidenreich, Head of Professional Service, TÜV Rheinland

Michael Weisgerber, Channel Systems Engineer DACH, Palo Alto Networks

Virtualisation solutions can have a significant impact on the efficiency and availability of IT resources and applications. Previously, provision and configuration were only possible with manual intervention if security measures were to be complied with. Now, VMWare and Palo Alto have developed a virtualisation solution with ‚autopilot‘. With the help of the VMWare, NSX network virtualisztion, the next generation of network security can be automatically provided and distributed in virtualised data centres. This combination cuts investment and operating costs.

Workshop 2.5

Next Generation Firewalling: Automated security in software defined infrastructure with Palo Alto Networks

Kristofer Heidenreich, Head of Professional Service, TÜV Rheinland

Michael Weisgerber, Channel Systems Engineer DACH, Palo Alto Networks

Workshop 1.6

Application Delivery Firewall – rethink your security strategy! Comprehensive protection for data centres, webservers and applications

Raimar Melchior, Senior Security Consultant, TÜV Rheinland

Peter Held, Senior Field Systems Engineer, F5 Networks

Consolidating security in data centres saves investment, operating and servicing costs. With greater flexibility you can implement new business requirements much quicker.The F5-Intelligent-Services-Platform enables you to tailor the implementation of Layer 3-7 DDoS mitigation, security for web-based applications and unified access solutions for single-sign-on – regardless of whether you are working with applications in the data centre, in the cloud or SaaS.

Workshop 2.6

Application Delivery Firewall – rethink your security strategy! Comprehensive protection for data centres, webservers and applications

Raimar Melchior, Senior Security Consultant, TÜV Rheinland Peter Held, Senior Field Systems Engineer, F5 Networks

1. Session

2. Session

Get to know congress speakers, delegates and experts of our IT Security Congress in a relaxed atmosphere.

3.15 – 4.15 pm COFFEE BREAK | SNACKS | EXHIBITION

Please note that the topics for the first and second sessions are identical. The six parallel workshops take place in two successive sessions. Please select a topic for the first and second session

*Programme items in English