ISSS & Security Interest Group Switzerland «Comeback» – Barbecue

ISSS & Security Interest Group Switzerland «Comeback» – Barbecue

Lade Veranstaltungen

The goal of this BBQ event is to bring together all interested Security Professionals in Switzerland as well as Security Associations – so that everybody can profit from this platform, gather new inspirations and contacts, including some new business cards.

We are organizing this event together with the Security Interest Group Switzerland (SIGS), which had paused its activities during COVID time. We are very excited to re-initiate this format of get-together events with SIGS and hope to see many of you there (sales people are excluded, as usual at the SIGS events).


→  Shuttle Bus from the train station to the location and for the way back will be available.

3:30 pm           Registration

4:00 pm          Welcome and Apéro

4:30 pm          Roundtable Discussions – further details will follow – current draft of topics:

      • Autonomous SOC
        The world is evolving, as well as cyber threats. To keep pace with a threat environment that is constantly changing, organisations need a SOC that empowers teams to identify and remediate exposures in near-real time. At this roundtable we will discuss the anatomy of a real cyber attack, how organisations can evolve towards an autonomous SOC, how an autonomous SOC and Information that is ‘stitched’ together can prevent these attacks, and how you can leverage the autonomous SOC for predictive security.
      • How SSE (Security Service Edge) can support and enable your Zero Trust journey to the cloud
        Today, users and applications exist in a hybrid environment with direct to cloud access, where access based on device type or network location is no longer secure. At this roundtable we will discuss how to complete your zero trust journey through the four transformation stages (Network, Security, Data, Application) to reduce risk, increase business agility and lower costs.
      • Mandiant: How do you investigate and respond to security incidents? Let’s talk.
        Purpose of this round table is to share with you Mandiant incident response methodologies, what we learned while dealing with different threat actors and talk about your experiences.
      • How to manage “Managed Security Services” – the real challenges
        Today, the pressure to focus on core competencies has never been so strong. Strategic business changes have to find its way down in IT and IT operations. You as a member of the Management are confronted with the change to outsource operational IT services to third parties. This even gets more acumen with the shortage of experts.  Cybersecurity has also become a standing point on the agenda of the board meetings and is monitored closely.
        At this round table we like to discuss how can you plan, design and run the outsourced operational services, in a way that you can steer and control the suppliers and ensure appropriate security measures.
      • Debunking Common Myths About XDR
        There has been a tremendous buzz across the cybersecurity community about the emerging technology known as XDR (eXtended Detection & Response). Unfortunately for the practitioner, there has yet to be a single definition widely accepted by both analysts and vendors perporting to be knowledgeable on the subject. What is XDR and why should I consider the technology in my enterprise security stack? What should I expect from vendors who claim to have built the perfect mousetrap? What is reality, and what is just hype? This session is intended to walk the audience through some generally accepted value statements associated with XDR while attempting to debunk a few common myths that continue to muddy the the water for security teams.
      • Enabling and Leveraging Effective Cyber Threat Intelligence Capabilities
        We will focus on how you can remove the noise of Threat Intelligence so you can identify what is important, allowing your team to make better decisions, faster.
      • No Time to REST: Check Your Data Permissions for Leaks and Overexposure
        There’s a reason why „Broken Access Control“ has catapulted to the top of the OWASP Top 10 Web Application Security Risks.
        Organizations have dozens of SaaS apps to manage-each with its own permissions schemes and settings. And many of them are interconnected and internet-facing, making the risk even greater. One misconfiguration can open sensitive data to your entire company or the entire world.
        Let´s discuss how SaaS / collaboration tools are used in your environment today and how you actually minimize the risk of data loss for your company.
      • How prepared are we to actually handle an incident?
        In handling a large amounts of incidents on a yearly basis, I come across a wide variety of organizations and an equal wide variety of levels of preparedness of these organizations to respond to incidents. When thinking about „being prepared for an incident“ there are two large tracks we can look into: technically and procedurally.
        From a technical perspective, we want to have certain things in place, such as the right monitoring tools, tools that provide you with responsive capabilities, backups, etc. Likewise, from a procedural perspective there are also a number of things we like to see, such as an incident response plan, incident response playbooks. Additionally, to be prepared we can engage in incident response table top exercises and enroll in a cyber insurance program. This all and a lot more! The goal of this roundtable will be to discuss and share experiences on which preparedness measures you have seen bringing most value to your organization, and/or what preparedness measures you wish you had in place when faced with an incident.
      • The blurred and blurring lines between nation state and cybercrime
        There is a long-held misconception that nation state activity and actors are completely different and separate from financially motivated actors (cybercriminals) when in actual fact these two worlds have always blended into one another and this blurring is only increasing. In this session we will discuss how this misconception clouds our understanding what is actually going on.
      • Building a Hyper Resilient Business for Cyberspace & Beyond
        Being resilient in the face of adversity is nothing new. Organisations create and test continuity and DR plans regularly and the pandemic tested many of these response actions with full and robust vigour. However, being cyber resilient requires a modified and optimised mindset. To add to this complexity if the Hyper Resilient context.
        Join the esteemed participants of this round table and Amar Singh, the facilitator as they
        – What is cyber resilience and what are the benefits of thinking in the Hyper Resilience mind-set
        – What action / steps and organisation can take today to being the journey to Hyper Resilience and more.

5:20 pm           Change the tables (each one may take part in two different roundtable discussions)

5:30 pm           Second Discussion Round

6:20 pm           Enjoy a Barbecue together and exchange ideas and business cards – open end!

We really hope to see you there! If you are searching for like-minded people to a specific topic onsite, please do not hesitate to contact us beforehand. We are happy to help if we can and connect you with other participants.

In case you cannot attend the event, please inform us until latest 31.08.2022. In case of no-show, we will charge you CHF 50.- as compensation for our expenses. If you cannot attend, it is also possible to send a representative, but please let us know.


Nach oben