Roundtable 1: Camille Sada, Senior Cyber Security Analyst at Roche
Data Loss Prevention in an Insider Threat World
In 2024, hybrid working is the new way to operate. How do we ensure proper data visibility as well as appropriate controls when it comes to Data Loss Prevention? What are the existing technical DLP solutions and the challenges that go along with them?
Roundtable 2: Nina Egli, IT Product Owner Cyber Security Testing at Hilti Group
Planning and executing successful penetration tests
Penetration testing is a key pillar for strengthening cybersecurity resilience and validating existing security controls. Finding the right approach is not always as easy as it looks. To perform a successful penetration test, we need to define clear objectives and scope of the test and agree on what is allowed to test if you find a vulnerability. Planning the pentest is the next challenge: how much time will you spend looking for the unknown? During the preparation and execution of the pentest, alignment and communication with stakeholders is key. A final challenge will be to produce the report within the given timeframe, written at management level, to ensure that the identified risks are addressed.
During the roundtable discussion, we will address these hurdles and look at how to proper planning of a penetration test, support its execution, and ensure that the results are acted upon.
Roundtable 3: Mike Gysi, former Head of SOC at SIX
Successful Approaches to Threat Hunting
Discussion on prerequisites and proven successful approaches to implement a threat hunting practice in SOC / Cyber Defense Center.
Roundtable 4: Archana Panchal, Head of Security Operations and Response at NatWest Services
Scope creep in the SOC - when the C becomes “consulting”
What if “scope creep” is not just an Agile problem? What happens when the O-for-Operations in a SOC gets overshadowed by the audit, and the security consulting, and the project support, and the /dev/null of it all?
I’m looking for your experiences in a SOC at any level, where the focus gets lost, and how/if you’ve managed to bring it back. When you need to protect your team of security experts from being overwhelmed - what do you do?