SIGS 23rd SOC Forum

Join us on March 6th, 2024 and earn 4.25 CPEs

(registration will be closed March 5th, 2024)
Official Event Sponsor
Meet with and be inspired by like-minded peers who face a similar set of challenges. Share strategies for mitigating the most current information security threats. A friendly, relaxed and professional atmosphere will ensure that you leave this event with a new wealth of trust-based contacts and tangible takeaways. Our goal: bring together what belongs together!

For further planned events please check at

Looking forward to see you there,
your SIGS team

As always: sales peoples (incl. CEO's and Founders), vendors and all peoples who just like to sell their products or services are not allowed to take part at SIGS events.
Hilton Zürich Airport
Hohenbühlstrasse 10
8152 Opfikon-Glattbrugg

March 6th, 2024, 1:30 pm - open end incl. dinner
Airport Transfer & Parking
There's a shuttle bus from and to the airport, but only at specific times.
Parking lots at the hotel are available for free.

Participation Fee
EUR 60.--

1:30 pm
2:00 PM
Welcome & short introduction from Mark Beerends, Contributor at SIGS
2:00 PM
Terry Vogelsang, Head of Offensive Security Practice at Kudelski Security

Red Teaming: Stories from the Trenches
Explore the world of Red Teaming as Terry shares compelling tales from the trenches, compromising international logistics and critical infrastructure companies. Discover firsthand the strategies used by real-attackers and gain valuable insights into the vulnerabilities uncovered and lessons learned, showcasing the critical role of Red Teaming in fortifying the resilience of organizations around the world.
2:30 PM
Florian Hartmann, Sales Engineering Manager at CrowdStrike

Know them, Find them, Stop  them: Combating the modern Adversary
Stopping breaches starts with knowing the adversaries targeting you. Learn about the most popular attack techniques, most targeted industries, as well as the most notable threats and threat trends observed and analyzed by CrowdStrike’s Counter Adversary Operations Team in the past year.

Find out what goals the human or nation state behind the attack pursues and how they operate within the e-crime ecosystem. Turn these valuable insights into best practices to protect your endpoints, identities and beyond from today's adversaries.
3:00 PM
Clemens Sauerwein, Assistant Professor at University of Innsbruck

Insights into the distribution and use of threat intelligence sharing platforms
Threat intelligence sharing is a promising solution for developing situational awareness of the rapidly growing number of new cyber threats. Accordingly, there are a variety of platforms on the security solutions market that enable the efficient and targeted sharing of threat intelligence between organizations. Unfortunately, very little is known so far about the distribution and use of these platforms from the end-user's point of view.

To address this issue, we conducted an empirical study on the spread and use of threat intelligence sharing platforms. For this purpose, we surveyed security experts from enterprises, federal authorities, and public educational institutions. Our findings show, among other things, a growing interest in threat intelligence sharing platforms and their value to information security processes.
3:30 PM
4:10 PM
Roundtable 1: Camille Sada, Senior Cyber Security Analyst at Roche

Data Loss Prevention in an Insider Threat World
In 2024, hybrid working is the new way to operate. How do we ensure proper data visibility as well as appropriate controls when it comes to Data Loss Prevention? What are the existing technical DLP solutions and the challenges that go along with them?

Roundtable 2: Nina Egli, IT Product Owner Cyber Security Testing at Hilti Group

Planning and executing successful penetration tests
Penetration testing is a key pillar for strengthening cybersecurity resilience and validating existing security controls. Finding the right approach is not always as easy as it looks. To perform a successful penetration test, we need to define clear objectives and scope of the test and agree on what is allowed to test if you find a vulnerability. Planning the pentest is the next challenge: how much time will you spend looking for the unknown? During the preparation and execution of the pentest, alignment and communication with stakeholders is key. A final challenge will be to produce the report within the given timeframe, written at management level, to ensure that the identified risks are addressed.

During the roundtable discussion, we will address these hurdles and look at how to proper planning of a penetration test, support its execution, and ensure that the results are acted upon.

Roundtable 3: Mike Gysi, former Head of SOC at SIX

Successful Approaches to Threat Hunting
Discussion on prerequisites and proven successful approaches to implement a threat hunting practice in SOC / Cyber Defense Center.

Roundtable 4: Archana Panchal, Head of Security Operations and Response at NatWest Services

Scope creep in the SOC - when the C becomes “consulting”
What if “scope creep” is not just an Agile problem? What happens when the O-for-Operations in a SOC gets overshadowed by the audit, and the security consulting, and the project support, and the /dev/null of it all?

I’m looking for your experiences in a SOC at any level, where the focus gets lost, and how/if you’ve managed to bring it back. When you need to protect your team of security experts from being overwhelmed - what do you do?
5:00 PM
Change the table for the second round of discussions
6:00 PM
Apéro riche incl. networking and know how sharing till open end
Contributors & Speakers
Below you will find our contributors and speakers to whom we say a big thank you !
Mark Beerends
Executive Security Consultant, Prusec
Mark is an active contributor for SIGS. Further information at ​Mark Beerends | LinkedIn​​​
Nina Egli
IT Product Owner Cyber Security Testing at Hilti Group
Further information at Nina Egli | LinkedIn
Mike Gysi
former Head of SOC at SIX
Further information at Mike Gysi | LinkedIn
Florian Hartmann
Sales Engineering Manager
Further information at Florian Hartmann | LinkedIn
Archana Panchal
Head of Security Operations and Response at NatWest Services
Further information at Archana Panchal | LinkedIn
Camille Saada
Senior Cyber Security Analyst at Roche
Further information at Camille Saada | LinkedIn
Clemens Sauerwein
Assistant Professor at University Innsbruck
Further information at Clemens Sauerwein | LinkedIn
Terry Vogelsang
Head of Offensive Security Practice at Kudelski Security
Further information at Terry Vogelsang | LinkedIn
Contact Us
If you have any questions or you like to get information about further events, please do not hesitate to contact us!
 Join us on November, 9th
We look forward to hosting you!

Processing Registration...