Roundtable 1: Sylvain Hirsch, Cyber Security Professional at Mandiant (now part of Google Cloud)
From the Frontline to the Board
For the last decade, the pace of digitalisation has been increasing, along this growth the number of destructive cyber attacks and cyber espionage activities has been on the rise. To withstand and mitigate the impact related to cyber attacks, organisations have to develop a clear, realistic, and efficient cyber resilience strategy.
First, this roundtable discussion will discuss the benefits of leveraging frontline experience and threat intelligence to prioritise and enhance cyber capabilities, drive risk-management, and support cyber investment decisions.
Then, this roundtable will holistically cover the main factors to successfully build an efficient and realistic cyber strategy. Although there is no “one size fits all” cyber strategy, common factors for success and best practices enabling organisations to achieve their defined cyber maturity will be discussed. The “quick wins” to rapidly uplift organisations’ cyber maturity along with the development of long-term advanced capabilities will also be discussed.
This roundtable will finally cover the “human” factor that enables organisations to strengthen their cyber resilience overall. The benefits and methodologies that can be applied to raise the organisation’s cyber awareness, improve the cyber security teams’ skills through relevant targeted simulations, and enhance the top management’s cyber knowledge will be discussed.
Roundtable 2: Clemens Sauerwein, Assistant Professor of Security Engineering at Leopold-Franzens Universität Innsbruck
The Role of Information Quality in SOCs
SOCs obtain information about vulnerabilities, threats, and attacks from a variety of information sources. Although this information is used as input for resource-intensive or securing business-critical processes, the quality and reliability of the information collected varies greatly. For this reason, we want to discuss criteria and metrics for assessing the quality of security information used in SOCs. Finally, let us develop a practical framework for the quality assessment of security information.
Roundtable 3: Marc Doudiet, Senior Director Global Incident Response at Kudelski Security
XDR buzzword or reality?
XDR is a relatively new term in the cybersecurity industry that has gained significant attention in recent years. The goal of this round table is to explore the reality of XDR and determine whether it is a valuable tool in the fight against cyber threats or simply a buzzword.
During the round table, participants will be able to examine the various aspects of XDR, including its definition, capabilities, and potential benefits and limitations. They will explore how XDR differs from other security tools such as SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and NDR (Network Detection and Response). The participants will also have the opportunity to discuss the practical implications of XDR, such as its ability to integrate and automate security tools across multiple environments.
Overall, the goal of the "XDR buzzword or reality?" round table is to provide an in-depth examination of XDR and its potential impact on the cybersecurity industry.
Roundtable 4: Pompeo D'Urso, Cyber Security Operations Manager at Octapharma
Are you ready to respond to a crisis and what is best way to test it?
Tabletop exercises, cyber ranges, automated simulation and many more. How can we identify among all the options the most fitting way to test the various teams involved in a crisis and how can we train our self’s and the relevant stakeholders to be ready when the action calls.
We’ll discuss about the various alternatives, the importance of the gamification aspect and how to consider the human element and account in testing the physical and psychological stress that can cumulate during the response.