...
European Identity & Cloud Conference 2014
13.05. – 16.05.2014, Munich, Germany

Moderator:

The way how we have to understand Cyber Security today, means much more than just IT-Security, which tries to draw a defense line against known threat patterns, in order to protect networks and computers. As technology is touching virtually every aspect of our life and business, the dependence on ubiquituous, secure connectivity is growing ore and more and requires our infrastructures to be more resilient against cyber attacks. 

This year´s EIC, for the first time will offer a full day track on Cyber Security Leadership, providing you with insight into a holistic multi-level approach to a well balanced strategy for more information and communication security.

Cyber Security Best Practice

15.05.2014 11:00-12:00

Cyber Security Best Practice in the Light of Snowden’s Revelations

Getting the Basics Right: How we are Protecting BT Against Today�s and Tomorrow�s Cyber Threats

Metcalfe’s law is effectively at work when it comes to Cyber Security.  By working together across industries we can emulate this law, just like the cyber bad guys do and have the law work in our favour, as it certainly is working against us through the combined forces of cyber criminals, nation estates and hacktivists.  Aernout Reymer, Head of Security at BT Global Services discusses the latest trends and the future in cyber, and comes with ideas to collaborate, join forces and reduce costs and time in dealing with vulnerabilities.

Realtime Security Intelligence

15.05.2014 12:00-13:00

Why SIEM failed – and why we need Realtime Security Intelligence

There is no doubt about the fact that SIEM (Security Incident/Information and Event Monitoring) failed in delivering on its promises. Many projects failed entirely, while others started big and ended small. There are also success stories, but finally it turned out that SIEM is a tool, not a solution. In a world of increasing security threats and advanced types of complex attacks, there are too few people who can set up a working solution based on a tool only. This requires too much knowledge.

With the event of a new generation of solution we call Realtime Security Analytics, things start to change. These solutions combine big data techniques and advanced analytical capabilities, both rule-based and pattern-based, with realtime information about new threats and – ideally – managed services. Such managed services allow to provide new configurations and analytics on the fly, constructed and delivered by a few experts. The required skill set in the customer organizations are lower, because the complex understanding of relationships of incidents and events in a number of systems will be provided by the service providers. Such service providers also help handling the – ideally few – filtered events that need manual supervision. Doing Realtime Security Analytics right not only helps customers to increase their cyber security and “cyber-attack resilience”, it also allows software vendors to expand their business models. It makes SOC operations cheaper, by building on a good combination of own capabilities and managed services, while delivering better results.

SIEM is reduced to just one data source in the new world of Realtime Security Intelligence. This allows customers to leverage their investments in SIEM, without relying on a limited toolset. Clearly, the evolution towards Realtime Security Intelligence will bring new players on board and shake out some of the SIEM vendors.

In this session, Prof. Dr. Sachar Paulus of KuppingerCole will explain the difference between traditional SIEM and Realtime Security Intelligence. He will talk about the requirements on Realtime Security Intelligence (RSI) solutions, the criteria for product selection, and the organizational infrastructure RSI needs on both the vendor/provider and the customer side. He will talk about how RSI enables the SOC of the future and integrates with other sources of relevant information, beyond SIEM  – for instance Access Governance and User Activity Monitoring.

Prescription Security Lenses for the 4A Vision: Anywhere, Anytime, with Anyone, on Any Device

  • Why the 4A Vision (Anywhere, Anytime, with Anyone, on Any device) has been a challenge
  • Urgency for contex-aware security and security individuals with the equivalent mindset
  • Deficiencies and opportunities for improvement of traditional security technical measures

Big Data for Information Security: Preventing your Enterprise from Cyber Attacks and Threats

A Cyber Intelligence Analytics layer, based on Big Data Analytics is something that is missed today in the InfoSec area. Those analytics provide organizations with deep insights into attacks and threats at a level which governments typically utilize. ´Under the radar´ attacks and threats can be translated into patterns and insights, only when utilizing a pro-active approach and analysis of Big Data – varied and historical, and unique algorithms and metrics. Cyber Analysts create quick and valuable insights.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.