11.00 – 11.45 am Reception and breakfast
11.45 am – 12.00 pm Welcoming speech from Olaf Siemens, Global Vice President Information Security, TÜV Rheinland
12.00 – 1.00 pm KEYNOTE
On the Frontline of Cyber War – Lessons learned from protecting Israel’s infrastructure* Ofir Hason, Chief Executive Officer, CyberGym Ltd.
The wars of tomorrow will be waged digitally, e.g. by switching off all power plants and paralyzing the infrastructure of a country. How can IT experts from industry and government be prepared for the defense against these criminal attacks from cyberspace? The CyberGym in Israel is a professional training center for IT staff from around the world and devoted to the task to qualify IT professionals in cyber apology. The trainers are ex-cyber-soldiers of the Israeli military, the technological infrastructure for the simulation of cyber attacks is unique. An insight into philosophy, strategy and the ‘exercises‘ of the CyberGym.
1.00 – 1.30 pm COFFEE BREAK | EXHIBITION
21.05.2014 FOCUS ISSUES & INNOVATIONS
1.30 – 3.15 pm
4.15 – 6.00 pm
Workshop 1.1
Governance, Risk & Compliance - Integration using RSA Archer
Lars Rudolf, Management Consultant, TÜV Rheinland
Dr. Michael Teschner, Business Development, RSA, the Security Division of EMC
Compliance with statutory requirements, conducting audits and assessments, implementing internal control systems and management reporting are just some of the issues that are always associated with higher costs for companies.
We will show you how you can map complex corpo-rate processes in GRC in a tool, leverage synergies and significantly reduce costs. Generate updated reports at a press of a button and communicate meaningfully at all times with both customers and management.
Workshop 2.1
Governance, Risk & Compliance - Integration using RSA Archer
Lars Rudolf, Management Consultant, TÜV Rheinland Dr. Michael Teschner, Business Development, RSA, the Security Division of EMC
Workshop 1.2
Secure mobile file sharing for smartphones and tablets using Accellion
Andreas Unrath, Senior Security Consultant, TÜV Rheinland
Paul Steiner, EMEA Managing Director, Accellion
Smartphones and tablets have become an integral part of corporate life. How can you ensure that access to corporate data remains safe? We can develop a filesharing solution in such a way that it is as easy to use as Dropbox, for example, while still satisfying German data protection requirements.
The pioneer and specialist for secure data transfer, Accellion, has developed a platform with which com-panies and public authorities can retain control of their data storage and permit the integration of iPhones, iPads, and Android and Blackberry devices
Workshop 2.2
Secure mobile file sharing for smartphones and tablets using Accellion
Andreas Unrath, Senior Security Consultant, TÜV Rheinland
Paul Steiner, EMEA Managing Director, Accellion
Workshop 1.3
Information Rights Management - Information does not have any boundaries, unless we define them
Jürgen Engel, Senior Consultant, TÜV Rheinland
Günter Thiel, Senior Consultant, TÜV Rheinland
Do you want to protect important data and still be able to exchange it? Information Rights Management (IRM) is a highly-promising technology that can be the key to the solution. Sensitive electronic data is encrypted when stored.
When DLP (data leakage prevention) reaches its technical limits, IRM extends the scope of information protection - in storing, transferring and editing - within and outside the company.
Workshop 2.3
Information Rights Management - Information does not have any boundaries, unless we define them
Jürgen Engel, Senior Consultant, TÜV Rheinland
Günter Thiel, Senior Consultant, TÜV Rheinland
6.00 – 7.00 pm
From 7.00 pm
Tour of the Fürstenfeldbruck monasteryVisit the history-charged Fürstenfeldbruck monastery. Be sure to also taken in the Barock church St. Mariä Himmelfahrt (Ascension of St Mary), a key work of decorative art in Bavaria.
NETWORK & DINE
Workshop 1.4
Flight under the radar: Innovative protection against advanced persistent threats with FireEye*
Frank Melber, Head of Business Develop-ment Security Solutions, TÜV Rheinland
Alex Lanstein, Senior Security Researcher, FireEye
Around 95 % of all corporate networks are highly at risk of assault from advanced malware and other targeted, complex attacks or advanced persistent threats. Traditional signature-dependent security solutions are helpless against refined and complex cyber-strikes. FireEye has developed a security platform based on virtualization technology especially for the real-time defense from threats. This protects companies from all significant attack vectors at each phase of the offense.
Please note that the topics for the first and second sessions are identical. The six parallel workshops take place in two successive sessions. Please select a topic for the first and second session
Workshop 2.4
Flight under the radar: Innovative protection against advanced persistent threats with FireEye*
Frank Melber, Head of Business Develop-ment Security Solutions, TÜV Rheinland
Alex Lanstein, Senior Security Researcher, FireEye
Workshop 1.5
Next Generation Firewalling: Automated security in software defined infrastructure with Palo Alto Networks
Kristofer Heidenreich, Head of Professional Service, TÜV Rheinland
Michael Weisgerber, Channel Systems Engineer DACH, Palo Alto Networks
Virtualisation solutions can have a significant impact on the efficiency and availability of IT resources and applications. Previously, provision and configuration were only possible with manual intervention if security measures were to be complied with. Now, VMWare and Palo Alto have developed a virtualisation solution with ‚autopilot‘. With the help of the VMWare, NSX network virtualisztion, the next generation of network security can be automatically provided and distributed in virtualised data centres. This combination cuts investment and operating costs.
Workshop 2.5
Next Generation Firewalling: Automated security in software defined infrastructure with Palo Alto Networks
Kristofer Heidenreich, Head of Professional Service, TÜV Rheinland
Michael Weisgerber, Channel Systems Engineer DACH, Palo Alto Networks
Workshop 1.6
Application Delivery Firewall – rethink your security strategy! Comprehensive protection for data centres, webservers and applications
Raimar Melchior, Senior Security Consultant, TÜV Rheinland
Peter Held, Senior Field Systems Engineer, F5 Networks
Consolidating security in data centres saves investment, operating and servicing costs. With greater flexibility you can implement new business requirements much quicker.The F5-Intelligent-Services-Platform enables you to tailor the implementation of Layer 3-7 DDoS mitigation, security for web-based applications and unified access solutions for single-sign-on – regardless of whether you are working with applications in the data centre, in the cloud or SaaS.
Workshop 2.6
Application Delivery Firewall – rethink your security strategy! Comprehensive protection for data centres, webservers and applications
Raimar Melchior, Senior Security Consultant, TÜV Rheinland Peter Held, Senior Field Systems Engineer, F5 Networks
1. Session
2. Session
Get to know congress speakers, delegates and experts of our IT Security Congress in a relaxed atmosphere.
3.15 – 4.15 pm COFFEE BREAK | SNACKS | EXHIBITION
Please note that the topics for the first and second sessions are identical. The six parallel workshops take place in two successive sessions. Please select a topic for the first and second session
*Programme items in English