Venue 1
TIME
SESSION
9:00
Opening speach
DSS ITSEC opening speach annualy performed by Deffence Minister of the Republic of Latvia
9:30
Security Industry and Business Association greetings
{comment about session, theme]
10:00
Malicious informations manipulation
All institutions, public and private alike, are fundamentally founded on the idea of trust on the information they operate on. What happens, when that trust is compromised? [expander_maker id=”1″ more=”Read more” less=”Read less”] Compromising information integrity, its trustworthiness, can have far more devastating operational effects than mere theft of information or denying access to it. It might cause an organization to make decisions based upon bad information or reduce customer trust in their platform or business. Cyberthreat, information manipulation, is all about that. In this session, we will get introduction to what information manipulation is about, some public cases already taken place and ideas on how to detect and prevent information manipulation. This session will also dig into problematics of countering information manipulation due lack of actors in cybersecurity understanding the actual information they are supposed to protect and the operations (e.g. processes) using that information to operate. A shift in thinking is needed from ICT-system security to actual security of information and processes [/expander_maker]
10:30
Integrated Scoring and Awareness for Cyber Ranges. Strategy
The solution is based on eight years of research and experience in conducting complex technical cyber security exercises, including NATO CCDCoE “Locked Shields“, “Crossed Swords“ and other national and international exercises.
11:00
IBM Security: Our Biggest Bet Yet
2018 has presented even more daunting challenges to cyber security professionals. Criminal innovation is thriving and the “black hats” are continually inventing new ways to improve profit and reduce the effort required to conduct their “businesses”. Meanwhile, the average time required and cost to detect and remediate breaches continues to escalate. [expander_maker id=”1″ more=”Read more” less=”Read less”] In this session, you will learn how IBM is “doubling down” on our cyber security investments in order to combat these threats–and those yet to emerge. [/expander_maker]
11:30
Coffee break
12:00
SCADA Cyber Security: The Paradox of Industrial Digitization
Much has been said and written about Information Technology / Operations Technology integration in the last decade. IT/OT network integration is generally assumed to go hand-in-hand with other kinds of IT/OT personnel and business process integrations. [expander_maker id=”1″ more=”Read more” less=”Read less”] Safety and reliability issues associated with IT/OT integration are often not discussed at all, or are at best dismissed as something “OT has to look after.” If it were only that easy. With every advantage gained through digitization, there comes a potential safety or reliability challenge – many of which relate to cybersecurity. This presentation introduces control systems and control system security issues for IT audiences. We look to the near term future examining how IT and OT networks must be managed differently, in spite of OT networks hosting essentially the same kind of network and computer components as do IT networks. Finally, we explore an emerging spectrum of options for safe IT/OT integration. [/expander_maker]
12:30
Cost Of Cyber Security Crime Study 2018
[…..]
13:00
Skyrocketing Cybercrime: Reasons and Measures
[…..]
13:30
Lunch break
14:30
The Artificial Reality of Cyber Deffence
With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational tax on nearly every employed individual throughout the world. [expander_maker id=”1″ more=”Read more” less=”Read less”] Amazingly enough, attackers have reached a level of maturity and efficiency – taking advantage of the increased value and vulnerability of online targets, and resulting in a dramatic increase in attack frequency, complexity and size. In order to fight evolving threats, organizations need to implement the most adequate security solutions to fully protect against new threats and all types of attacks. Attackers are deploying multi-vector attack campaigns by increasing the number of attack vectors launched in parallel. In order to target an organization’s blind spot, different attack vectors target different layers of the network and data center. Even if only one vector goes undetected, then the attack is successful and the result is highly destructive. [/expander_maker]
15:00
Using Behaviour Based Detection to Defeat Attackers & Insider Threats
[…..]
15:30
Security Testing: Lies, Truths and Little Secrets They Never Told You, from 20+ Years of Field Experience
[…..]
16:00
Coffee break
16:30
TOP 10 Ways to Make Hackers Excited: All About The Shortcuts Not Worth Taking
[…..]
17:00
Discussion Panel
18:00
Closing
Tab #2
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.