Watch the cybersecurity experts’ presentations
The Cybercrime Pyramid
2020 was the infamous drama that touched everybody on the planet. Industries too were drastically affected by last year’s events, and will continue to feel the consequences of 2020 for many years to come. Cybersecurity is one such industry. Driven by cybercriminals’ actions, the threat landscape has changed dramatically. The general trends and dynamics of 2020 will continue throughout 2021 and later.
In this presentation we’ll review the ‘pyramid’ of cybercrimes in 2020 and 2021. Based on scams (including phone scams), in the middle of the pyramid we have ransomware affecting companies and governments around the globe. At the top of the pyramid we have ‘advanced persistent threats’ (APTs), which have been extremely successful in the last 18 months due to increased vulnerability on the defense side due to the pandemic.
Rethink Cloud Security to Innovate at Speed
Operating a hybrid, multi-cloud environment is different from yesterday’s world, and so is securing it. Join us in this session as we dig deeper into the security imperatives that organizations like yours face around the world, and hear about:
- Interpreting compliance controls, assess and manage risk with prescriptive controls
- Ensuring data-centric protection with a Zero Trust architecture
- Managing threats across hybrid and multi-cloud and achieve continuous detection and response
- Infusing security and privacy into your application migration and modernisation roadmap with DevSecOps, and innovating at speed
Zero Trust: How Microsoft does it
We are at an inflection point now. With the move to hybrid work we will embrace a more flexible work model both in terms of where and when we work. We must adapt how we provide a great employee experience that is also secure. Fortunately, we know the solution and it called «Zero Trust». It means we don’t assume any identity or device is secure on any network — we verify it. This provides for a consistent and simplified experience from home, the office or anywhere in between.
What’s potential of Zero Trust Security to address a constantly-changing security landscape? Is it right for your organization? What are the challenges and obstacles your organization needs to overcome to make it a viable strategy? And is possible to develop and deploy modern cybersecurity model without trusting anyone. Let’s find it out together.
CISSP, CCSP, MCSE, Certified Azure Security Engineer
Seeing through clouds: ways to regain data visibility and control during cloud migration
In this talk we will be covering common ways to establish data security program in SaaS and IaaS environments. We will discuss advantages and disadvantages of existing approaches and provide recommendations on how they can be combined in a single unified architecture.
Protection of API and micro-service infrastructure. What shall WAF be able to do?
The security requirements of modern web applications have changed. Today, almost all traffic on the web is API calls: IoT, mobile app backends, any single-page applications, B2B integrations and interfaces, back-end systems and services.
And, surprisingly, all of these things are a blind spot for legacy security systems. About 40% of vectors for attacks on web applications are API-related, and the old generation WAFs can’t provide high-level protection against such attacks.
So what should a modern WAF be able to do? What are today’s criteria for choosing a system to effectively protect API? Find out in the speaker’s report.
Ask your question
Sergey joined Kaspersky in 2005 as a virus analyst, and, today, serves as the company’s chief expert, studying threats against financial systems and cyberespionage campaigns. His areas of specialty also include embedded system security, cybercriminal ’partner networks’, non-Windows threats (Mac OS, Unix OS), and botnets.
Sergey graduated from the National Research Nuclear University MEPhI in Moscow, Russia, with a degree in information security of automated systems.
Dr Sridhar Muppidi is an IBM Fellow and Chief Technology Officer in IBM Security. He drives the technical strategy, architecture, and research for IBM Security focused on Threat Management & Response, Digital Identity & Fraud Protection, Application & Data Security, Mobile & Cloud Security.
He is one of the industry-recognized technical experts and thought leaders in security with twenty-year experience in software product development and security solutions architecture for several industry verticals. He has delivered many market-leading products and solutions for both IBM and the clients while embracing key transformations like agile, mobile, cloud, and digital. His current responsibilities also include driving Research, leading workgroups in security & privacy and representing IBM in open standards activities.
Sridhar has an MS and a Ph.D. in computer science from Texas A&M University. He is an IBM Master inventor with about 50 patents and has published extensively in technical conferences and journals.
Abhijit Chakravorty is the Global Cloud Security Competency Leader for IBM Security, and is based in London.
Having been in the Information Security domain for 21 years, Abhijit has driven large cybersecurity transformation programs across multiple tracks — security architecture & design, risk controls covering identity & access management, cloud security, application & data security and security intelligence & operations. He has worked across different regions including North America, Europe and Asia.
As cloud security competency lead, Abhijit leads strategy and service delivery of cloud security & compliance capabilities to the global clients who are on their journey of adopting cloud platforms and services. In this capacity, he spends a lot of time meeting CTOs, CROs, CISOs tasked with evaluating/implementing secure & compliant multi/hybrid clouds.
He is a firm believer that cloud security starts with design of the right architecture and (forever) ends with automation.
Artyom has 18 years of experience in IT with 6 years working as a security solutions architect at Microsoft Consulting Services delivering projects in EMEA countries. His presentation from last year’s international cybersecurity conference The StandOFF was named among the Top 9 sessions of the event. He holds top international certifications in Information (CISSP) and Cloud (CCSP) Security as well as many other industry certifications. Before joining Microsoft, Artyom was an active security community member, he was chosen as Microsoft Security Trusted Advisor and was awarded Microsoft Most Valuable Professional (MVP) status multiple times. Besides professional interests, Artyom is fond of cinematography, electronic music and is a Magic: The Gathering trading card game player.
Kirill Kasavchenko is a Senior Engineer at Netskope, a leading cloud security company. His main area of interest is network security, especially in large-scale environments.
From early 2000s, Kirill held various post and presales roles dealing with telecom operators and large enterprises in more than 30 countries of Europe, the Middle East, Russia, and the Commonwealth of Independent States (CIS). Prior to joining Netskope in 2021, he was a Principal Engineer at Netscout/Arbor and Chief Engineer at Huawei.
Kirill holds bachelor’s and master’s degrees (with honours) in computer sciences from Saint Petersburg University of Information Technologies, Mechanics and Optics as well as a number of industry certifications including Cisco Certified Internetwork Expert (CCIE) Emeritus.
Besides being a co-founder of Wallarm, Ivan Novikov is also:
- a provider of AI-powered application security
- a white-hat security professional with over 12 years of experience in security services
- an inventor of memcached injection and an SSRF exploit class
- a recipient of bounty awards from Google and Facebook
- a speaker at HITB, Black Hat, and other industry events