Securing Critical Infrastructure across Industries
Facebook X LinkedIn

Securing Critical Infrastructure across Industries

Combined Session
Thursday, November 10, 2022 14:00—15:00
Location: Caroline von Humboldt

Continuous Zero Trust Transformation using a Value and Risk Driven Approach

For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics. It is unlikely to have a greenfield implementation as there is a rich fundament of processes, technologies and business uses cases need to be covered. This presentation describes how to build a holistic view of your ecosystem, understand your maturity, develop a reference architecture for your vision and then come up with a continuous transformation to achieve the targets using a value and risk driven approach.

 

Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Click here to watch the recording of this session. You'll need to log in to watch it.
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Presentation deck
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Robert Brcina
Dr. Robert Brcina
Global Cyber Security, Mercedes-Benz AG
Robert is working in the area of Global Cyber Security focusing on Privileged Access Management and Secret Management (PAMSM) within Mercedes-Benz AG. He is leading the PAMSM Product and Product...
Aaron Chu
Aaron Chu
Atos
Aaron is working with Atos customers in finance, media and manufacturing industries, defining technology strategies and implementing solutions that transform operating environments to meet the...

On the Charge: Securing the Energy Sector

The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical and digital infrastructure makes utilities an interesting case study for cybersecurity implementation.

Jerry Onesti and Jochen Toesmann from EON highlights the impact of cyberthreats across the value chain of utilities and shares his insights on how to protect assets associated with cyber-sophisticated industries such as energy.

On the Charge: Securing the Energy Sector
Event Recording
On the Charge: Securing the Energy Sector
Click here to watch the recording of this session. You'll need to log in to watch it.
On the Charge: Securing the Energy Sector
Presentation deck
On the Charge: Securing the Energy Sector
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Jerry Onesti
Jerry Onesti
E.ON
In 2015, after returning from living abroad, Jerry pursued a career in infosec by gaining a vocational degree as an IT security technician.He then joined E.ON in 2020 as a Security Analyst in the...
Jochen Tösmann
Jochen Tösmann
E.ON
Jochen is working as Resilience and CyberRange-e Senior Expert in the cyber security unit of E.ON. His main focus is to support E.ON’s DSOs during trainings at the CyberRange-e, managing...

Protecting Infrastructure in an Exposed Environment

Nation states started to attack infrastructures across the Globe. In the past they focused on governments and defense – not anymore. Our data shows that the risk is across all industries.

How does the world look like and what can you do against it?

Protecting Infrastructure in an Exposed Environment
Event Recording
Protecting Infrastructure in an Exposed Environment
Click here to watch the recording of this session. You'll need to log in to watch it.
Protecting Infrastructure in an Exposed Environment
Presentation deck
Protecting Infrastructure in an Exposed Environment
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Roger Halbheer
Roger Halbheer
Microsoft
Roger Halbheer is Chief Security Advisor for Microsoft covering Switzerland, Germany, Austria, and The Netherlands. In this role, he acts as a trusted advisor to C-level executives in the...
Subscribe for updates
Please provide your email address