10:00 – 10:15 AM
10:15 – 10:45 AM
10:45 – 11:05 AM
11:05 – 11:30 AM
11:30 – 11:55 AM
DEEP DIVE CDC+SOC
Rüdiger Peusquens &
11:55 – 12:20 PM
FUTURE SIEM: REAMS
Prof. Dr. Christoph Meinel
Institute Director and CEO
Hasso Plattner Institut
12:20 – 1:00 PM
1:00 – 1:30 PM
1:30 – 2:00 PM
Innovation and Integration
Security Evangelist EMEA
2:00 – 3:20 PM
Sessions, Exhibition & Guided Tours
Telekom Security & Product-Partner
3:20 – 3:50 PM
STAYING ONE STEP
AHEAD OF ADVANCED
Vice President Emerging Products
Checkpoint Software Technologies
3:50 – 4:20 PM
THE IMPORTANCE OF THE
SOC FROM THE POINT OF VIEW
OF AN ENERGY SUPPLIER
Head of Group Security
4:20 – 4:40 PM
TALK ON STAGE
4:40 – 5:00 PM
5:00 – 5:30 PM
Dr. Andreas Abel
5:30 – 6:00 PM
BLOCKCHAIN? NOT AGAIN!
Dr. Stefan Schröder
Member of Executive Committee
6:00 – 6:30 PM
Vice Präsident Cyber Investments
6:30 – 6:45 PM
9:00 – 9:15 AM
9:15 – 9:30 AM
IT-SECURITY CLUSTER BONN
9:30 – 10:00 AM
HIGHSPEED AT 1.000 KM/H
SVP Global Field
10:00 – 10:20 AM
MAGENTA SECURITY SHIELD
Head Internal Security
10:20 – 10:50 AM
10:50 – 11:10 AM
Head of Consulting Car Security
11:10 – 11:30 AM
HONEYCAR & SOC
11:30 – 11:50 AM
VERIMI: THE NEW
FOR DIGITAL IDENTITIES
11:50 – 12:20 AM
FOR THE DIGITAL
Chief Strategy Officer
12:20 – 1:00 PM
1:00 – 2:10 PM
BREAK OUT //
Telekom Security &
2:10 – 2:30 PM
2:30 – 2:35 PM
2:35 – 3:00 PM
The numbers speak a clear language: The pressure of attack against the networks of the administration – and for sure not only the administration – is building up. At the same time we notice that detection rate of AV scanners is constantly declining. Therefore one can expect that sooner or later one of those attacks will get through and some attacker will try to steal data from us. But before data can be stolen, one has to find it on files servers and database servers. At this point the project HonySens comes in. What we try to accomplish is detecting such intelligence activities and alerting the responsible administrators of the fact that somebody is poking around in his or her network. On the side, this has to be a mostly automated process, given the limited personal resources in our public administration.
How can you react if you have been the victim of a cyberattack? If you have an SOC, the answer is simple, but what can do, if your organization is not ready yet? In order to show the possibilities that one still has, typical attack scenarios are presented and described. We will explain which countermeasures can be prepared with simple effort, how to identify existing reaction possibilities and which mistakes to avoid. General experience shows that there are always many more possibilities than you would expect as a victim of a cyber-attack.
Learn how to securely enable access to your enterprise applications, regardless of there location. Empower your users without impacting their need for digital consumption & protect your applications using Zscaler Private Access.
The use of cloud applications introduces new compliance and security risk. Typical enterprises find hundreds of cloud apps in use and most of these services are not business ready, do not meet compliance requirements and have zero security oversight. Telekom’s Cloud Protect Pro leverages Symantec’s industry-leading Cloud Security Access Broker solution called CloudSOC in order to provide visibility, data security and threat protection for today’s cloud generation of users across a wide range of sanctioned and unsanctioned Cloud services.
Der Albtraum jeder Firma: Die Kundendaten stehen offen im Netz, wurden kopiert oder sind abhanden gekommen. Doch wie schützt man sich vor diesem Schreckensszenario? Korbinian Lehner, VP Portfoliomanagement IT der Telekom Deutschland, erläutert in seinem Vortrag wie sichere CRM-Systeme aussehen, was sie leisten können und wie man Hacker erfolgreich aussperrt.
2017 was a turning point in the cyber threat landscape. The amount of threats and their sophistication increased dramatically and the new wave of mega attacks affected organizations globally. In this session we would elaborate on the recommended strategy to protect the enterprise against these advanced threats – a 360 degree attack prevention approach: Reducing the attack surface, screening known attacks, simulating unknown attacks, and intercepting threats at runtime – all using Check Point’s innovative advanced threat prevention suite – SandBlast.
Traditional SIEM solutions are based on static rules which makes operating complex and expensive while having a lack of visibility for unknown threats. Exabeam focuses on AI to solve one of the major IT security problems. Watch our live demo to see how easy Incident Management can be. The solution can either be used on top of an existing SIEM / log management solution or used as a modern stand allone Incident Management solution.
Quantum Computers starting a new era in computing. This opens great opportunities but also creates huge challenges for IT Security. Practical advantages of Quantum Computers are within reach due to progress in the construction of quantum hardware. Today's public key algorithms like RSA and ECC are soon-to-be replaced by alternatives that are secure against Quantum Computers. This is the begin of Post-Quantum Cryptography.
This talk explains a Post-Quantum digital signature algorithm called XMSS. We show how this algorithm is applied by Deutsche Telekom. Further we show use cases in which immediate action is required and possible solutions in absence of official standards.
The presentation describes DTAGs activities in the area of early warning and provides an insight look within the infrastructure including honeypots.
Schätzungsweise 70% der Breaches starten bei den Endgeräten. Cisco bietet mit Umbrella und Advanced Malware Protection for Endpoints innovative Lösungen um alle Endgeräte in Echtzeit besser vor Schadsoftware oder weiteren Bedrohungen zu schützen. Wir zeigen Ihnen auf, wie effektiv diese Lösungen arbeiten und wie einfach diese zu installieren und zu verwalten sind...
Auf keinen Fall verpassen: Ein neues Level an IT-Sicherheit „Made in Germany“ in der Cloud (Data in Rest) und auf dem Transportweg (Data in Transit) zwischen Lokationen und Rechenzentren
• Nutzung von Cloud Applikationen wie Sharepoint oder O365 vielleicht doch mit Sicherheitsbedenken, warum brauche ich einen hochsicheren CASB?
• Nutzung von Access- und Berechtigungskonzepten, reicht das in meiner Cloud Strategie?
• Meine Geschäftspartner sind mir wichtig, na klar nutze ich Collaboration Software, wie kann mein Sicherheitskonzept die „Bösen“ draußen halten?
• Transport via „Etherconnect“ zwischen meinen Lokationen und Datacenter brauche ich, wie sperre ich die ungewünschten „Mithörer“ aus?
• Wie war das nochmal mit den Backdoors, gibt es wirklich Alternativen ohne?
Sicherheitsexperten befinden sich tagtäglich in einem Kampf – auf der Jagd nach Kriminellen, die ihr Unternehmen stören wollen. Für den Jäger sind dabei effiziente Werkzeuge essentiell, um die Bedrohung erkennen und die Reichweite des Angriffes beurteilen zu können. Nach der erfolgreichen Verfolgung ist jedoch noch sicherzustellen, dass der gleiche Angriff nicht auf einem anderen System oder über einen anderen Weg durchgeführt werden kann. Alle Sicherheitssysteme müssen daher so schnell wie möglich über die neue Bedrohung informiert werden. Wie unsere Kunden ihre Fähigkeiten zum Aufspüren von Bedrohungen beurteilen, wie sie eine offene Plattform zum Schutz vor Malware und vor Datenverlust entwickeln können, um ein Höchstmaß an Sicherheit, aber auch an Effizienz erreichen können, das alles wollen wir ihnen in unserem Vortrag erläutern.
Millionen von Events, Tausende von Alarme – zu viele Warnmeldungen und zu wenig Mitarbeiter, um diese zu analysieren. Gleichzeitig steigen die Anforderungen an den CISO und die IT-Sicherheitsverantwortlichen bezüglich Datensicherheit und Fristen für die Meldung von Datenschutzverletzungen im Rahmen der bis Mai 2018 umzusetzenden EU-Datenschutz-Grundverordnung. Herkömmliche Netzwerk- und Endpunktsicherheit reicht hier nicht mehr aus. Mit KI und maschinellem Lernen lassen sich Benutzer- und Datenzugriffe besser analysieren, mögliche Schwachstellen schneller identifizieren und beheben.
Cyber Threat Intelligence. Creation vs Consumption
Cyber Threat Intelligence (CTI) is the new next big thing in the cyber security community where it has been around for some time in law enforcement and intelligence communities.
In this session we will look into CTI creation and the solutions rola Security Solutions GmbH provides but also the growing CTI market from a Cyber Security perspective and the economic and psychological forces that affect the market. Is CTI going to improve the cyber security capabilities or is it just another buzzword and potentially suffering from the same psychological heuristics and cognitive biases we experience in risk assessment.
Im Bereich der Cyber-Kriminalität bilden sich immer mehr Dienstleistungsstrukturen aus, wo Kriminelle ihr Know-How, ihr Wissen, ihre Werkzeuge und Daten wie auf einem Marktplatz gegen Geld anbieten. Die Breakout-Session beleuchtet einige typische Beispiele dieser Form der Entwicklung krimineller Kooperation, die strafrechtliche Bedeutung solcher Modelle und mögliche Schutzmaßnahmen.
You sure heard the stories of how pattern-based attacks bring entire production lines to a standstill and blast furnaces or disclose the data of thousands of online users of a retailer! Frightening examples of how easy cybercriminals can gain access to a company's network and the damage they can cause. Most of the times, characteristic attack patterns are used, which every company can prevent with appropriate preventive measures:
1) Backup and control of privileged credentials
2) Protection of end devices (not referring to perimeter protection!)
3) Detection of threats.
We demonstrate best practices based on experience and show you how a successful security program for privileged accounts should look like – based on your requirements and needs… without affecting your operative business!
War es früher ausreichend, das eigene Unternehmen am Perimeter zu schützen, so ist es heute essentiell, auf die agile IT Infrastruktur mit den richtigen Maßnahmen und Sicherungen zu reagieren, indem ganzheitlich Assets ermittelt, geprüft und geschützt werden. Wir zeigen unseren Weg zur ganzheitlichen Sicht auf die IT- Sicherheit von Unternehmens.
Stephan Schulz, F5 Sicherheitsexperte, demonstriert mit welchen Tricks und Tools sich Hacker heute Zugang zu den Applikationen der Unternehmen verschaffen, und wie Sie diese Angriffe zuverlässig abwehren können.
Don't do things halfway in your secure communications strategy. A centralized management system which integrates business IT, production IT, product IT, product IT and AI/R&D is a solid foundation for comprehensive protection. Centralized management systems can cover multiple architectures at the same time: hardware, virtual, as a service, or cloud − and of course encryption, multi-client capability, strong authentication, and endpoint security.
Almost daily, news are reporting about data breaches in which attackers gained access to large piles of identity-related information. Just recently, data breaches with millions of stolen identities of companies like Equifax, Uber and DailyMotion became public. Undoubtedly, these breaches constitute a major threat because victims might fall to identity theft. As part of our warning service for victims of these breaches, we have gathered and normalized most of the publicly available breaches and could assess over 5 billion credentials. Apart from our security awareness service, the large amount of real world credentials allows to create comprehensive and realistic password statistics.
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates a massive, global cloud security platform that protects thousands of enterprises and government agencies from cyberattacks and data loss. Learn more at zscaler.com or follow us on Twitter @zscaler.
Zscaler ™, SHIFT™, ZIA™, ZPA™, Direct-to-cloud™ and The internet is the New Corporate Network™ are trademarks or registered trademarks of Zscaler, Inc. in the United States and/or other countries. All other trademarks are the property of their respective owners.
What we do:
Cisco (NASDAQ: CSCO), the world's leading IT provider, is helping companies to take advantage of tomorrow's business opportunities today. The networking of people, processes, data and things creates incomparable opportunities. This enables companies to optimize processes, use resources more efficiently than before and thus gain advantages over competitors. So far 15 billion things are connected to the Internet – that is only one percent of what is possible. By 2022, Cisco estimates that the business potential of Internet of Things is estimated to be 14.4 trillion US dollars.
Cisco designs and sells a broad range of technologies that have been powering the Internet since 1984. Across networking, security, collaboration, and the cloud, our evolving intent-based technologies are constantly learning and adapting to provide customers with a highly secure, intelligent platform for their digital business. The company is focused on the market segments Enterprise (large companies, small and medium-sized enterprises as well as public authorities) and Service Providers. Cisco relies on indirect sales through around 2,200 certified partners in Germany.
Cisco in Germany
In March 2016, Cisco launched "Deutschland Digital". With this initiative, Cisco invests specifically in speeding up digitization in Germany – particularly in the three focal areas of innovation, cyber security and education. The investments include start-up financing for specific digitization projects, research funds, the expansion of the Cisco Networking Academy program and direct investments in a venture fund as well as additional personnel and infrastructure expenses. Deutschland Digital is part of Cisco's worldwide “Country Digitization Acceleration” initiative. In Europe, Cisco has already announced investment plans in the UK, France and Italy.
Cisco in Numbers
In fiscal year 2017, Cisco achieved sales of 48 billion US dollars with approximately 72,900 employees worldwide (as of January 2018). The CEO is Chuck Robbins. Cisco's operations are divided into the Americas, EMEAR (Europe, Middle East, Africa and Russia) and Asia Pacific/Japan/Great China. The EMEAR region is managed by Edwin Paalvast. In Germany, Cisco has offices in Garching near Munich, Berlin, Bonn, Düsseldorf, Eschborn, Hamburg, Mannheim and Stuttgart. Since 2013, Oliver Tuszik has been Vice President and CEO of Cisco Germany.
Cisco's corporate motto is "innovative everywhere, connect everything, benefit everyone". It underlines the importance and requirements of digital transformation. As a leading provider of the fundamental technologies, Cisco employees use them as well as the company's customers.
Discover more at thenetwork.cisco.com
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
CyberArk is the only security company laser-focused on striking down targeted cyber threats, those that make their way inside to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk is trusted by the world’s leading companies — including more than 50% of the Fortune 100 — to protect their highest-value information assets, infrastructure and applications.
For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets. Today, only CyberArk is delivering a new category of targeted security solutions that help leaders stop reacting to cyber threats and get ahead of them, preventing attack escalation before irreparable business harm is done. At a time when auditors and regulators are recognizing that privileged accounts are the fast track for cyber attacks and demanding stronger protection, CyberArk’s security solutions master high-stakes compliance and audit requirements while arming businesses to protect what matters most.
With offices and authorized partners worldwide, CyberArk is a vital security partner to more than 3,200 global businesses, including:
Imperva® is a leading cybersecurity company that delivers best-in-class solutions to protect data and applications – wherever they reside – on-premises, in the cloud, and across hybrid environments. The company’s Incapsula, SecureSphere, and CounterBreach product lines help organizations protect websites, applications, APIs, and databases from cyberattacks while ensuring compliance. Imperva innovates using data, analytics, and insights from our experts and our community to deliver simple, effective and enduring solutions that protect our customers from cybercriminals.
Learn more at www.imperva.com, in our Blog or at Twitter.
Senior Sales Executive Germany
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.
Country Manager DACH Qualys GmbH
F5 (NASDAQ: FFIV) makes apps go faster, smarter, and safer for the world’s largest businesses, service providers, governments, and consumer brands. F5 delivers cloud and security solutions that enable organizations to embrace the application infrastructure they choose without sacrificing speed and control. For more information, go to f5.com. You can also follow @f5networks on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies.
Rohde & Schwarz Cybersecurity is an IT security company that protects companies and public institutions around the world against cyberattacks. The company develops and produces technologically leading solutions for information and network security, including highly secure encryption solutions, next generation firewalls and software for network analysis and endpoint security. The portfolio also includes vulnerability scanners and firewalls for business-critical web applications and web services. The award-winning and certified IT security solutions range from compact, all-in-one products to customized solutions for critical infrastructures. To prevent cyberattacks proactively, rather than reactively, our trusted IT solutions are developed according to the security-by-design approach. More than 500 people are employed at locations in Germany, France and Denmark.
Rohde & Schwarz Cybersecurity Gmb
Mühldorfstrasse 15 | 81671 München, Germany
Info: +49 (0) 30 65884-223
Rohde & Schwarz GmbH & Co. KG
McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.
Remote Access VPN Solutions Made in Germany
For more than 29 years, Nuremberg-based NCP engineering GmbH has been focusing on the development of universally applicable software components enabling end devices to easily and securely connect to the corporate headquarters’ network via public networks. The remote access VPN solutions are used for mobile computing, branch office networking, M2M and Industry 4.0. NCP's core competencies are in the areas of fully automated central remote access VPN management as well as encryption and firewall technologies.
NCP clearly aims at standardizing and automating all communication processes for both the administrator and the end user. The comprehensive framework of NCP's Next Generation Network Access Technology eliminates the complexity of remote access infrastructures. Our remote access VPN solutions for Windows, OS X, Linux, Android, iOS and Blackberry are universal, secure, easy to use and cost efficient.
Hasso-Plattner-Institut für Digital Engineering gGmbH
With its bachelor‘s and master’s degree programs in “IT Systems Engineering,” the Faculty of Digital Engineering, established jointly by HPI and the University of Potsdam, offers an especially practical and engineering-oriented study program in computer science that is unique throughout Germany. At present, more than 500 students are enrolled in the program. HPI consistently earns the top position in the CHE University Ranking. The HPI School of Design Thinking is Europe’s first innovation school for university students. It is based on the Stanford model of the d.school and offers 240 places annually for a supplementary study. HPI conducts research noted for its high standard of excellence in its IT topic areas. PhD candidates carry out research at the HPI Research School in Potsdam and its branches in Cape Town, Haifa, Nanjing and at the recently opened office in New York. The focus of HPI’s teaching and research is on the foundations and applications of large, highly complex and networked IT systems. In addition, HPI concentrates on the development and research of user-oriented innovations for all areas of life. Visit www.hpi.de
Dr. Maxim Asjoma
Exabeam provides security intelligence and management solutions to help organizations of any size protect their most valuable information. The Exabeam Security Intelligence Platform uniquely combines a data lake for unlimited data collection at a predictable price, machine learning for advanced analytics, and automated incident response into an integrated set of products. The result is the first modern security intelligence solution that delivers where legacy security information and event management (SIEM) vendors have failed. Built by seasoned security and enterprise IT veterans from Imperva, ArcSight, and Sumo Logic, Exabeam is headquartered in San Mateo, California. Exabeam is privately funded by Lightspeed Venture Partners, Cisco Investments, Norwest Venture Partners, Aspect Ventures, Icon Ventures, and investor Shlomo Kramer. Follow us on Facebook, Twitter, and LinkedIn.
maincubes, headquartered in Frankfurt am Main, is a German company and part of the medium-sized Zech Group, Bremen. maincubes provides its customers with a network of high-availability data centers in Europe that enable colocation in conjunction with secure eco-systems for the digital future of companies in various industries. Customers and partners of maincubes can connect worldwide through the SecureExchange platform and use connectivity and cloud services from our strategic partners to expand their business opportunities. maincubes services are secure, efficient and user-friendly.
maincubes provides its customers with colocation services with an additional level of security (including specially secured racks, cages and cross-connects). Value-added services, in particular for the construction of secure eco-systems, are made available to the customers within the maincubes data centers via strategic partners who directly arrange these services with maincubes’ customers. Key partners for the SecureExchange include: Telecom-Security, ITENOS, operational services and Siemens ("Work in Progress"). maincubes has a strong focus on the market of small and medium sized companies, but is also willing and able to realize larger projects.
For fifteen years, the world’s leading network operators across ISP, cloud and enterprise markets have relied on Arbor Networks for traffic visibility, advanced threat detection and DDoS mitigation. Through a combination of market-leading technology, elite security research, intuitive workflows and powerful data visualizations, Arbor allows you to efficiently connect the dots to understand attack activity and to take action with confidence. See the threat, understand the risk and protect your business with Arbor Networks.
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 330,000 customers trust Fortinet to protect their businesses. Learn more at http://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.
With EgoSecure Data Protection, the German security specialist EgoSecure from Ettlingen has been the innovation leader in comprehensive data protection solutions for more than 12 years. EgoSecure is the first manufacturer in the world to combine the transparency of the data streams on the end devices and the defenses in one product. Our partner Avira has been a pioneer in antivirus protection for more than 30 years. The product portfolio has received many awards in terms of malware detection, performance and usability.
EgoSecure Data Protection is not only fully compatible with Avira's enterprise security solutions, but also provides central management of Avira Antivirus. This allows you to configure, license, install and uninstall from EgoSecure's management console. In combination with the other protection modules from EgoSecure, you achieve an even higher IT security standard for your IT systems.
The technology leader for your network security
macmon provides you with convenience and security throughout your entire company network, and an overview of it at all times – IT Security made in Germany.
With macmon NAC you always know which devices are connected to your network and you can manage all of your devices such as IPADs, PC, printers, as well as medical devices or manufacturing robots, protecting your network against unauthorised access.
With the help of dynamic management of the network segments, guest and employee devices (BYOD) can be allowed via the macmon guest service. Besides immediate network transparency for LAN and WLAN, macmon NAC also enables you the adherence of current IT security standards (among others DIN ISO 27001).
genua gmbh is a German company specializing in IT security. It has been securing networks and developing sophisticated security solutions since the company was founded in 1992. Our business activities range from securing sensitive interfaces in public authorities and industry to networking highly critical infrastructure, reliably encrypting data communication over the Internet, remote maintenance solutions and providing remote access for mobile users and home offices. Our solutions are developed and produced in Germany. Many companies and public authorities rely on solutions from genua to protect their IT. genua is a member of the Bundesdruckerei Group.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000. www.FireEye.de
FireEye Deutschland GmbH
+49 (0)811 88 98 200
operational services is a joint venture between T-Systems International and Fraport and offers the development and operation of ICT infrastructure and solutions. With more than 800 highly qualified experts, we are the full-service ICT service provider for companies of all sectors. Quality, reliability and safety „Made in Germany“ are our principles.
Splunk Inc. (NASDAQ: SPLK) turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges. Join millions of passionate users and discover your “aha” moment with Splunk today: http://www.splunk.com.Twitter Account:
Arrow Electronics (www.arrow.com) is a global provider of products, services and solutions to industrial and commercial users of electronic components and enterprise computing solutions. Arrow serves as a supply channel partner for more than 125,000 original equipment manufacturers, contract manufacturers and commercial customers through a global network of more than 465 locations serving over 90 countries. A Fortune 150 company with 18,700 employees worldwide, Arrow brings technology solutions to a breadth of markets.Twitter Account:
DRACOON is the Enterprise File Sharing market leader in the German-speaking region and is one of the fastest-growing SaaS companies in Germany. The highly secure, platform-independent software is available as a cloud, hybrid and on-premises version and has been named ‘leader‘ by independent top analysts such as ISG. Various certifications such as ISO 27001, EuroPriSe and ULD attest DRACOON’s highest security standards. As one of the first German solutions, DRACOON fulfills all requirements of the EU GDPR. Its universal API offers a broad array of application fields, ranging from data exchange and workflow integration over email communication to the complete modernization of file services. These companies trust DRACOON: KfW, Rossmann, Helios Kliniken, Rödl & Partner, Deutsche Telekom, Hutchinson, British Telecom, Bechtle, and many more.Twitter:
Marc Schieder, CIO
Being able to access all relevant information at any time and at any location – what was considered a dream in the fight against crime a few years ago has long been reality for us.
Because among other things in the context of complex investigations, risk analyses or the evaluation of attacks, it is important to recognize, merge and analyse important information. Without these possibilities, the mere information in the age of data overload hardly contributes to the solution.
rola Security Solutions develops, distributes and integrates IT solutions for internal and external security since 1983. We enable the networking of all involved users. National and international security and investigation authorities trust our competence. We provide our customers with intelligent IT systems, which are tailored to the individual user.
Thanks to many years of cooperation with security authorities, field-proven IT solutions have emerged:
• Cyber Threat Intelligence (rsCyInt®)
• Networked case processing (rsCase®)
• Military Intelligence and Border Security Management (rsIntCent®)
• Mass data analysis (rsExTract®)
• Social Media Analytics (rsNetMAn®)
• Provider data processing (rsCoala®)
• Evidence management (rsEvid®)
Dirk Linneman, Leiter Vertrieb & Produktmanagement
Here you can download a selection of presentations from the Telekom Fachkongress Magenta Security
|Dirk Backofen||Welcome to our “Security Gipfeltreffen” | Keynote||||
|Arne Schönbohm||Cyber security in digitalisation|
|Christoph Meinel||Research: Future siem: REAMS|
|Thomas Hemker||Innovation and Integration|
|Florian Haacke||The importance of the SOC from the point of view of an energy supplier|
|Christian Nern||Artifical Intelligence & Security|
|Leicht, Abel, Backofen||Joint Corporation: VR Cyber Security Services|
|Dirk Backofen, Dr. Stefan Schröder||Blockchain? Not again!|
|Zohar Rozenberg||Cyber defense - Present perspective and lessons learned|
|Karl Feger||Honey Sens in SVN 2.0|
|Dr. A. Schinner||IT-Forensic|
|Frank Wagner||Privacy by Design – How data protection comes in to products & services|
|Nathan Howe||Simple, secure & empowered application access with zscaler´s private access|
|Martin Krömer, Dietmar Krüger||Cloud Protect Pro - Telekom’s new service to provide secure access to the cloud|
|Korbinian Lehner||Customer data hacked & lost! How do you protect yourself and your data?|
|Nathan Shuchami||360 degree approach for advanced threats prevention|
|Peter Häufel||Efficiency with ai – in case your SIEM gets too expensive and too complex|
|Dr. Enrico Thomae, Tim Schneider||Escape the quantum apocalypse|
|Dr. Markus Schmall||Early Warning @ DTAG, doing things the right way|
|Sven Kutzer||Innovative cisco security solutions for the endpoint|
|Frank Hörner||A new level of it security "made in Germany" in the cloud and in transit|
|Chris Trynoga||Disturbing troublemakers art or science?|
|Drew Schuil||Alert and data overload! How the use of ai and machine learning simplifies the tasks of the it security department|
|Ingo Kruckewitt, Dr. Christian Gayda||Next Generation Endpoint Protection - An important building block in the security ecosystem|
|Arjan Kolvoort||Cyber Threat Intelligence|
|Nick Earle||Vision: Secure Highspeed with 1.000 KM/h|
|Thomas Tschersich||Magenta Security Shield|
|Shaun Kirby||Visionary Talk: Car-Security|
|Donata Hopfen||Verimi: The new european platform for digital identities|
|Manoj Apte||Rethinking Cybersecurity for the Digital Transformation Era|
|Max Röttgermann||Rien ne va Plus? DDOS Protection @ Deutsche Telekom|
|Thomas Königshofen||Crime as a Service|
|Michael Kleist||Hacker attack is (too) easy!|
|Thomas Wendt||From network protection to DEVSECOPS|
|Stephan Schulz||Next generation application security|
|Bernd Kann||Secure Communications NOW and TOMORROW|
|Georg Vogel, Jan Tietjen||MPP – The real-time mobile protection always with you|
|Bernd Jäger||How to protect IoT-Infrastructure|
|Frank Becker||Access – Convenient and secure|
|David Jäger, Chris Pelchen||The threat of identity leaks|
|Michael Ding||Secure data distribution|
|Martin Lutz||ALL-IP Security|
Alexander Schinner is on the trail of malefactors - in cyberspace. What he experiences, he tells in this interview.
Everyone talks about Blockchain. Telekom Security has developed an application scenario that really helps companies. Blockchain expert Tim Schneider explains how that looks like.