|Security Automation World||Smart Security Week Innovation Live|
PLENARY GRAND OPENING
Keynotes & panels addressing transversal topics of the Smart Security Week conferences
2.00pm: EXHIBITION OPENING
From Common Principles to Standards
All-day: Exhibition & Demos
|Securing the IoT for the EntreprisE|
|Managing Cybersecurity in Business||
Exhibition & Demos
|Workshop by Darktrace
AI for Cyberdefense
Smart Security Week Awards Ceremony
Common to the co-located conferences forming Smart Security Week, the Grand Opening will give a global view of public and private Cybersecurity initiatives to forge a united response to cyber threats, from policies and regulations to PPP, from industry solutions to best practices. The European Union’s responses to cyber threats has paved the way to cooperative cybersecurity between Member States with the NIS Directive, cPPP, IoT “Trust Label”, Privacy, GDPR, eIDAS and a renewed cybersecurity framework in preparation. On the other side of the Atlantic, the US NIST’s Framework also aims to the convergence of cybersecurity responses. The recent development of these initiatives, and others from around the globe, will be presented and discussed in the first part of the Opening. The second part will focus on private sector cybersecurity responses with focuses on Digital Identity management and IoT security challenges.
European Cyber Security Leaders (ECIL): harmonization replace fragmentation, NIS2.0 should follow NIS, rapide action force is indicated, incentive for private actors to participate on security information sharing, recommendations for asset protection of SMEs in EEA, security algo based on guidelines from EU, staged security and mutual acceptance is needed, backdoor for illegal use must be prevented, EU regulatory sandboxing is recommended, new cyber security innovation via economic incentives.
• Life is becoming more digital so crime is following the trend
• With 15 connected objects for each user are we going to be physically hacked and harassed by things?
• Passwords are dead and new tools are absolutely required
• Privacy will become absolutely essential to protect our digital patrimony
• Personal Identity Card with free Digital Signature
• Signature for Internet Communication
• Name the ‘dark side’ of the power
• Privacy Initiative
• Back to the responsible Citizen
• Reality Check
|Smart Security Week Innovation Live
2.00pm: Exhibition Opening
• Cybersecurity – Terms and Definitions
• Cybersecurity Strategy of the EU/E U Regulations and Action Plan
• Current international and European Standardisation Activities
• Challenges and Outlook
• oneM2M and IoT common requirements behind the diversity
• ICT driven “IoT 1.0” deployments: Privacy as a main driver for security
• Industry driven “IoT 2.0” deployments: Safety as the driver for security
• Combining physical world “real things” safety considerations with dynamic software based “cyber world” security approach
• Security and Privacy in the Identity space
• Current IoT standardization efforts
• Blockchain encounters the ISO world
• Mobile ID and Driver License: the future of the eID
In this session, we’ll discuss IoT security as a global phenomenon and cover some of its specific characteristics. Particular focus will be on what steps industry players can take when building IoT solutions and how Microsoft Azure can help make their IoT businesses more successful. Additional topics will include relevant IoT security standards, certifications, identifying key players in IoT end-to-end systems, and what kinds of help are available for businesses interested in building robust IoT solutions on a global scale.
• Industrial IoT (IIoT) and Operational Technology (OT) provide distributed systems. Distributed system security has a long history.
• Well-known security mechanisms address other domains e.g. Web applications accessed by humans.
• IIoT and OT demand new as well as adopted security mechanisms/solutions
• No single, one-fits-all solution for IIoT/OT security will emerge but there can be common blueprints
• Most of security concepts and regulation come from IT world. Challenge: transpose to flight ready industrial objects,
• Novelty : apply security concepts and technologies to entire system engineering,
• Interest : “inject” complex system engineering process with security, return of experience
● How new machine learning and mathematics are automating advanced cyber defence
● Why 100% network visibility allows you to detect threats as they happen, or before they happen
● How smart prioritisation and visualization of threats allows for better resource allocation and lower risk
● Real-world examples of unknown threats detected by ‘immune system’ technology”
● Risk based Strategy
● Formulating a risk approach that can realize a practical deployment
● Where to start & what tools can help with risk based strategy
● Get past strategy and to the practical reality
● Security shouldn’t be treated as a check box
● How hackers operate, what they are after and how they gain access despite security measures
● Making difficult to exploit vulnerabilities from IoT services and connectivity
● Implementing a proper cybersecurity approach
● When mobility and identity collide: with the rise of IoT, more mobile devices are being used for authentication
● The new identity management model in light of IoT
● How businesses can drive digital transformation securely without compromise between mobility and security
With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
In this session, learn about:
• The new age of silent, stealthy attacks that lie low in networks for weeks and months
• Why legacy approaches, like rules and signatures, are proving inadequate on their own
• How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today
• Real-world examples of subtle, unknown threats that routinely bypass traditional controls
Darktrace can do demos of: