Cyber Security Summit

Buy Access Now! Cyber Security Summit 2015


1 year accessFull access to 34 presentations
Presentation slides included


Buy Access

  • 34 Presentations in HD Quality
  • Presentation Slides included
  • 1 Year Access

These videos were recorded during the Cyber Security Summit 2015 in Prague.
For more information about the event, please visit the official Event Website

All Cyber Security Summit – Financial Services Videos

Amar Singh
So You Think the Hack on Sony was Bad? Let us Think Together!

Roberto Baratta Martinez
Is your Business Continuity Plan Up-to-date?

Mike Lotas
Lessons Learned from Large Breaches and Technologies Used

Andreas Havsberg
How Nordea Prevents Online Fraud in the Nordics

Petr Sveda
Business Impact of Cyber Attack

Martijn Grooten
Current Issues in Focus – Express Your Opinion

Mike Lotas
Fidelis Incident Response Technologies

Andrea Salagean
Nowadays Ransomware

Olivier Ruch-Rosanoff
Take a Chance to Manage Risk beyond IT

Claus Cramon Houmann
Defending Enterprise IT – Going Above and Beyond Compliance: “Gaining a Real Chance at Beating Assymetricality”

Ricardo Mariano Gonzalez
Understanding and Managing the Threat of Cyber Risk

Alexey Yanov
Key Directions in Organizing Information Security Service in Banks

Visionary Panel Discussion
Day 2 | Stream 1

Damir Savanovic
Secure Cloud Best Practices

Roman Gruber
What’s in Your Wallet: Live POS System Hack DEMO

Joerg Weber
Using Big Data to Gain Better Security

Ahmed Neil
Digital Forensics the Hackers Nightmare

Pierre Chassigneux
Evolutions in Card Fraud: New Security Issues, New Challenges

Thomas Malmberg
APT or Not – Does It Make a Difference if You are Compromised?

All Cyber Security Summit – Industrial Sector & Governments Videos

Noorisha Nawaz
Incorporating Cyber Defence into Organizational Culture

Raminder Ruprai
Dealing with Security Regulation in CNI

Michael A. Piccalo
Ensuring Safe and Secure IT / OT Integration

Arslan Broemme
On Implications of the German IT Security law for Operators of Critical Infrastructures in the Energy Sector

Best Practices Effectively Applied in Our Cyber Space
Panel Discussion | Day 1

Michael Kreutzer
(In)Secure Smart Locks

Coen Bongers
Security Control Prioritization Based on the Kill Chain and Kill Chain Defense

Franky Thrasher
Malicious Network Activity Monitoring Techniques

Bruno Halopeau
CyberCrime, What is the Status and What Law Enforcement is doing to Fight against It?

Dariusz Czerniawski
Compliance vs. Security – Gaps Elimination

Kryzstof Socha
Cyber-Security – Collaboration between the Public and the Private

Devon Smibert
Threat Intelligence: Looking to Buy Service or Tool? Stop!

Luca Durante
Automated Analysis of Access Control Policies in Industrial Networked Systems

Boubacar Khouma
Cybersecurity Standard for Smart Grid, for What?

Gitte Bergnut
Circumnavigate the ICS World 3 Steps for Better Security