Cyber Security Summit 2016

Buy Access Now! Financial Controlling Toolbox


1 year accessFull access to 27 presentations
Presentation slides included

Buy Access

  • 27 Presentations in HD Quality
  • Presentation Slides included
  • 1 Year Access

These videos were recorded during the Cyber Security Summit 2016 in Prague.
For more information about the event, please visit the official Event Website

All Cyber Security Summit 2016 Videos

Joey Hernandez
Getting To The Left Of The Cyber Kill Chain

Kaleem Ahmad
Security Risk Mitigation Measures, Adoptive Strategies and Intervention Methods against Terrorists

Lars Hilse
Natanz, Tv5Monde and The Future Of Cyberterrorism

Stefan Mardak
Weapons of mass intelligence to fight the bad bots

Torben Jorgensen
Risk Management & Governance

Dejan Stankovic
Building High-Level Cloud Security with Low-Level Budget

Injam Shazad Khokhar
Biometric in Finance World

Ivan Sanchez
Product Security + Biohacking

Jan Vaclavik
Security for a New World

Jerome Saiz
A Tale of Both Worlds: It is Time to Bridge the Gap between Physical and IT Security

Karl O. Feger
IoT and Industrial Systems Security

Kristof Lamont
Security Trends in the Safety-oriented Aviation World

Louis Marinos
ENISA Threat Landscape: Current Developments

Mauriche Kroos
The Challenge of Engaging Cyber Security with Business

Milica Djekic
The Main Cybersecurity Challenges of Remote Work Employee Education & Social Engineering

Mustafa Komut
Data Classification

Robert Griffin
Using Security Analytics to Transform IoT Security

Tarun Samtani
Cloud Adoption Barriers

Thomas Malmberg
Software Development Lifecycle – Managing Risks and Measuring Security

Tobias Hummel
Our New Awareness Concept for Fraud Prevention

Tomasz Wandel
The Requirements of an Evolving Network + Security + Cloud Environment

Viktor Larionov
ENISA Threat Landscape: Current Developments

Vittorio Tronci
Crisis Management

Don Randall
The Cyber Threat Landscape from the CISO/CIO perspective

Michael Gates
Leading, Negotiating and Collaborating Successfully across Cultures

Peter van Eijk
Cloud Security

Tudor Enache
Advanced Mobile Applications Hacking