By Max Sulaiman, Enterprise Account Manager – DACH at Lookout, and Jasin Mehovic, Senior Channel Account Manager DACH & Eastern Europe at Lookout
As apps and data move to the cloud to support hybrid work models, IT is struggling to protect data and provide a secure, productive work environment. By simplifying your IT security you can secure your workforce and devices, provide secure access to private apps, and protect your data across SaaS & cloud apps deployed in a multi-cloud environment.
In this session, Lookout’s security experts will break down how to secure data across all apps and endpoints, and future-proof your organization’s security strategy.w
When we process data, for example information about our customers, we must always keep in mind that the data must not be accessible to anyone unauthorised. After all, this is clearly defined in the regulation known as GDPR. A suitable technique to ensure data protection is to deploy a system to control access rights to data or applications and to deploy a system to encrypt data.
In case of using cloud services, digital data sovereignty needs to be maintained at the same time. The case known as Schrems II showed us how important data sovereignty is. Even giants such as Facebook or Google have to process data in compliance with the principle of data sovereignty. So if we have user authentication and encryption keys under our own control, we do not have to worry about the encrypted data or the encryption key being accessed by a cloud service provider or a government agent or investigator.
by Miri Varbitzky – VP Sales Central & South EMEA at Stellar Cyber
What Open XDR Delivers To Empower Security Teams
The cybersecurity market continues to evolve as new attack tactics challenge best practices. This talk will discuss a new idea called Open XDR (eXtended Detection and Response) , what it means, the different ways to implement XDR, and why you should look into the idea to empower your security team.
by Emir Arslanagic – Regional Account & Channel Head for SEE and Turkey at Qualys
Eye-opening presentation on Cyber Security & Compliance System followed by a hands-on demo of Qualys Platform. After the presentation audience should have a better understanding of how and why organizations are shifting their approach from reactive to proactive security. Why do visionary leaders have to empower IT and Security to act faster on potential threats? How the new risk-based approach saves a significant amount of time while enabling the corporate lean teams to focus on other value-added activities.
by Tomasz Rot – Director of Sales Central & Eastern Europe at Exterro
An overview into the latest offerings of the FTK Product Suite and how they can assist you in your investigations.
In this session, Tomasz Rot, VP International Channels & Partnerships at Exterro, will provide you with an overview into the current offerings of the FTK Product Suite and how they can assist you in your investigations. You will also hear from the very latest FTK 7.8. product release. Within this release, substantial updates were made, setting the focus on speed. With FTK 7.8. you will get evidence into the hands of investigators in record time, process mobile phone evidence up to 20 times faster, create workflow automations in just seconds, securely investigate your remote workforce and Scale up for massive cases, heavy case volumes & large organizational footprints.
by Petr Hnevkovsky – CISM, CISA, CISSP, CEH, Chief Cyber Security Strategist – Micro Focus
Researching security threats to your organisation is employing more and more experts and costs a lot of money. Many companies don’t know where to start, while at the same time they need to focus on their business and its digital transformation. Let’s use threat research effectively in a variety of situations, from security planning, to prioritizing activities, to threat hunting and response automation. All for free with the “Guardians of the Galaxy”.
Building resilience in your digital enterprise requires a capability to quickly identify a threat and adapt your security posture. Today’s digital enterprise has a wide attack surface, and threats can enter through end-user devices, cloud services or from vulnerable applications, hosted in cloud service providers. It’s important to have visibility across these attack vectors and empower security operations with analytics, threat intelligence and automation to protect the business. Join this session to learn how XDR can help you evolve your Sec Ops capability.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-advertisement
1 year
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent
1 year
Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Cookie
Duration
Description
__cf_bm
30 minutes
This cookie, set by Cloudflare, is used to support Cloudflare Bot Management.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.