Ładowanie Wydarzenia

« All Wydarzenia

  • To event minęło.

The Evolving Perimeter – where are the new boundaries [ENG]

Czerwiec 27


[Regostration is closed]

About workshop:
The traditional security perimeter is proving to no longer be an effective cyber security control and fast growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry.  For many years, organizations have protected their valuable and sensitive information by building a fence around assets, and all of the data that flowed in and out was either via a single internet access point or on physical devices.  This meant that a traditional perimeter was an effective measure as the boundaries were known. As long as the internet access was controlled by the data that flowed through it, it was possible to protect, monitor and control that data.

Organizations protected internet access with firewalls, VPNs, access controls, IDS, IPS, SIEMs, email gateways, and so forth, building multiple levels of security on the so-called perimeter. On physical devices, systems management and antivirus protected those systems and kept them updated with the latest security patches.

This is a traditional security approach, used for nearly 30 years. However, in today’s world it is no longer effective alone. The perimeter has moved and we need to move with it.

Start: 9:00 am
End: 5:00 pm

Why is it worth?
During this session, attendees will learn about how identity and access management is evolving fast and becoming the new security perimeter, including:
– Why the traditional perimeter is no longer effective
– What hacker techniques are being used to compromise organizations
– What some governments are doing to protect their citizens
– Technologies that will help create the new cyber security perimeter

The Estonia Experience and cyber war
Estonia is a small country in the Baltics however it has been on the forefront of technology for many years. This keynote provides a story from Estonia’s independence in 1991 to it’s use of blockchain for the integrity of voting and medical records, the importance and criticality of the identity management system that allows a citizen to vote, check online banking, e-residents and tax returns to the impact of cyber war and the lessons learned on the risks.

What will you get:
– certificate
– lunch
– coffee breaks

1099zł +Vat*
*ask for group discount

Key Takeaways:

1. Importance of Blockchain for Data Integrity and Veracity
2. The need for Government Identity Management
3. Cyber War Lessons Learned

Joseph Carson
Cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security & virtualization, access controls and privileged account management.  Joseph is a Certified Information Systems Security Professional (CISSP), active member of the cyber security community frequently speaking at cyber security conferences globally, often being quoted and contributing to global cyber security publications.  He is a cyber security advisor to several governments, critical infrastructure, financial, transportation and maritime industries.  Joseph is regularly sharing his knowledge and experience giving workshops on vulnerabilities assessments, patch management best practices, the evolving cyber security perimeter and the EU General Data Protection Regulation.  Joseph serves as Chief Security Scientist at Thycotic.


Step 1 of 2



Czerwiec 27
Wydarzenie Categories: