DIGS DC Day Speakers in 2015

(all presentations are held in English – agenda you can find here)

Key Note Speakers

Ivan Pepelnjak, Independent Network Architect
Ivan Pepelnjak, CCIE#1354 Emeritus, is an independent network architect, book author, blogger and regular speaker at industry events like Interop, RIPE and regional NOG meetings. He has been designing and implementing large-scale service provider and enterprise networks since 1990, and is currently using his expertise to help multinational enterprises and large cloud- and service providers design next-generation data center and cloud infrastructure using Software-Defined Networking (SDN) and Network Function Virtualization (NFV) approaches and technologies.
Ivan is author of several Cisco Press books, and a series of highly successful webinars. To learn more about him, visit ipspace.net or read his blog at blog.ipspace.net.

Automating Network Services
Network services are one of the most rigid parts of enterprise IT – it seems it takes forever to deploy a new firewall- or load balancer rule. At the same time, cloud providers like Amazon manage to perform the same tasks within moments. What are their secrets and why can’t we replicate them in enterprise data center environment?
The presentation will identify major roadblocks preventing agile enterprise network services deployments and focus on steps we must take to streamline and automate network services deployment. We’ll also mention the performance challenges of virtualized network services, and explore how one can use virtual firewalls to minimize the complexity of network security.
The final part of the presentation will focus on real-life deployment scenarios, from self-service orchestration tools to scale-out network services, and list some of the products and solutions that can be used in production networks.

Bruno Huttner, Chairman of the Quantum-Safe Security Workgroup (QSS WG)
Bruno Huttner is the chairman of the Quantum-Safe Security Workgroup (QSS WG) organized by the Cloud Security Alliance. The QSS WG has been formed to address key generation and transmission methods and to help the industry understand quantum-safe methods for protecting their networks and their data.
Bruno is an engineer (Ecole Centrale Paris) and a physicist (PhD from the Technion, Israel Institute of Technology). During an international academic career spanning the UK, Japan and Switzerland, he studied quantum effects in optical fibers, quantum cryptography and telecommunication. He then moved to the business world, as a founder and manager of a start-up, Luciol Instruments in 2000, active in test&measurements of optical fibers. In 2002, Luciol was acquired by Sunrise Telecom, an American test&measurement company. Bruno became General Manager of the division, which was subsequently divested in 2008. Bruno led a management buyout, which restarted Luciol in 2009, and refocused the company towards the aviation market.
Bruno joined ID Quantique in 2014, participating in business development and product management in the Quantum Security division, which develops next-generation encryption, and especially quantum key distribution systems. These systems are designed to be safe against the power of quantum computers, which threaten the conventional encryption methods.
During his career, both in academia and in business, Bruno participated and gave lectures in many international conferences. He was also active in standardisation organisations, first in ITU-T on polarisation effects in optical fibers, then in SAE, ARINC and ASD/STAN for applications of optical fibers in aviation, prior to his role as chairman of the QSS WG in CSA.

Cyber Security in the Post-Quantum Era
The Quantum-Safe Security Working Group (QSS WG) of the Cloud Security Alliance was established “to stimulate the understanding, adoption, use, and widespread application of quantum-safe cryptography to commercial institutions, policy makers, and all relevant government bodies”[1]. The group will achieve this goal through dissemination of documents and participation to conferences. This presentation participates to the later.
Most cyber security applications rely on a few cryptographic primitives, such as RSA, for both encryption and signature. These primitives are now known to be breakable by a quantum computer that is a computer operating according to the rules of quantum mechanics. The design and manufacture of such a computer is still a formidable tasks, which is expected to last for many years. However, in view of the devastating effect it would have on our cryptographic systems, it is necessary to start thinking about new ways to protect and authenticate data. Existing tapping techniques, in conjunction with almost unlimited storage abilities, allow entities to gather and store incredible amounts of data. Encrypted data can be kept in this way until the quantum computer is ready, and then deciphered. Therefore, data, which has to be kept secret for a long time, say tens of years, should already be encrypted in a quantum-safe manner. We need to prepare for the post-quantum era now.
There are two possible roads towards this goal. The first one is to keep algorithmic-based cryptography, but use different algorithms, the post-quantum algorithms (PQAs), which, we hope, will remain quantum-safe. The second one is to adopt an entirely different principle, and base some of our cryptographic primitives on physical methods. In this case, security does not depend on mathematical analysis, but on the laws of quantum mechanics. This is what is achieved by quantum key distribution (QKD).
These two approaches are by no means exclusive. Each have different domains of application, and will most probably complement one another. Since QKD requires a physical infrastructure, it will be restricted to large communication hubs, for example links between data centers. In addition, as it is provably secure, QKD shall be used for high value data, which has to remain secret for a long period. However, it is restricted to encryption, and will need post-quantum authentication schemes. PQAs, necessary for authentication, will also be used in links between end-users and communication infrastructure, for example mobile applications to antennas or telecom hubs. It could also be used for data with high privacy content, but shorter validity period. Cyber security in the post-quantum era is certainly feasible, but will have to rely on a variety of different techniques.

Ruediger Rissmann, President of the Swiss (ISC)2 Chapter and Member of the OpenGroup CA Board
Ruediger Rissmann is working as Solution Architect for Dimension Data. He is Open Group Distinguished Certified IT Architect and Certified Information System Security Professional. He is president of the Swiss (ISC)² Chapter and member of the OpenGroup CA Board.
In 1999 Ruediger received a diplom degree of physics from the University of Heidelberg, Germany. Subsequently he worked as IT Architect for the IBM Zurich Research laboratory and became member of the IBM technical expert council. He has been involved in several pilot projects exploring new and emerging network and security technologies and has filed several patents. In 2013 Ruediger took the opportunity to join SWITCH to build the Swiss academic community cloud. In May 2015 he joined Dimension Data to promote the Next Generation Data Center.

Next Generation Data Center
In the modern business environment the Data Center is playing more and more a central role. The business demands new features, reduced cost and greater agility, whilst supporting a mix of new and legacy applications. These are the requirements the Next Generation Data Center will be measured on. What is needed to bring the Data Center to the next level? The Next Generation Data Center is more than an update in technology. To meet the requirements a cultural change in IT delivery has to take place to unlock the potential of the Next Generation Data Center.

Velan Thangavelu, PMP, ACP, CRISC, Manager at CTP/ATOS Switzerland and Board Member at CSA Switzerland.
Velan Thangavelu, PMP, ACP, CRISC, is a Manager at CTP/ATOS Switzerland and presently engaged with Nestlé on Cloud Governance. Velan has been working closely with Cloud Security Alliance and has been extensively working on the cloud risks, the mitigations and the controls around the cloud services. He had been a speaker at ISACA Cloud event 2014, Cloud event at PMI 2015 and in various other events. Velan with his ERP background has been working with companies such as SWATCH, Nespresso and Nestlé for delivering various IT projects.
Velan has been a PMI Switzerland volunteer for many years and had been the Regional Events Director for Romandie for several years before taking a role with the PMI Switzerland board leading communications. Presently he volunteers with the PMI chapter and also serves in the board of Cloud Security Alliance Switzerland Chapter.

What is the Cloud really?
In spite of Snowden revelations and Data protection issues across the border, the Cloud Services is here to stay. Companies need to use them for various benefits. The train has left the station and its upto the organizations to catch it or leave it. The questions we regularly ask ourselves are: Are we using real cloud services? How effectively could we manage our cloud services? Does the end-user really care and how could we communicate the nature of the cloud services?
The session will address the various definitions of the cloud services in the Industry and how this could be interpreted effectively for organizations. The speaker will also provide the overview on the cloud services landscape and various important providers in this landscape. The session will also address the trends in going forward with the cloud landscape and the impact on the Internet of Things.

Presentations

A10 Networks, Sanjay Kapoor, Vice President Global Marketing
Sanjay has over 20 years of global marketing experience at some of the world’s most successful technology companies. At A10 Networks, he is responsible for establishing A10 Networks as a leading global brand in application networking and security markets, catalyzing new demand and increasing market share and revenue. Sanjay joined A10 from Nominum, where he was CMO and SVP Strategy—successfully repositioning Nominum from a network infrastructure software firm to a market leader in digital marketing and subscriber behavior analytics. Previously, Sanjay was chief strategy officer for the software division at Juniper Networks, where he led the business transformation of Juniper’s portfolio to SDN/NFV. Earlier appointments include 15+ years of marketing, general management and product leadership roles at Juniper Networks and Cisco Systems. Sanjay earned his MS Computer Science degree from San Diego State University and is an alumnus of the Stanford Executive Program.

A Software Defined App Experience Platform for a “Digital World”
Major industry disruptions of our generation such as Google disrupting advertising, Amazon disrupting retail, etc… all have one thing in common – “Digitalization.” They all leveraged a combination of “An Online Delivery model and Delivering Amazing Application Experiences to amass millions of customers.” It is postulated that all businesses must go “Digital” or run the risk of getting disrupted in their own industries.
An Application Network historically has helped IT ensure Application – Availability and Security. In a new “Digital World,” the Application Network needs to do more – enable providing amazing application experiences. The Application Delivery Network needs to be transformed to an “Application Experience Network.”

Akamai, Frank Sommer, Senior Solution Engineer
Frank received a diplom degree of physics from the University of Kassel, Germany in 1997. He worked as trainer for networking and security technologies. Later he became a solution engineer for Symantec with focus on Anti-Virus, Anti-Spam and Firewall technologies before he started working for Akamai Technologies GmbH in 2011 as a Senior Solution Engineer. He is a certified CISSP and will present

Client Reputation to intelligently defend
The threat landscape is evolving and customer are demanding for better protection again known attackers or botnets.
Client Reputation can be one of the means to stop attackers before they can hit your environment. For client reputation to work properly the accuracy the quality and quantity of data on which it is based is key. A distributed network with more than 170.000 server provide unique visibility into traffic on the Internet
Here are some goals that can be achieved by using Client Reputation:

  • Improved security decisions
  • Forecast intent before exploitation
  • Provide additional layer of defense against web attackers, scrapers, bots, hacktivism and fraud
  • Deliver an additional data source for backend security systems

In this presentation you will learn how it can be used to improve the security posture of customers using it.

Arista Networks, John Peach, Technical Director EMEAR
John is Arista’s Technical Director in EMEA. Since joining the company in 2010, John has established a strong technical team focusing on innovative solutions for technology led enterprises, cloud, web and financial service providers and the media industry. In his current role he works closely with customers, technology partners and R&D teams to create innovative solutions and develop new markets.
John brings more than 15 years of experience from a variety of roles with Service Providers and leading Optical, Storage and IP networking vendors.

How to apply cloud titan thinking to the enterprise
Taking the cloud from science project to the mainstream by re-evaluating Data Center infrastructure from the bottom up. We will explore the core principles used in delivering ultra-large scale cloud networks and which are most applicable for enterprises seeking to improve agility and lower operational costs.

Cisco, Stefan Ruoss, Business Consultant New Technologies
Stefan Ruoss is working for Cisco as a Business Consultant for Data Center and Cloud Technologies.
His topics are Supply-Demand Management, Service Portfolio- and Catalogue Management, IT Service Management, Data Center and Cloud Service Design as well as Infrastructure Design and Architecture.

Fast IT! – Solutions for the Application Centric Cloud
The policy based data center lets users control their data center resources with an application centric software approach instead of hardware only. It does so by moving organizations from physical storage, networking, and compute to a programmatically accessible infrastructure that offers the flexibility and efficiency to tailor infrastructures to suit specific needs and applications. This Session discusses the key concepts and building blocks for the policy based data center and cloud strategies.

Corero Network Security, Stephen Gates, Security Evangelist
Steve is a key Security Evangelist for Corero Network Security, having delivered hundreds of presentations and attack/defense demonstrations across the Globe. Steve has more than 25 years of computer networking and security experience with an extensive background in the deployment and implementation of next-generation security technologies.
He is a recognized Subject Matter Expert on DDoS attack tools and methodologies including defense technologies and approaches.You can usually find Steve speaking to network and security professionals within highly regarded organizations such as; InfraGard, ISSA, ISACA, Tech-Security Conferences, Interop, SecureWorld, RSA, SANs, IANS, GTRA and numerous other venues.
http://www.rsaconference.com/speakers/stephen-gates

The Growing DDoS Threat to your Business
A common theme that rings true across all aspects of cyber security is that you are only as strong as your weakest link, and the attackers know this all too well. Hackers are intelligent, motivated and capable of some of the most sophisticated attacks we’ve seen to date. They want the highest return for the lowest amount of effort; they are poking holes and searching for vulnerabilities within your network security architecture and pointing their DDoS attack tools where you are most susceptible, and in ways that cause the most significant amount of damage.
This session reviews real world examples of DDoS attacks increasing in frequency and sophistication and the use of DDoS as a distraction for more nefarious data exfiltration purposes, based on findings from the Corero DDoS Trends and Analysis Report.
Join Corero Chief Security Evangelist, Stephen Gates to discuss:

  • The DDoS threats of today and future predictions
  • How to gain greater visibility and control into traffic entering and leaving your organization
  • Best practices for implementing DDoS protection into your business continuity planning

de la cruz beranek Attorneys-at-law Ltd., Nicole Beranek Zanon, RA lic. iur., Executive MBA HSG, partner and owner
Nicole Beranek Zanon, RA lic. iur., Executive MBA HSG, Partner and Owner of de la cruz beranek Attorneys-at-law Ltd., www.delacruzberanek.com, a business law firm specialised on information, communication and technology law with domicile in Zug. Nicole Beranek Zanon is focused in IT-Security, data protection and privacy law, domain name law, Cloud, BYOD and Big Data.

Don’t miss the legal issues in cloud computing!
The presentation shall answer the question what is needed for a legal Cloud readiness and what issues must be addressed in a cloud computing agreement.

EMC Sweden, Magnus Backman, CTO & Systems Engineering Manager
Magnus Backman is the country CTO and leads the Systems Engineering organization at EMC in Sweden. Magnus has 17 years in the industry with the last 10 of them spent as a Senior Technologist, Enterprise Advisor and Leader at VMware and EMC. During his whole career he has focused on driving and advising on innovation with the help of transformative technologies and methodologies in the Datacenter space.
Magnus is most often in the boarder bridging business and technology and is highly engaged with customers, partners, events and forums in the broader IT-industry

Any DataCenter should be „Software defined“
How can any business and any kind of data center benefit from the current buzzword „SOFTWARE DEFINED“? We’re all seeking for more flexibility with more control on the same hand. Not only business models change to a more agile world – also IT demands need to fulfil the same. EMC is taking you to a journey through the transformation of data centers.
Who is in control, what skills are needed, what is going to be replaced in my data center? Necessarily there is a need in not only looking at the technical benefits, but also on the organizational and process related aspects.
Perception
When speaking to the storage-centric folks about software-defined storage, their interests are usually the same: what’s the storage management console look like, what features do you support and how do you support them, how do they compare with the arrays we know, etc.?

They’re not looking for a separate storage management console; they want storage that’s deeply integrated into their virtualization environment. Their measurement system is simple: does this new technology let me get my work done more efficiently?

Note that with regards to the original definition — dynamic service levels from storage — can be achieved either way by either group. One industry concept, two very different measurement systems. A split appears to be inevitable, especially when two very important audiences want two very different things.
See more here

Exoscale, Antoine Coetsier, CEO
Antoine has been working in the Service Provider business for more than 12 years. IT engineer by training, Antoine has been introducing new technologies at Bouygues Telecom after moving on to a central security position in headquarters where he implemented ISO framework and access control enforcement throughout the company. He then joined a smaller provider to fast forward the IT offering and launched in 2009 a first public cloud platform towards the stringent Press and Media business. Since 2011, he is stirring the development of Exoscale, a Swiss Cloud Provider that focuses on bringing the most performing and simplest experience for SaaS startups in EMEA.

Are all cloud applications deployment methods equal regarding security?
There are multiple ways of deploying an application, especially so when considering cloud computing. We will first look at those deployment methods, beyond the traditional IaaS, Paas and SaaS stacks and then discuss responsibilities and tools used to secure apps in each context from a hybrid virtual datacenter to the latest trends with containers

ExtraHop, Erik Giesa, Senior Vice President of Marketing and Business Development
Erik Giesa is the Senior Vice President of Marketing and Business Development at ExtraHop Networks. Erik guides market strategy and execution with a focus on helping customers transform their IT operations. Erik offers keen insight into the goals and requirements of enterprise IT organizations and ensures ExtraHop meets those needs.
Prior to joining ExtraHop, Erik was Senior Vice President of Product Management and Product Marketing at F5 Networks where he defined product, marketing, and solution strategy for all F5 products. Erik drove several successful acquisitions to build F5’s product portfolio; formed key vendor partnerships with Microsoft, VMware, and Oracle, among others; and led the creation of the popular DevCentral user community and F5’s International Technology Centers. Erik also held executive positions in product management, marketing, and sales at Holistix, WRQ, Express Systems, and hDC.
Erik holds a bachelor of arts degree from the University of Washington.

IT Operations Analytics (ITOA)
How do you know if what you’re investing in is performing as expected, meeting end-user experience SLAs, secure, or whether what you’re provisioning or orchestrating in the cloud is delivering as expected? Are you able today to immediately mine the right information across all digital systems to make better IT, business, and security decisions? If you said no, this session is for you.

None of the elements of the digital enterprise run in isolation, they are all interdependent yet we tend to treat them as separate initiatives or functions. Unfortunately this perspective has lead to a glaring problem in IT; a lack of comprehensive visibility, understanding of all workloads and their behavior, as well as all user activity which leaves organizations exposed to revenue, profitability, and security risks.

F5 Networks, Philippe Cloup, EMEA Solution Architect, Core and Cloud
For more than 8 years, Philippe Cloup supported a large variety of customers to build and enhance their Core and Cloud infrastructure from a technical and organizational view, since 1 year as a EMEA Solution Architect Core and Cloud.

Philippe has a high level of experience in a wide variety of Core and Cloud solutions, as well as at Carrier and Service Providers. He is fully aware of all aspects and the impact those solutions can have on an organisation. In 2007 he joined F5 Networks as a Field System Engineer to drive the company’s fast-growing portfolio in the Southern region.

SDN and SDAS: the day where the network became an application resource
Application resources are using network components in this new era of Software Defined Data Centers (SDDC). Applications are usually using L4 to L7 services, where SDN is mainly L2/L3 resource, operated by software.
In SDN designs, the network is becoming part of the application architecture and L4-L7 services (security, optimisation, load balancing) are delivered and instantiated from the application layer, as they have a direct link with the application constraints. We present how this works in different SDN environments (OpenStack, VMWare NSX, Microsoft NVGRE, Cisco ACI) as well as within mani Cloud Providers in an integrated fashion.

ID Quantique, Kelly Richdale, VP of Quantum-Safe Security
Ms Kelly Richdale is VP of Quantum-Safe Security at ID Quantique, heading the divisions for quantum and conventional cryptography as well as for random number generation. She is a seasoned entrepreneurial executive with 25 years of operating, management and sales and marketing experience. She has been working in the security industry for 15 years, focusing on cryptography, network security, and identity and access management. Prior to ID Quantique Ms Richdale was active in biometrics and strong authentication solutions, holding the role of Managing Director International Operations of Bioscrypt, the enterprise access division of L1 Identity Solutions (now Sagem-Safran) . In 2001 she founded the company A4Vision, specialising in 3D face recognition, which was acquired by Bioscrypt in March 2007. Ms Richdale holds an MBA from INSEAD (Fontainebleau, France) and a degree in modern languages (Russian & German) from Cambridge University. She is on the Advisory Board of the EPFL’s Management of Technology course, and lectures on information security at the University of Geneva. In addition she is a qualified CISSP and on the board of the Swiss chapter of ISC2.

Virtualization is still Physical – protecting data at all layers of the cloud
The cloud is no longer just a buzzword – it is being adopted by individuals, SMEs and even large enterprises as a way to build flexibility and resilience and reduce costs. However, the words of security guru Bruce Schneier, it is still essentially “your data on somebody else’s server”. And as more companies use the cloud, the large cloud providers start to pose a systemic risk to our information security as they become the new honeypot for hackers.
We will look at how you can use encryption to protect your data at all layers – from the application layer 7 and the virtual machines, right down to the physical and network levels. For a holistic approach, security all layers should be considered in the architecture phase, and become part of the operational and business model, driving cost reduction for the user and new revenue opportunities for the cloud provider.

Infoblox, Arya Barirani, VP of Product Marketing
Arya Barirani is currently the VP of Product Marketing at Infoblox where he is responsible for creating differentiated and consistent company, and product messaging globally. Barirani’s team is responsible for all product and solution materials for Infoblox including content for collateral, web, press & analysts, and demand generation programs.
Spanning the entire spectrum of marketing , from differentiated content, awareness and brand, to demand generation – Mr. Barirani’s programs have a proven track record of success in generating growth and taking market share. As a B2B technology thought leader and marketing expert, Barirani’s innovative approach to content and programs and have often set the bar in achieving business results.
Barirani has been working in the enterprise software space for more than 18 years. He has held marketing leadership positions in in blue-chip brands such as Symantec, Hewlett Packard, Mercury Interactive (acquired by HP), Veritas Software (acquired by Symantec), and Computer Associates International.

Why Network Automation is the Secret Sauce in Cloud
Hybrid cloud deployments are on the rise for many IT organizations in the next 24 months, according to recent market research. Customers clearly want the best of both worlds: they seek the equivalent of an Amazon self-service public cloud experience inside their own data centers, and want to leverage public cloud services for other workloads. If this is a model you’re considering, we have a few words of wisdom: you can’t think of cloud or self-service without thinking about automation – specifically network automation.
While there are many technologies and tools to help with server and storage orchestration, the same is not true of the network. Join the Infoblox session to get an understanding of critical network services required for your hybrid cloud deployments and how you can maintain network policy and configuration consistency between on-premise and public cloud infrastructure.

Juniper Network, Tom Ruban, Vice President, System Engineering
Tom Ruban serves as Juniper Networks’ Vice-President of System Engineering – Europe, Middle East and Africa.
Tom has been with Juniper since 2002, holding a variety of leadership positions in the EMEA sales management organization. Tom ensures that Juniper’s products meet the requirements of customers in the EMEA region, and works to communicate Juniper’s technical advantage and vision.
Mr. Ruban also leads the EMEA systems engineering and product management groups, and presents and consults on the topics of mobility, security, broadband and cloud services, and the future of data center Technologies.
With almost twenty years of international experience as an Executive in the Telecommunications and Networking industries, Tom has been employed in companies ranging from start-ups to large public corporations.
Prior to joining Juniper Networks Tom was the Technical Director EMEA for Unisphere Networks Inc, where he started the company’s activities as the first employee in Europe. Earlier in his career he held various management positions at Siemens Public Communications Group in the US and Germany
Mr. Ruban is a regular speaker at networking conferences and trade shows. Tom holds a Master’s Degree in Computer Science and several patents in the field of computer networking.

Is your DC-Network open, flexible and automated?
We live in a digital real-time society. In addition to growing demands from customers and internal stakeholders companies are facing new digital competitors that are attacking their business model. Companies that look into “Digital Transformation” and what it means for them early and thoroughly have a clear advantage. Prerequisite for success in the digital era is an open and flexible networking architecture enabling agility. Based on working closely with many Web 2.0 companies but also traditional enterprises, customer references and a clear process, all attendees will hear about steps to be taken to leverage the opportunities of the digital world.

Kudelski Security, Martin Dion, Vice President Financial Services Practice
Martin Dion is Vice President Financial Services Practice. He brings over 15 years of experience in the field of information security. Prior to joining Kudelski, he founded and led Above Security (Canada) and SecureIT (Switzerland) for more than 10 years, after which he stepped into the role of Head of IT and Corporate Security in a private bank in Switzerland.
Martin holds a Bachelor’s Degree in Administration from the Hautes Etudes Commerciales in Montreal with a diploma in Operational Risk Management from Kaplan University in Chicago. Martin is a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) and a Certified ISO 27001/20000/27005/22301 Trainer & Lead Auditor. He is a trainer at Kudelski Security’s Cyber Academy, the only academy in Switzerland focused on building hands-on cyber security skills.

Cyber Security in the Cloud
Sharing Threat, Risk & Mitigation Intelligence Anonymously via the Cloud

Palo Alto Networks, Christer Swartz, Consulting Engineer
Christer Swartz, CCIE#2894, is a Consulting Engineer with Palo Alto Networks, focusing on Network Security in Data Center and Virtualization, in large Enterprise and Service Provider networks. He lives in the Bay area and has 25 years experience in the industry, beginning at Cisco (where he was employee #103), and subsequently at Swisscom, Netflix and Nokia, designing and implementing large-scale Data Center networks. He focuses on implementing network-based “Next Generation” security in evolving SDN and NFV architectures.

Security in virtualized data center
Data Center network architectures are fast moving to a virtualized, automated framework. As part of this, the concept of a well-defined Data Center perimeter is disappearing. Hybrid Clouds enable the dynamic movement of content between Private and Public Clouds, with Security boundaries now being virtual and dynamic, rather than simply at the Private DC boundaries. While the focus is largely on automation and agility, security is often not integrated into initial architecture decisions. Layer-7 security needs to be a priority from the outset, and applied at the Application boundary, not simply at the Network boundary. Modern elastic, dynamic virtualized architectures requires a Security model that follows these same design principles. Examples of best-practices to enable this this model will be presented.

Radware, Werner Thalmeier, Director of Security Solutions, EMEA & CALA, Technical Support
Werner Thalmeier is active in the IT industry for over 20 years, with extensive field experience of work with vendors, customers, technology partners and resellers in various management and engineering positions.

As Director Security Solutions & Product evangelist Werner Thalmeier is responsible to drive the Security Product Strategy for Radware in EMEA and CALA and work closely with partners, customers and the IT Security community.

Before joining Radware Werner Thalmeier was heading the global product management team at M86 Security as VP of Product Management and was responsible for the overall security product strategy. At Finjan he was also VP of Product Management and responsible for the global Secure Web Gateway business and as Director of global Sales Engineering he managed the world wide SE team. Prior to that, Werner acquired a vast experience on customer sites as CIO. Mr. Thalmeier holds a degree in communication engineering.

Some examples of key presentations:

2014: London, England
IP Expo – Werner Thalmeier, Director Security Solutions
Topic: The next Cyberwar

2014: Sao Paulo, Brazil
Black hat Brazil – Werner Thalmeier, Director Security Solutions
Topic: The Art of Cyberwar

London, England
InfoSec 2014 Werner Thalmeier, Director Security Solutions
Topic: The art of cyber war: Strategies in a rapidly evolving theatre

The Next Cyberwar
Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security professionals to protect their organizations as they head into the virtualized, Internet of Things era.

In this session, Radware will share real world experiences gathered by its Emergency Response Team and discuss how leading enterprises are using Attack Mitigation Systems to successfully defend against the latest generation of attacks.

Securosys, Andreas Curiger, CTO
Andreas Curiger is co-founder and Chief Technical Officer of Securosys. Before starting Securosys Andreas has been developing secure communications equipment for 15 years for governmental applications. Starting out as cryptographer and developer he quickly was put in charge of the R&D team. Previously he spent over four years at Dallas Semiconductor (now Maxim) designing cryptographic hardware for integrated circuits. Andreas has a MS in EE and a PhD from ETH Zürich as well as an EMBA from the University of St.Gallen.

How to Drop your Anchor (or: Enabling Trust in Cloud-Based Services)
Trust defined as the conviction that a technical system is adhering to specifications is difficult to achieve. While functionality-wise procedures and mechanisms are in place, security-wise we still seem to lack the means of establishing trustworthy architectures. This is despite the fact that efficient and safe mechanisms for identification, authentication, and encryption exist.
In this talk, we will explore the necessity of a “trust anchor” in any communication systems, and how the whole chain of trust may be derived from it. Then we look at how to enable such a trust anchor for cloud-based services. Data centers might have to consider offering, besides physically secure rack space and high-performance computing also secure private-key generation and storage as well as private-key utilization in their services.

SPIE ICS AG, Dominik Brack, Head of IT Security Consulting
Highly qualified, top-performing professional with outstanding experience and achievements within key IT security, risk and project management roles confirming expertise in delivering innovative, customer-responsive projects and services in highly sensitive environments on an international scale. Track record for problem-solving and system enhancement, delivering streamlined, cost-effective security solutions within high pressure and quality-driven settings.
Organisational specialist expediting and balancing skills to prioritise time-critical assignments and ensure smooth and efficient planning and flow of project scopes. Expert communication skills across diverse groups and all levels of hierarchy. Strong leadership and team building qualities, eliciting team commitment to achieve corporate goals. Exceptional ability to adapt promptly to constantly changing demands, while driving all stages of a project cycle to achieve success despite time-critical deadlines and tight budgetary constraints. International working experience: Australia, Vietnam, Malaysia, China, Europe.

Governance and Project management for Cloud services – how to avoid pitfalls and be successful
As more enterprises are engaging in public, private and hybrid cloud computing services, they face new sets of security and compliance challenges. Most enterprises are increasingly worried about security and compliance in the Cloud? With this rapid transition and the growing capabilities of the cloud, enterprises must advance their security framework to include powerful and adaptable GRC policies. In this session I will guide you on how to build and manage an effective GRC program to improve operational efficiency.
This session will explain and highlight some of the key security and compliance issues surrounding Cloud adoption, and will provide helpful insight into how they can be addressed.
The areas of security and compliance often represent the biggest inhibitors to the adoption of Cloud Computing. This is because the potential impacts of problems in these areas is so profound therefore it is essential that you carefully identify your requirements.
The cloud Security Alliance (CSA) offers interesting tools which can be used free of charge. With these tools you can compare cloud provider offerings or define a tailored control matrix for your purposes. CSA also has documented control matrix’ from many of the well-known cloud providers. The cloud control matrix also offers links to the well know control standards like PCI-DSS, ISO27002, COBit etc.

Swisscom (Schweiz) AG, Chan Kurgod, Computer Science & Engineering
Chan has been working in the IT Industry for over 20 years. Originally working as a developer and database administrator he developed his skills in architecture and has been working for the past 8 years in data architecture and governance in Defence, Finance and Telecommunications industries.

Data Governance in the Cloud

  • Data Governance – Current implementation & gaps
  • Current situation (data exchanged internally) versus the developing massive exchange of data externally (Cloud & API’s).
  • Traditional organisations have had physical borders to their Governance processes, primarily ending at the door of the company, sometimes reaching with contracts with direct business partners.
  • This is changing, the new model dictates that there are no borders between internal and external organisations.
  • How do organisations define and manage a governance process in a global data landscape?
  • How do you ensure that there is a connection between policies, models and implementation?
  • Who are the actors and stakeholders in this process?
  • How does user consent play a role in governance?

Swisscom (Schweiz) AG, Jürgen Sprenger, Senior System Engineer
Systems Engineer particularly interested in security and AAA. Always interested in enhancing security, automation and optimization. Actively working in different projects with – Oracle Solaris 9,10,11 – engineering Solaris Security Toolkit (SST) – engineering authentication and authorization with OpenLDAP in a heterogenuous environment (Solaris, Linux, HPUX, AIX) – Splunk integration – maintenance of AAA infrastructure for Unix based on OpenLDAP. – maintenance of RBAC on AAA infrastructure (sudo and OpenLDAP) – OpenLDAP schema engineering – Solaris installations, Zones and LDOM – Live Upgrade (OS Release Upgrade, Patching, Migrations from UFS to ZFS) – Solaris software packaging Specialties – Unix server architecture – telecom OSS solutions – enterprise security – troubleshooting

Privileged Access Management with LDAP and sudo in heterogeneouse Unix environments
For privileged accesses a multitenant solution for authentication and authorization of privileged users was needed.
In this talk I will explain:

  • Requirements of the project,
  • Architecture with LDAP client / server and sudo for AIX, HPUX, Linux and Solaris clients
  • Integration into the automated user management,
  • Traceability and logging rights allocation and exercise rights for privileged access.

The goals achieved, obstacles observed in the introduction and outlook on future extensions round out the presentation.

Symantec, Candid Wüest, Threat Researcher
As a member of Symantec’s global Security Response team, Candid Wüest analyses new security threats, formulates mitigation strategies and creates research reports on new emerging security trends – for example, threats to the Internet of Things.
Wüest joined Symantec in 2003. During three years he was working as a Virus Analyst in Symantec’s anti-malware laboratory in Dublin, Ireland, where he spent his time analysing malware and creating signatures. Prior to that, he was a member of the global security analyzing lab of IBM Research in Rüschlikon, Switzerland.
Wüest holds a master of computer science from the Swiss Federal Institute of Technology (ETH) and various certifications. He has published various whitepapers and has been featured as a security expert in various media. He is also a frequent speaker at security-related conferences including Area41, BlackHat and RSA. He learned coding and the English language on a Commodore 64.

The notorious nine in Cloud Computing
In 2013, CSA conducted a survey of industry experts to compile a professional opinion on the greatest vulnerabilities within cloud computing. These have been identified as:

  • Data Breaches
  • Data Loss
  • Account Hijacking
  • Insecure APIs
  • Denial of Service
  • Malicious Insiders
  • Abuse of Cloud Services
  • Insufficient Due Diligence
  • Shared Technology Issues

Candid Wüest, a member of Symantec’s global Security Response team, will give an overview of the nine critical threats to cloud security and will provide an assessment regarding the industry’s current state in regard to the threats.

Trend Micro, Markus Schönberger, Solution Architect
Markus Schönberger works as a Solution Architect at Trend Micro. In this role, his main task is to develop suitable measures to counteract threats from hackers and cybercriminals. His core focus is on virtualisation as well as endpoint and data centre security. Schönberger has been with the Japanese IT security provider for more than 10 years, including a stint as a Technical Writer & Trainer between 2003 and 2008.
In an IT career spanning more than 20 years, Markus Schönberger has gathered a wide range of hands-on experience in networks and infrastructure, in project management and as a trainer. For example, he worked on projects with a focus on messaging (including cc:Mail and MS Exchange) in the industry and banking sector from 1993 to 2002

Data security in the cloud – simple, flexible, safe!
Virtualization and private cloud are here to stay. Many companies are now getting ready for the public cloud to further benefit from the flexibility and agility offered by cloud computing. This makes data security even more critical than before.
Private, public, and hybrid cloud – data security strategies needed suitable for VMware, Microsoft Azure, Microsoft Office 365 or AWS? Come to our presentation and we will show you different approaches to solve the challenges simple, flexible and safe. You will learn as well how we see the upcoming trends and how you can make sure your data security is ready for the future.

Veeam, Luca Dell’Oca, Product Strategy Evangelist EMEA
Luca Dell’Oca is EMEA Evangelist for Veeam Software. Based in Italy, Luca is a popular blogger and an active member of the virtualization community. Luca’s career started in information security before focusing on virtualization. His main areas of expertise are VMware and storage, with a deep focus on Service Providers and Large Enterprises. He holds VCAP-DCD and CISSP certifications, and is a VMware vExpert since 2011. Also, Luca is Veeam VMCE #1.
Follow Luca on Twitter @dellock6

Backup and DR as a Service made easy to leverage your existing infrastructure and offer additional value added Services (Requirements, Use Cases and Solutions)
Learn more about High-Speed Recovery; Data Loss Avoidance; Verified Protection and Leveraged Data.
Find out how to mitigate the risks associated with application deployment and put your backups and replicas to work by testing changes in a production-like environment.

VMware, Marcel Panholzer, Senior Manager Systems Engineering, ALPS
Marcel Panholzer leads the System Engineering Department for VMware in the ALPS Region since October 2006. In this function, he was as well heading up the entire System Engineering in the CEMEA Region (DACH, Eastern Europe & Russia)

He started his career in the mid-1990s as systems engineer in small- and medium-sized software-houses. He then moved into the Systems Engineering at Novell, at which he has then taken over the responsibility for the Swiss part.

Marcel Panholzer is a regular Keynote Speaker and Panelist at numerous events.

Driving the digital transformation through fearless IT-innovation
In today’s business world, old, rigid structures are melting away and being replaced by fluid, rapidly changing business models. Successful business leaders recognise they have to be agile to compete with a new class of competitor. In response, IT leaders have to challenge the status quo and innovate. A brand new model for IT is required, one that is bold and decisive: a software-defined IT approach is the answer. The keynote will outline a one cloud, any application, any device’ architecture and share how this will enable organisations to drive the digital transformation the business is looking for.

Moderators of the Event

CSACH, Klaus Gribi, President CSACH
Mr. Klaus Gribi is working in information security for over 20 years. He has vast experience, practical and applied knowledge within information security this allowed him to build and establish high quality security solutions within complex environments. Klaus Gribi is able to demonstrate a track record of working in large and complex Enterprise environments within different sectors from private to government and telecommunications.
Mr. Gribi has a track record for problem-solving and system enhancement, delivering streamlined, cost-effective security solutions within high pressure and quality-driven settings. As one of his roles Klaus Gribi is acting as the Chief Security Officer (CSO) providing the overarching security management and co-ordination function that ensures that IT security is aligned with business needs, and ensuring that information security is effectively managed in all activities. In the past years he focussed on the Cloud Security topic. He is one of the leaders for Cloud Security and formed the Cloud Security Alliance Switzerland Chapter (CSACH) in 2012. He is the founding and acting president since the inception of the chapter. Currently he is working for Swisscom (Schweiz) AG as a Senior Security Consultant for Cloud Security.
Kelly Richdale, Board Member of ISC2 Swiss Chapter
Ms Kelly Richdale is VP of Quantum-Safe Security at ID Quantique, heading the divisions for quantum and conventional cryptography as well as for random number generation. She is a seasoned entrepreneurial executive with 25 years of operating, management and sales and marketing experience. She has been working in the security industry for 15 years, focusing on cryptography, network security, and identity and access management. Prior to ID Quantique Ms Richdale was active in biometrics and strong authentication solutions, holding the role of Managing Director International Operations of Bioscrypt, the enterprise access division of L1 Identity Solutions (now Sagem-Safran) . In 2001 she founded the company A4Vision, specialising in 3D face recognition, which was acquired by Bioscrypt in March 2007. Ms Richdale holds an MBA from INSEAD (Fontainebleau, France) and a degree in modern languages (Russian & German) from Cambridge University. She is on the Advisory Board of the EPFL’s Management of Technology course, and lectures on information security at the University of Geneva. In addition she is a qualified CISSP and on the board of the Swiss chapter of ISC2.

Event Partner





Menu Title