DIGS DC Day Speakers in 2016

(all presentations are held in English))

Key Notes

ERNW Research, Matthias Luft, Security Researcher
Matthias Luft is a security researcher and heads the German security research company ERNW Research. He is interested in a broad range of topics (such as DLP, virtualization, and network security) while keeping up with the daily consulting and assessment work.

Matthias presents on a regular basis at international security conferences and is involved in the organization (e.g. part of the program committee) of the security conference TROOPERS.

Trust Evaluation of Cloud Providers
The ever-evolving landscape of Cloud solutions and providers offers great opportunities to most companies. At the same time, the ongoing evolution keeps increasing the complexity of the technologies used to provide the great service the user is seeing. When it comes to security considerations for such services, most Cloud providers cannot provide a sufficient level of transparency to the user (let alone the public) in order to perform a comprehensive risk assessment.

Due to the nature of cloud services, it is also not possible for Cloud customers to apply technical controls of their choice to the Cloud provider’s infrastructure. This presentation will cover an approach towards the trust-based evaluation of Cloud Providers to allow Cloud customers to reach a state of security confidence in the end of the day. The work we present is based on the evaluation model we developed and deployed for a major German company.

Ivan Pepelnjak, Independent Network Architect
Ivan Pepelnjak, CCIE#1354 Emeritus, is an independent network architect, book author, blogger and regular speaker at industry events like Interop, RIPE and regional NOG meetings. He has been designing and implementing large-scale service provider and enterprise networks since 1990, and is currently using his expertise to help multinational enterprises and large cloud- and service providers design next-generation data center and cloud infrastructure using Software-Defined Networking (SDN) and Network Function Virtualization (NFV) approaches and technologies.
Ivan is author of several Cisco Press books, and a series of highly successful webinars. To learn more about him, visit ipspace.net or read his blog at blog.ipspace.net.

Simplify and Secure Your Cloud with SDN
Listening to the vendors and reading industry press one gets the impression that it’s trivial to migrate workloads between on-premises data center(s) and public clouds as well as retain all the security aspects of your applications: all you have to do is buy the right product and your problems are gone.

In reality, multiple vendors solved the migration of compute resources, data transfers are still limited by the laws of physics (bandwidth and latency), and almost nobody wants to address network- and security aspects of hybrid clouds because they’re really hard to solve.

This short presentation will identify typical problems you will encounter when trying to introduce private or hybrid clouds in your environment, and describe how you can use the Software Defined Networking (SDN) and network/security automation concepts to streamline application deployments.

Juniper Network, Tom Ruban, Vice President System Engineering
Tom Ruban serves as Juniper Networks’ Vice-President of System Engineering – Europe, Middle East and Africa.
Tom has been with Juniper since 2002, holding a variety of leadership positions in the EMEA sales management organization. Tom ensures that Juniper’s products meet the requirements of customers in the EMEA region, and works to communicate Juniper’s technical advantage and vision.

Mr. Ruban also leads the EMEA systems engineering and product management groups, and presents and consults on the topics of mobility, security, broadband and cloud services, and the future of data center Technologies.

With almost twenty years of international experience as an Executive in the Telecommunications and Networking industries, Tom has been employed in companies ranging from start-ups to large public corporations. Prior to joining Juniper Networks Tom was the Technical Director EMEA for Unisphere Networks Inc, where he started the company’s activities as the first employee in Europe. Earlier in his career he held various management positions at Siemens Public Communications Group in the US and Germany.

Mr. Ruban is a regular speaker at networking conferences and trade shows. Tom holds a Master’s Degree in Computer Science and several patents in the field of computer networking.

The Open Disruptive Decade
According to IDC, by 2018 20% of companies in EMEA will have an Open Source / OpenStack-first strategy, with new applications being driven by DevOps. Truly, a leading indicator of the open revolution that is gathering momentum across IT and networking both inside and outside of the Data Center.

The reasons are clear: Open means freedom and choice, translating into faster, better, greater. Faster roll-out of new applications and services. Better use of your IT resources and external partners. And greater flexibility to run applications in different compute environments. All delivered across a network that is open by default, removing the risk of perpetual vendor lock-in.

If you are responsible for IT or networking infrastructure decisions in your company’s Private, Public or Hybrid Data Center or Cloud environment, you should not miss this presentation.

Microsoft, Marc Holitscher, Chief Technology Officer
As Microsoft Switzerland’s Chief Technology Officer, Marc aarticulates Microsoft’s technology vision and strategy with lighthouse customers, key business decision makers and government thought leaders.

He support customers in translating new technologies and innovations into business impact and outcomes. Marc holds a PhD in International Relations form the University of Zurich..

The second line of defense: Assessing risk and compliance in a Cloud enabled world
Cloud infrastructures are often globally distributed and highly dynamic in nature. This requires new approaches to how companies must assess and manage the services they use – they cannot outsource their accountability.

Equally, Cloud providers are required to find the right balance between providing transparency and control and to ensure the highest level of security and reliability when providing the service. Finally, these capabilities need to be mirrored in contracts meeting the companies’ unique compliance requirements.

Netskope, Rajneesh Chopra, Vice President Product Management
Rajneesh Chopra, a recognized thought leader in the Internet security industry, joined Netskope as vice president of product management after leading in strategic and product lead roles at Cisco Systems and Juniper Networks.

He led marketing and product management teams for network security during a time of massive growth at Cisco. Prior to that he was a key part of the corporate development team responsible for strategic investments and M&A at Juniper. He holds an MBA from University of California, Berkeley, and a Bachelor’s Degree in Computer Science from the National Institute of Technology Kurukshetra in India..

Quantifying Cloud Risk for Your Corporate Leadership
Most organisations are unaware of the full extent of their cloud app usage and many IT and security professionals cannot address questions such as “where are my data?”, “are my data safe in the cloud?” and “what is threatening the safety and security of my data, my company — and my career?” This is your opportunity to help your organization understand its present cloud risk and safely enable cloud-based productivity.

The session will cover market trends such as the decrease in use of secure private cloud and the increase of hybrid cloud use. We will look at the growing tendency of organisations to move valuable information into the cloud, and how this is being done often without the knowledge of the IT department. We will discuss how this is leading to large areas of “shadow IT” in many organisations, opening them up to the risk of data loss and to external threats such as ransomware.

Finally we will present a suggested strategy for talking to your organisation’s leadership, including the current state of cloud application security, a safe cloud enablement plan, a proven migration roadmap and a plan for transparency and governance.

Skyhigh Networks, Andreas Zengel, EMEA CTO
Andreas is EMEA CTO at Skyhigh Networks where he is responsible to contribute to Skyhigh’s technology, vision and architecture as well as cloud security innovation. He brings more than 16 years of experience in enterprise-class technology and worked with Citrix, PGP Corporation and Symantec in several roles including pre-sales architecture, product management, development and software architecture before joining Skyhigh Networks in 2015.

Andreas also spend several years as a freelance consultant for encryption and data protection solutions and has led projects with several enterprises and public organizations across EMEA to implement cryptography in business processes. With long experience focussing on data protection solutions, data loss prevention and cryptography Andreas is a recognised advisor and contributor to a network of data protection specialists in EMEA.

Andreas holds a German degree as electronic engineer for microchip and information technology.

Embrace the Cloud
Cloud Access Security Broker functionality and architecture. An innovative way to add security to cloud services

This session will introduce the concept of Cloud Access Security Broker (CASB) technology and its use cases. It will then transition into a deep-dive on how to architect a cloud service to protect other cloud services, recent advances in function preserving cryptography and innovations on redirecting traffic through security gateways in the cloud.

Swisscom AG, Sean O’Tool, Senior Security Engineer & Head of Specialist Activities for CSACH
Sean (CISSP,CISA,CISM) is a Senior Security Engineer for Group Security Swisscom as well as the head of specialist activities for the CSACH. His focus in the last years has been on virtualization and cloud security as well as migrating traditional Process IT Workloads to the cloud.

In the last year he has worked on Swisscom’s Telco Cloud projects in the area of Network and Process IT Security.

How to migrate infractructures to the Cloud
Swisscom (in partnership with Ericsson) is working to take the cloud to the next level with its own Private Telco Cloud. Learn more about the security endeavors from this Swisscom internal project of moving high availability Telco workloads from a purely physical environment to the cloud.

You can profit – even if you’re not a Telco – from lessons learned, difficulties you will face as well as how networking security for high availability workloads in the cloud can be implemented.

Presentations

ADVA Optical Networking, Michael Ritter, Vice President Technical Marketing & Analyst Relations
As Vice President of Technical Marketing and Analyst Relations, Michael Ritter drives the vision of ADVA Optical Networking’s innovative Optical+Ethernet technology portfolio into the marketplace.

Michael assumed his current role after serving as Vice President of Business Management and after a long history at ADVA Optical Networking in carrier business development and technology strategy.

Michael brought to ADVA Optical Networking many years of experience working with the international service provider industry, holding various management positions at ICT companies including Siemens Information & Communication Networks.

Network Functions Virtualization Drives New Business Opportunities for Cloud Service Providers
In a market where big data centers are considered the best way to deliver cloud services, micro data centers have evolved as a successful alternative, addressing all pain points related to cost, convenience and control.

To offer the best performance at the most competitive price, NFV-enabled micro data centers are an innovative concept that places data center and colocation facilities in the same building where customers are located. Co-locating private cloud services improves scale and management of individual cloud instances, while enabling secure, low latency, high-bandwidth connectivity.

Key drivers for this success are NFV-enabled services based on a processor-based server platform with Carrier Ethernet networking. Open, standards-based SDN and NFV orchestration software is also vital for managing VNFs at the service edge.

Barracuda Networks Inc., Dr. Wieland Alge, General Manager EMEA
Wieland Alge carries as General Manager EMEA Barracuda Networks, the overall responsibility for the operations of Barracuda Networks in Europe, Middle East and Africa. Previously, he was CEO and co-founder of phion AG which merged with Barracuda Networks in 2009.

With many years of experience in the design and implementation of international security projects he also has extensive knowledge in practical use. After his doctorate in natural sciences, he worked as a lecturer and researcher at the Institute for Theoretical Physics at the University of Innsbruck. In 2008 he was awarded as “Entrepreneur of the Year” by Ernst & Young.

Securing the Digital Transformation
A journey into the present with the Digital Transformation of business and the world for general with all the implications on the protection of infrastructures against cybercrime and advanced threats. Securing Datacenter, Cloud and Things will have consequences for IT infrastructure.

In this presentation you will get answers to the questions whether cloud-based infrastructures be ever as secure than on-premises ones and you will learn that stability of location will disappear for IT and IT security. Security must be everywhere, just like IT components.

BMC, Eric Blum, Vice-President & Chief Technology Officer EMEA
Eric Blum is Vice-President, Chief Technology Officer for EMEA and has been with BMC for the last 10 years. Thanks his previous tenure as the BMC EMEA Services VP, he has a particular emphasis on large BSM transformational and innovative programs across international organizations, involving multi-sourcing / Cloud strategy.

Eric is engaged on delivering break-though Service Management platforms, with a user-centric focus to enable new corporate business models. With his background, Eric is collaborating with a number of CIO / CTO’s, contributing to visioning, planning, benchmarking activities.

Prior to BMC, Eric held different management positions at SAP, Informix and Infor ( SSA).

Secure cloud services for agile digital business
190 days: this is the average time IT takes to remediate known vulnerabilities across its datacenters and all the different instances of cloud.

Complexity from new types of application landscape like Big Data, volatility coming with agile methodologies and micro-services deployment will only make this problem bigger. Advanced discovery and scanning coupled with Policy based automation are the only path to meet the CSO common objectives: less than 2 days!

In this presentation we will share self telling customer examples and expose some of the key use cases to focus on.

CensorNet, Lars Gotlieb, Regional Manager DACH
Educated Bachelor Engineer from Denmark’s technical University in 1985. Worked 10 years as a developer at Cray where he developed supervision software for network equipment. Since 1996 he worked as business developer and regional manager for several Danish and German start up Internet and security companies.

In 2012 he joined SMS passcode where he is responsible for building up the market in DACH. SMS passcode was acquired by Censornet Ltd in 2016. Censornet is a technology leader in Cloud security.

How to regain control of the Cloud
Cloud services are here to stay, and they are quickly changing the way we work. Today, employees expect the freedom to work from anywhere, at any time, and from any device. They even bring their own cloud apps like Dropbox, Evernote, and Google Apps to easily share files and stay productive.
This trend raises some important questions:

  1. Do you know what cloud applications are used in the company?
  2. Do you know where the data is stored?
  3. Do you have control over the application and the data?
  4. Who has responsibility for the data in the Cloud?

Four important questions that challenge traditional IT security thinking. Join this session as we take a closer look at what can be done to help you regain control of the cloud.

Cisco Systems, Rolf Schaerer, Technical Solutions Architect
Rolf Schaerer is a Technical Solutions Architect (TSA) at Cisco Switzerland with 14+ years experience in Data Center, Service Provider and Enterprise Networks.

In his current role at Cisco, he is focusing on data center switching and ACI in particular, consulting customers how to transition their current network environment to a SDN/ACI environment, including Automation and Orchestration.

Rolf holds several industry certifications, including 3 CCIE’s (CCIE # 17218), a CCDE (CCDE #20130012) and a VCP5.

Adding Operational Intent to a Microservice Environment
Microservice Applications in a datacenter creates challenges regarding applying policies, security and visibility. In this presentation you will learn how the open source project Contive may provide a higher level of networking abstraction for microservices and securing your application using a rich and open policy framework.

By providing an IP address per container, Contiv eliminates the need for a host-based NAT and enables the network administrator to help troubleshoot a container environment. Contiv gives the user the choice of a software overlay or an integrated hardware-accelerated approach.

A short demo using a docker swarm cluster with Contiv will conclude this session.

Druva, Andrew Nielsen, Director Enterprise Security
Andrew (aka Drew) has more than 15 years of experience in information security, primarily focused on security architecture and product definition.

At Druva, Drew is responsible for defining the security and compliance direction of products and services, and his background in both the private and public sectors gives him unique perspective on current and emerging security trends.

Prior to Druva, Drew held various security architecture and product roles at FireEye, Hitachi Data Systems, Silicon Valley Bank, and Raytheon. He currently holds the CISSP, CISA, ISSAP, ISSMP, and CCSK certifications.

Infrastructure – Do you really need to own it all?
With the broad availability of secure cloud infrastructure and application offerings, organizations need to examine whether they need to continue owning their own infrastructure as part delivering technology solutions that enable business agility.

One of the major sticking points in moving to the cloud has always been security. This fear is often used as a justification for organizations to continue to maintain and building new on premise infrastructure. However, one only has to look at the myriad of security capabilities, certifications, and attestations of major cloud service providers to question whether this fear and need for ownership is warranted. Given that most organizations are already leveraging SaaS for critical applications and service providers in the public cloud are seeing continued growth in this space, the security concerns are either being addressed, ignored, or something in between.

As IT organizations continue to be refocused on enabling business agility, this session will examine if there is still a continued need to own your own infrastructure given the security capabilities available in the public cloud. It will highlight the security delineations and responsibilities between providers and customers, while covering some public transitions of major SaaS vendors from their own infrastructure to the public cloud. Come find out if it still makes sense to own your own infrastructure or acquire through the public cloud.

e3 CSS AG, Michael Hoos, CEO

Developing a security product in Europe was always his dream. E3 CSS AG made the dream come true by developing Centraya in Zurich. After working 16 years for Symantec as Senior Director for Specialist Sales, Presales and Consulting he took the opportunity to be part of a security product development here in Europe from day 0 on. Since 2014 the team and Michael work on Centraya – a central cloud access security broker.
Michael works since 1997 in the IT security industry. He has been responsible for some of the largest IT security projects in Central Europe – from endpoint protection to gateway security.

Would you ask your new, unknown neighbor to do housesitting?
We are used to operate in trust based environments. Trust = f (results, predictability, context) x visibility. If you do the maths with your SaaS provider: is the result = Trust? If not: how can you protect your digital assets in the cloud?

The presentation covers technical and legal challenges as well as pragmatic approaches. Because it is your data!

HUAWEI, Robert Houska, CTO
As Huawei’s Switzerland’s CTO, Robert Houska challenges Huawei’s mission and technology strategy with customers. His enthusiasm for datacenter and especially for cloud technologies remained unbroken since several years.

Robert holds an Dipl. Ing Information Technology and MSc in Risk Management.

Cloud Management – more than infrastructure
Even if a powerful compute, storage and network infrastructure is fundamental for cloud solutions, customers increasingly demand customer-centric cloud management platforms (CMPs). Fully automated provisioning engines, workflow driven orchestration of virtual machines and workload as well policy based brokerage boost benefits of CMPs dramatically.

In this presentation you get a clear view on what to look for in an enterprise-grade cloud management platform. Be able to manage both your legacy infrastructure as well as cloud native architectures with control over costs and SLA.

Institute for Networked Solutions, Urs Baumann
Urs Baumann is head of the network team at the Institute for Networked Solutions at the University of Applied Sciences in Rapperswil. He has been in the IT business for more than 10 years. After the Bachelor of Science degree in Computer Science, he specialized in Software Defined Networking and Cloud Infrastructure.

Besides managing R&D projects, he developed and teaches SDN and Cloud courses. Furthermore, he is instructor at the Cisco Networking Academy. His research activities are in the area of SDN, network automation, DevOps, ChatOps and IoT.

Network Automation – Road trip to an automated Network
SDN is on the top of the hype cycle and it’s definition gives a lot of room for interpretation. But do we really need the whole SDN stack to take advantage of it?

Most SDN solutions are anyway based on proven technologies which are well-known for many years. In this speech, I will focus on the Network Automation part of SDN, I will show you examples of “low hanging fruits”, describe ways of how to start with the implenetation of network automation and how to grow it to a fully automated network.

ID Quantique, Gilles Trachsel, Partner Executive
Gilles Trachsel is responsible for managing ID Quantique worldwide partner through the entire sales lifecycle and for fulfilment of technical solutions to end customers. As Product Manager for the Network Encryption portfolio, he is also in charge of understanding the business and security requirements of end customers in the area of Quantum Safe Cryptography.

Gilles brings to the role over 23 years of international pre-sales, technical and product marketing management experience. Prior to this role, Gilles notably spent more than 10 years at Juniper Networks Ltd., managing the Enterprise solutions marketing throughout the EMEA region. Gilles also held a number of international positions with Peribit Networks (successful startup), U.S. Robotics and 3Com.

You are convinced your SSL sessions are secure, aren’t you? Actually you should not be …

Fact
Your SSL application is only as good and secure as the underlying random number generator (RNG).

Report
Nowadays most of the organisations relies on the use of OpenSSL, OpenSSH or OpenVPN to secure their applications and remote access. All these systems have in common that they sit on Linux and build their security encryption keys by pulling random numbers out of the Linux kernel. In order to guarantee absolute security, the random number generator must not be vulnerable to prediction or bias. A random number must be completely unpredictable. Although it may appear simple at first sight to provide this definition, it proves to be quite difficult in practice. Actually, true and instant randomness is difficult to achieve, especially because machines and operating systems, like Linux, are in essence deterministic.

Possible outcome
Your OpenSSL application needs highly secured keys immediately after the Linux system starts. In the case of a web server for instance, from the moment it boots, you want the SSL libraries – that secure connections to the web site – to be able to generate fully random and unpredictable key sequences. It is proven that Linux can not guarantee this high level of randomness at start, putting ultimately your organisation at risk and exposed to security breaches.

Conclusion
Random number generation is a critical security and reliability criterion in many demanding SSL applications running in your data center today. A proper mechanism must be implemented in order to make these applications truly and instantly secure.
This is the topic of this key note.

keyon AG, Martin Brunner, Security Consultant
Martin Brunner worked for many years as Consultant an Business Developer in various projects. 2008 he received a Dipl. Wirtschaftsinformatiker FH degree from HWZ Hochschule für Wirtschaft Zürich. At this time he worked in a Company as Business Analyst with a focus on the industrial area. In November 2011 he joined Keyon AG as Security Consultant and IT-Sales. Martin Brunner relish to counselled and support the customer in complex IT projects. To find appropriate solutions together with the customer is one of its primary objectives.

Certificate and Enrollment Services for Cloud

True-Xtender Autoenrollment Service for Microsoft PKI and SuisseID Signing Service are both outstanding examples of security components successfully brought to the cloud.

This presentation is a behind-the-scenes look of trustworthy cloud service providers and will focus on the end user experience and particular security measures applied to the respective services.

Laux Lawyers, Alexander Hofmann, lic. jur. Rechtsanwalt and Partner
Alexander Hofmann is a partner with LAUX LAWYERS AG. Alexander is attorney-at-law admitted to practice in Switzerland (admitted to the bar since 2007) and advises predominantly in IT and IT procurement matters.

Before joining LAUX LAWYERS AG Alexander worked for more than five years as a Senior Intellectual Property and Technology Legal Counsel with a major international Swiss bank, and for seven years in a boutique-lawfirm in Zurich specialising in intellectual property, media law and general business and contract law.

Financial Institutions and the Cloud
Cloud computing offers substantial benefits to corporate customers, also to financial institutions. However, financial institutions have generally proved slow to adopt cloud computing. Why so?

Financial market regulators worldwide seek to force financial institutions to maintain full control and responsibility over their business operations, also if outsourced, or “processed in clouds”.

While there are no “blanket bans” or similarly broad prohibitions or restrictions that should prevent financial institutions from adopting (and, therefore, benefiting from) cloud computing, financial market regulators have a key role to play in banks decision to enter into cloud computing engagements, or not. What are these regulators’ main concerns? And how can cloud service providers assist financial institutions to address those concerns? Key topics where financial institutions need to rely on the cloud service providers will be discussed, including responsibilities for subcontractors, data locations, rights to audit, and exit provisions. In order to gain financial institutions as customers, cloud services providers are encouraged to develop an appropriate understanding of financial market regulations. Know-how that will prove useful latest when engaged in contract negotiations with financial institutions.

NIL, Jan Bervar, Senior IT Architect
Jan Bervar is a senior IT architect in the consulting division of NIL Ltd, a cloud builder and provider based in Slovenia. With more than 20 years of experience in information security, Jan’s work involves working on complex security challenges, most often to create innovative blueprints for risk reduction for cutting-edge and security-immature systems and technologies.

Cloud Automation Security: The elephant in the room
Remember the times when we did everything (and then some) to protect and minimize access to the management interfaces of our infrastructure, and isolate it from users and production networks? Today, we expose an entire cloud’s API to the Internet, and over IT, aim to provide as much cloud automation functionality as possible.

Think about this for a minute, knowing about our historic (dis)ability to write robust, reliable, and secure software in an emerging industry. I will present various cloud automation risks, and suggest a robust approach for preventing catastrophic automation-related security failures.

Paessler AG, Hicham Bougdal, Senior Systems Engineer
Hicham Bougdal is a Senior Systems Engineer at Paessler AG, where he’s responsible for consulting and supporting prospects, customers and partners in all technical questions related to PRTG Network Monitor. He develops individualized concepts based on each customer’s requirements to optimize their use of PRTG.

Data Center Monitoring Made Easy
New trends like cloud computing continuously increase the demand on data center capacity. Therefore, data center design is always a hot topic.
Surprisingly the unified monitoring of data centers is still not common.

Unified means that you monitor everything with one solution: your IT infrastructure, security tools, environmental conditions in the server rooms, the external connection, your DC processes and applications.

This presentation will show you why monitoring is business critical, what you need to consider when setting up your unified monitoring and how easy this can be done.

Splunk, Alain Gutknecht, Senior Sales Engineer
Alain is an experienced IT professional and has held a range of engineering roles during the course of his 20-year career. Prior to Splunk, Alain worked for vendors including VMWare, Sun Microsystems and Silicon Graphics.

Achieving Operational Intelligence: How machine data can improve IT operations and security
This presentation will consider the importance of machine data for organizations looking to improve their Operational Intelligence.

Machine data is one of the fastest growing and complex areas of big data. It’s also one of the most valuable, containing a definitive record of transactions, customer behavior, sensor readings, machine behavior, security threats, fraudulent activity and more. Machine data can be used to provide valuable insights in the form of Operational Intelligence, giving you a real-time understanding of what’s happening across your technology infrastructure and allowing you to make informed decisions.

This session will provide insight on how to get value out of the vast volumes of machine data created across your IT Operations, whether your infrastructure is predominantly cloud, on-premise or hybrid. It will detail the different stages of transforming machine data into real-time Operational Intelligence and will reference examples of how customers are benefiting across a range of industries in Switzerland.

SWITCH, Jens-Christian Fischer, Cloud Engineer
Jens-Christian is product owner of SWITCHengines, the IaaS offering by SWITCH for Swiss Academia. He is team lead of Peta Solutions, the team that builds, designs and operates this cloud solution.

Before working for SWITCH, Jens-Christian worked in the web- and startup scene in Zurich, both as the owner/director of his own consulting company as well as CTO in various startups.

He holds an MSc in Information Technology from the University of Liverpool and is a part time lecturer at the ZHAW. He is married and has two children.

SWITCHengines – Building and operating cloud solutions for Swiss Academia
Running your own cloud and operating it commercially both are big undertakings. SWITCH has been building and running its OpenStack and Ceph based IaaS service SWITCHeninges for over 3 years now.

In his talk, Jens-Christian describes the architecture of this (almost) public cloud, the processes built to run it and why it is important to not sell cloud in order to sell more cloud as a small cloud operator.

Swivel Secure, Andreas Schmid, Solution Engineer
Andreas is working in IT for over 20 years, is with Swivel Secure since 2016, joining as the EMEA Pre-Sales Consultant. He has an excellent understanding of the technology-side of Cybersecurity due his long-time-career with several vendors in all aspects of IT-Security.

Before joining Swivel, he worked i.e. for the Rohde & Schwarz Cyber-Security-Division, for CA Computer-Associates in the Internet-Security-Unit as well as some other well-known companies. He started his career in IT maintaining various CAD Unix systems for a vendor of CAD-Systems.

Intelligent & risk-based Authentication for the Cloud
In the past a company had to adapt the authentication methodology they have chosen whether user groups had different risk behaviors by having access to sensitive data. Nowadays authentication has to adapt the company’s business processes and user risk levels by offering intelligent methods which covers the new complex world.

By allowing remote access to data you are significantly increasing the risk of unauthorized access. Looking beyond binary authentication to adaptive risk-based solutions allow companies to maintain strong data security but not at the expense of usability. In this session you will learn how intelligent authentication solution adapts to the circumstances of the user’s access to a service. See how you can profit if you are doing the rules, so your implementation will be unique to your specific needs and risks.

Vectra Networks, Alex Waterman, Director of Product Management
Prior to Vectra, Alex was senior director of product management at VMware in the NSX team, where he was responsible for NSX security solutions and technology partners. Before VMware, Alex was responsible for enterprise security as the senior director of product management at Juniper Networks.

Earlier in his career, Alex held leadership positions at Cisco Systems, where he led engineering teams in security services and WAN optimization, and was founder and software architect at Netiverse, Inc., which was acquired by Cisco in 2001.

Alex holds a bachelor’s degree in computer science from the University of Colorado, Boulder.

Micro-segmentation that thinks – Automated threat management ensures real-time security with NSX micro-segmentation
Today’s cyber attackers have evolved and are increasingly successful at penetrating network defenses and progressively stealing your most critical assets. This strategy has reached into the data center, making it critical that security professionals have the tools and techniques to detect and respond to these attacks in real time.

Your data centers are the lifeblood of your daily business operations and contain your most valuable data and assets. While Micro-segmentation provides fine-grained access control within the data center, the detection of active attacks requires a different set of skills.

Security teams must be able to identify the hidden malicious techniques used to perform reconnaissance, lateral movement, data accumulation and exfiltration behavior. The combination of this data-center focused threat detection with the enforcement capabilities of micro-segmentation is critical for protecting your data.

In this session we will cover:

  1. The cybersecurity gap within the software-defined data center and why existing approaches alone are insufficient to protect against active attacks
  2. Real-world examples of attack behaviors in the data center that are not addressed by existing approaches
  3. How to close the cybersecurity gap with automated threat management and automate protection with micro-segmentation
  4. How to use context to accelerate attack investigation and detection

UBS AG, Daniel Stieger, CTO
PhD in computer science at the Swiss Federal Institute of Technology in Zurich (ETHZ). Headed for four years a mixed team (methodology, data management, software architecture and development) in Credit Suisse and at Fides Informatik.

Since 1997 in UBS in various roles. Currently CTO for EMEA and the Global Emerging Locations covering both business aspects and IT aspects.

Data Privacy in the Cloud
For certain industries data privacy issues are among key concerns as soon as cloud computing is discussed. On one hand, companies must comply with data privacy laws of the underlying jurisdictions, and on the other hand, there are also sector based and internal rules to be followed.

In particular when it comes to external clouds, the client and the service provider typically share the control over the data in the cloud. Thereby, the cloud service provider may be faced with contradicting legal obligations.

This presentation talks about best practices from a bank’s perspective when it comes to the implementation of internal and external cloud based solutions.

University of Innsbruck, Dr. Matthias Farwick
Dr. Matthias Farwick is research team leader in the area of IT-Asset Management at the University of Innsbruck and is the co-creator of Txture, the next generation IT-Asset Management Tool for data centers. Before his work on Txture he participated in several R&D projects in the US, Germany, Austria, Canada and China.

Data Center Intelligence – Creating Integrated Views on DevOps & IT-Management
Large-scale IT-architectures are complex organisms that continuously change. Up-to-date information about the dependencies, responsibilities and security state of the overall system are essential for analyses, optimization and change planning.

In this talk we show how to create and maintain flexible visualizations and dashboards that provide the necessary intelligence to answer the pressing architectural questions of DevOps and IT-Management.

Moderator

ID Quantique, Kelly Richdale, VP of Quantum-Safe Security & President (ISC)2 Swiss chapter
Ms Kelly Richdale is VP of Quantum-Safe Security at ID Quantique, heading the divisions for quantum and conventional cryptography as well as for random number generation. She has been working in the security industry for 15 years, focusing on cryptography, network security, and identity and access management.

Prior to ID Quantique Ms Richdale was active in biometrics and strong authentication solutions, holding the role of Managing Director International Operations of Bioscrypt, the enterprise access division of L1 Identity Solutions (now Sagem-Safran). In 2001 she founded the company A4Vision, specialising in 3D face recognition, which was acquired by Bioscrypt in March 2007. Ms Richdale holds an MBA from INSEAD (Fontainebleau, France) and a degree in modern languages (Russian & German) from Cambridge University. She is on the Advisory Board of the EPFL’s Management of Technology course, and lectures on information security at the University of Geneva.

In addition she is President of the Swiss chapter of ISC2.

Swisscom, Klaus Gribi, Founder CSACH
Mr. Klaus Gribi is working in information security for over 20 years. He has vast experience, practical and applied knowledge within information security this allowed him to build and establish high quality security solutions within complex environments. Klaus Gribi is able to demonstrate a track record of working in large and complex Enterprise environments within different sectors from private to government and telecommunications.

Mr. Gribi has a track record for problem-solving and system enhancement, delivering streamlined, cost-effective security solutions within high pressure and quality-driven settings. As one of his roles Klaus Gribi is acting as the Chief Security Officer (CSO) providing the overarching security management and co-ordination function that ensures that IT security is aligned with business needs, and ensuring that information security is effectively managed in all activities.

In the past years he focussed on the Cloud Security topic. He is one of the leaders for Cloud Security and formed the Cloud Security Alliance Switzerland Chapter (CSACH) in 2012. Currently he is working for Swisscom (Schweiz) AG as a Senior Security Consultant for Cloud Security.

TEMET AG, Sven Schaub, Senior IT Security Consultant
Sven is Senior IT Security Consultant at TEMET AG and working on multiple security related engagements in different industries and for the Swiss eHealth initiative.

He brings in expertise in architecting IT infrastructure solutions and service management processes. In addition he is also an ITIL trainer and project management lecturer.

Event Partner





Menu Title