DIGS DC Day Speakers in 2016
(all presentations are held in English))
ERNW Research, Matthias Luft, Security Researcher
Matthias Luft is a security researcher and heads the German security research company ERNW Research. He is interested in a broad range of topics (such as DLP, virtualization, and network security) while keeping up with the daily consulting and assessment work.
Matthias presents on a regular basis at international security conferences and is involved in the organization (e.g. part of the program committee) of the security conference TROOPERS.
Trust Evaluation of Cloud Providers
Due to the nature of cloud services, it is also not possible for Cloud customers to apply technical controls of their choice to the Cloud provider’s infrastructure. This presentation will cover an approach towards the trust-based evaluation of Cloud Providers to allow Cloud customers to reach a state of security confidence in the end of the day. The work we present is based on the evaluation model we developed and deployed for a major German company.
Ivan Pepelnjak, Independent Network Architect
Ivan Pepelnjak, CCIE#1354 Emeritus, is an independent network architect, book author, blogger and regular speaker at industry events like Interop, RIPE and regional NOG meetings. He has been designing and implementing large-scale service provider and enterprise networks since 1990, and is currently using his expertise to help multinational enterprises and large cloud- and service providers design next-generation data center and cloud infrastructure using Software-Defined Networking (SDN) and Network Function Virtualization (NFV) approaches and technologies.
Ivan is author of several Cisco Press books, and a series of highly successful webinars. To learn more about him, visit ipspace.net or read his blog at blog.ipspace.net.
Simplify and Secure Your Cloud with SDN
In reality, multiple vendors solved the migration of compute resources, data transfers are still limited by the laws of physics (bandwidth and latency), and almost nobody wants to address network- and security aspects of hybrid clouds because they’re really hard to solve.
This short presentation will identify typical problems you will encounter when trying to introduce private or hybrid clouds in your environment, and describe how you can use the Software Defined Networking (SDN) and network/security automation concepts to streamline application deployments.
|Juniper Network, Tom Ruban, Vice President System Engineering
Tom Ruban serves as Juniper Networks’ Vice-President of System Engineering – Europe, Middle East and Africa.
Tom has been with Juniper since 2002, holding a variety of leadership positions in the EMEA sales management organization. Tom ensures that Juniper’s products meet the requirements of customers in the EMEA region, and works to communicate Juniper’s technical advantage and vision.
Mr. Ruban also leads the EMEA systems engineering and product management groups, and presents and consults on the topics of mobility, security, broadband and cloud services, and the future of data center Technologies.
With almost twenty years of international experience as an Executive in the Telecommunications and Networking industries, Tom has been employed in companies ranging from start-ups to large public corporations. Prior to joining Juniper Networks Tom was the Technical Director EMEA for Unisphere Networks Inc, where he started the company’s activities as the first employee in Europe. Earlier in his career he held various management positions at Siemens Public Communications Group in the US and Germany.
Mr. Ruban is a regular speaker at networking conferences and trade shows. Tom holds a Master’s Degree in Computer Science and several patents in the field of computer networking.
The Open Disruptive Decade
The reasons are clear: Open means freedom and choice, translating into faster, better, greater. Faster roll-out of new applications and services. Better use of your IT resources and external partners. And greater flexibility to run applications in different compute environments. All delivered across a network that is open by default, removing the risk of perpetual vendor lock-in.
If you are responsible for IT or networking infrastructure decisions in your company’s Private, Public or Hybrid Data Center or Cloud environment, you should not miss this presentation.
Microsoft, Marc Holitscher, Chief Technology Officer
As Microsoft Switzerland’s Chief Technology Officer, Marc aarticulates Microsoft’s technology vision and strategy with lighthouse customers, key business decision makers and government thought leaders.
He support customers in translating new technologies and innovations into business impact and outcomes. Marc holds a PhD in International Relations form the University of Zurich..
The second line of defense: Assessing risk and compliance in a Cloud enabled world
Equally, Cloud providers are required to find the right balance between providing transparency and control and to ensure the highest level of security and reliability when providing the service. Finally, these capabilities need to be mirrored in contracts meeting the companies’ unique compliance requirements.
Netskope, Rajneesh Chopra, Vice President Product Management
Rajneesh Chopra, a recognized thought leader in the Internet security industry, joined Netskope as vice president of product management after leading in strategic and product lead roles at Cisco Systems and Juniper Networks.
He led marketing and product management teams for network security during a time of massive growth at Cisco. Prior to that he was a key part of the corporate development team responsible for strategic investments and M&A at Juniper. He holds an MBA from University of California, Berkeley, and a Bachelor’s Degree in Computer Science from the National Institute of Technology Kurukshetra in India..
Quantifying Cloud Risk for Your Corporate Leadership
The session will cover market trends such as the decrease in use of secure private cloud and the increase of hybrid cloud use. We will look at the growing tendency of organisations to move valuable information into the cloud, and how this is being done often without the knowledge of the IT department. We will discuss how this is leading to large areas of “shadow IT” in many organisations, opening them up to the risk of data loss and to external threats such as ransomware.
Finally we will present a suggested strategy for talking to your organisation’s leadership, including the current state of cloud application security, a safe cloud enablement plan, a proven migration roadmap and a plan for transparency and governance.
Skyhigh Networks, Andreas Zengel, EMEA CTO
Andreas is EMEA CTO at Skyhigh Networks where he is responsible to contribute to Skyhigh’s technology, vision and architecture as well as cloud security innovation. He brings more than 16 years of experience in enterprise-class technology and worked with Citrix, PGP Corporation and Symantec in several roles including pre-sales architecture, product management, development and software architecture before joining Skyhigh Networks in 2015.
Andreas also spend several years as a freelance consultant for encryption and data protection solutions and has led projects with several enterprises and public organizations across EMEA to implement cryptography in business processes. With long experience focussing on data protection solutions, data loss prevention and cryptography Andreas is a recognised advisor and contributor to a network of data protection specialists in EMEA.
Andreas holds a German degree as electronic engineer for microchip and information technology.
Embrace the Cloud
This session will introduce the concept of Cloud Access Security Broker (CASB) technology and its use cases. It will then transition into a deep-dive on how to architect a cloud service to protect other cloud services, recent advances in function preserving cryptography and innovations on redirecting traffic through security gateways in the cloud.
Swisscom AG, Sean O’Tool, Senior Security Engineer & Head of Specialist Activities for CSACH
Sean (CISSP,CISA,CISM) is a Senior Security Engineer for Group Security Swisscom as well as the head of specialist activities for the CSACH. His focus in the last years has been on virtualization and cloud security as well as migrating traditional Process IT Workloads to the cloud.
In the last year he has worked on Swisscom’s Telco Cloud projects in the area of Network and Process IT Security.
How to migrate infractructures to the Cloud
You can profit – even if you’re not a Telco – from lessons learned, difficulties you will face as well as how networking security for high availability workloads in the cloud can be implemented.
ADVA Optical Networking, Michael Ritter, Vice President Technical Marketing & Analyst Relations
As Vice President of Technical Marketing and Analyst Relations, Michael Ritter drives the vision of ADVA Optical Networking’s innovative Optical+Ethernet technology portfolio into the marketplace.
Michael assumed his current role after serving as Vice President of Business Management and after a long history at ADVA Optical Networking in carrier business development and technology strategy.
Michael brought to ADVA Optical Networking many years of experience working with the international service provider industry, holding various management positions at ICT companies including Siemens Information & Communication Networks.
Network Functions Virtualization Drives New Business Opportunities for Cloud Service Providers
To offer the best performance at the most competitive price, NFV-enabled micro data centers are an innovative concept that places data center and colocation facilities in the same building where customers are located. Co-locating private cloud services improves scale and management of individual cloud instances, while enabling secure, low latency, high-bandwidth connectivity.
Key drivers for this success are NFV-enabled services based on a processor-based server platform with Carrier Ethernet networking. Open, standards-based SDN and NFV orchestration software is also vital for managing VNFs at the service edge.
Barracuda Networks Inc., Dr. Wieland Alge, General Manager EMEA
Wieland Alge carries as General Manager EMEA Barracuda Networks, the overall responsibility for the operations of Barracuda Networks in Europe, Middle East and Africa. Previously, he was CEO and co-founder of phion AG which merged with Barracuda Networks in 2009.
With many years of experience in the design and implementation of international security projects he also has extensive knowledge in practical use. After his doctorate in natural sciences, he worked as a lecturer and researcher at the Institute for Theoretical Physics at the University of Innsbruck. In 2008 he was awarded as “Entrepreneur of the Year” by Ernst & Young.
Securing the Digital Transformation
In this presentation you will get answers to the questions whether cloud-based infrastructures be ever as secure than on-premises ones and you will learn that stability of location will disappear for IT and IT security. Security must be everywhere, just like IT components.
BMC, Eric Blum, Vice-President & Chief Technology Officer EMEA
Eric Blum is Vice-President, Chief Technology Officer for EMEA and has been with BMC for the last 10 years. Thanks his previous tenure as the BMC EMEA Services VP, he has a particular emphasis on large BSM transformational and innovative programs across international organizations, involving multi-sourcing / Cloud strategy.
Eric is engaged on delivering break-though Service Management platforms, with a user-centric focus to enable new corporate business models. With his background, Eric is collaborating with a number of CIO / CTO’s, contributing to visioning, planning, benchmarking activities.
Prior to BMC, Eric held different management positions at SAP, Informix and Infor ( SSA).
Secure cloud services for agile digital business
Complexity from new types of application landscape like Big Data, volatility coming with agile methodologies and micro-services deployment will only make this problem bigger. Advanced discovery and scanning coupled with Policy based automation are the only path to meet the CSO common objectives: less than 2 days!
In this presentation we will share self telling customer examples and expose some of the key use cases to focus on.
CensorNet, Lars Gotlieb, Regional Manager DACH
Educated Bachelor Engineer from Denmark’s technical University in 1985. Worked 10 years as a developer at Cray where he developed supervision software for network equipment. Since 1996 he worked as business developer and regional manager for several Danish and German start up Internet and security companies.
In 2012 he joined SMS passcode where he is responsible for building up the market in DACH. SMS passcode was acquired by Censornet Ltd in 2016. Censornet is a technology leader in Cloud security.
How to regain control of the Cloud
Four important questions that challenge traditional IT security thinking. Join this session as we take a closer look at what can be done to help you regain control of the cloud.
Cisco Systems, Rolf Schaerer, Technical Solutions Architect
Rolf Schaerer is a Technical Solutions Architect (TSA) at Cisco Switzerland with 14+ years experience in Data Center, Service Provider and Enterprise Networks.
In his current role at Cisco, he is focusing on data center switching and ACI in particular, consulting customers how to transition their current network environment to a SDN/ACI environment, including Automation and Orchestration.
Rolf holds several industry certifications, including 3 CCIE’s (CCIE # 17218), a CCDE (CCDE #20130012) and a VCP5.
Adding Operational Intent to a Microservice Environment
By providing an IP address per container, Contiv eliminates the need for a host-based NAT and enables the network administrator to help troubleshoot a container environment. Contiv gives the user the choice of a software overlay or an integrated hardware-accelerated approach.
A short demo using a docker swarm cluster with Contiv will conclude this session.
Druva, Andrew Nielsen, Director Enterprise Security
Andrew (aka Drew) has more than 15 years of experience in information security, primarily focused on security architecture and product definition.
At Druva, Drew is responsible for defining the security and compliance direction of products and services, and his background in both the private and public sectors gives him unique perspective on current and emerging security trends.
Prior to Druva, Drew held various security architecture and product roles at FireEye, Hitachi Data Systems, Silicon Valley Bank, and Raytheon. He currently holds the CISSP, CISA, ISSAP, ISSMP, and CCSK certifications.
Infrastructure – Do you really need to own it all?
One of the major sticking points in moving to the cloud has always been security. This fear is often used as a justification for organizations to continue to maintain and building new on premise infrastructure. However, one only has to look at the myriad of security capabilities, certifications, and attestations of major cloud service providers to question whether this fear and need for ownership is warranted. Given that most organizations are already leveraging SaaS for critical applications and service providers in the public cloud are seeing continued growth in this space, the security concerns are either being addressed, ignored, or something in between.
As IT organizations continue to be refocused on enabling business agility, this session will examine if there is still a continued need to own your own infrastructure given the security capabilities available in the public cloud. It will highlight the security delineations and responsibilities between providers and customers, while covering some public transitions of major SaaS vendors from their own infrastructure to the public cloud. Come find out if it still makes sense to own your own infrastructure or acquire through the public cloud.
|e3 CSS AG, Michael Hoos, CEO
Developing a security product in Europe was always his dream. E3 CSS AG made the dream come true by developing Centraya in Zurich. After working 16 years for Symantec as Senior Director for Specialist Sales, Presales and Consulting he took the opportunity to be part of a security product development here in Europe from day 0 on. Since 2014 the team and Michael work on Centraya – a central cloud access security broker.
Michael works since 1997 in the IT security industry. He has been responsible for some of the largest IT security projects in Central Europe – from endpoint protection to gateway security.
Would you ask your new, unknown neighbor to do housesitting?
The presentation covers technical and legal challenges as well as pragmatic approaches. Because it is your data!
HUAWEI, Robert Houska, CTO
As Huawei’s Switzerland’s CTO, Robert Houska challenges Huawei’s mission and technology strategy with customers. His enthusiasm for datacenter and especially for cloud technologies remained unbroken since several years.
Robert holds an Dipl. Ing Information Technology and MSc in Risk Management.
Cloud Management – more than infrastructure
In this presentation you get a clear view on what to look for in an enterprise-grade cloud management platform. Be able to manage both your legacy infrastructure as well as cloud native architectures with control over costs and SLA.
Institute for Networked Solutions, Urs Baumann
Urs Baumann is head of the network team at the Institute for Networked Solutions at the University of Applied Sciences in Rapperswil. He has been in the IT business for more than 10 years. After the Bachelor of Science degree in Computer Science, he specialized in Software Defined Networking and Cloud Infrastructure.
Besides managing R&D projects, he developed and teaches SDN and Cloud courses. Furthermore, he is instructor at the Cisco Networking Academy. His research activities are in the area of SDN, network automation, DevOps, ChatOps and IoT.
Network Automation – Road trip to an automated Network
Most SDN solutions are anyway based on proven technologies which are well-known for many years. In this speech, I will focus on the Network Automation part of SDN, I will show you examples of “low hanging fruits”, describe ways of how to start with the implenetation of network automation and how to grow it to a fully automated network.
ID Quantique, Gilles Trachsel, Partner Executive
Gilles Trachsel is responsible for managing ID Quantique worldwide partner through the entire sales lifecycle and for fulfilment of technical solutions to end customers. As Product Manager for the Network Encryption portfolio, he is also in charge of understanding the business and security requirements of end customers in the area of Quantum Safe Cryptography.
Gilles brings to the role over 23 years of international pre-sales, technical and product marketing management experience. Prior to this role, Gilles notably spent more than 10 years at Juniper Networks Ltd., managing the Enterprise solutions marketing throughout the EMEA region. Gilles also held a number of international positions with Peribit Networks (successful startup), U.S. Robotics and 3Com.
You are convinced your SSL sessions are secure, aren’t you? Actually you should not be …
keyon AG, Martin Brunner, Security Consultant
Martin Brunner worked for many years as Consultant an Business Developer in various projects. 2008 he received a Dipl. Wirtschaftsinformatiker FH degree from HWZ Hochschule für Wirtschaft Zürich. At this time he worked in a Company as Business Analyst with a focus on the industrial area. In November 2011 he joined Keyon AG as Security Consultant and IT-Sales. Martin Brunner relish to counselled and support the customer in complex IT projects. To find appropriate solutions together with the customer is one of its primary objectives.
Certificate and Enrollment Services for Cloud
True-Xtender Autoenrollment Service for Microsoft PKI and SuisseID Signing Service are both outstanding examples of security components successfully brought to the cloud.
This presentation is a behind-the-scenes look of trustworthy cloud service providers and will focus on the end user experience and particular security measures applied to the respective services.
Laux Lawyers, Alexander Hofmann, lic. jur. Rechtsanwalt and Partner
Alexander Hofmann is a partner with LAUX LAWYERS AG. Alexander is attorney-at-law admitted to practice in Switzerland (admitted to the bar since 2007) and advises predominantly in IT and IT procurement matters.
Before joining LAUX LAWYERS AG Alexander worked for more than five years as a Senior Intellectual Property and Technology Legal Counsel with a major international Swiss bank, and for seven years in a boutique-lawfirm in Zurich specialising in intellectual property, media law and general business and contract law.
Financial Institutions and the Cloud
Financial market regulators worldwide seek to force financial institutions to maintain full control and responsibility over their business operations, also if outsourced, or “processed in clouds”.
While there are no “blanket bans” or similarly broad prohibitions or restrictions that should prevent financial institutions from adopting (and, therefore, benefiting from) cloud computing, financial market regulators have a key role to play in banks decision to enter into cloud computing engagements, or not. What are these regulators’ main concerns? And how can cloud service providers assist financial institutions to address those concerns? Key topics where financial institutions need to rely on the cloud service providers will be discussed, including responsibilities for subcontractors, data locations, rights to audit, and exit provisions. In order to gain financial institutions as customers, cloud services providers are encouraged to develop an appropriate understanding of financial market regulations. Know-how that will prove useful latest when engaged in contract negotiations with financial institutions.
NIL, Jan Bervar, Senior IT Architect
Jan Bervar is a senior IT architect in the consulting division of NIL Ltd, a cloud builder and provider based in Slovenia. With more than 20 years of experience in information security, Jan’s work involves working on complex security challenges, most often to create innovative blueprints for risk reduction for cutting-edge and security-immature systems and technologies.
Cloud Automation Security: The elephant in the room
Think about this for a minute, knowing about our historic (dis)ability to write robust, reliable, and secure software in an emerging industry. I will present various cloud automation risks, and suggest a robust approach for preventing catastrophic automation-related security failures.
Paessler AG, Hicham Bougdal, Senior Systems Engineer
Hicham Bougdal is a Senior Systems Engineer at Paessler AG, where he’s responsible for consulting and supporting prospects, customers and partners in all technical questions related to PRTG Network Monitor. He develops individualized concepts based on each customer’s requirements to optimize their use of PRTG.
Data Center Monitoring Made Easy
Unified means that you monitor everything with one solution: your IT infrastructure, security tools, environmental conditions in the server rooms, the external connection, your DC processes and applications.
This presentation will show you why monitoring is business critical, what you need to consider when setting up your unified monitoring and how easy this can be done.
Splunk, Alain Gutknecht, Senior Sales Engineer
Alain is an experienced IT professional and has held a range of engineering roles during the course of his 20-year career. Prior to Splunk, Alain worked for vendors including VMWare, Sun Microsystems and Silicon Graphics.
Achieving Operational Intelligence: How machine data can improve IT operations and security
Machine data is one of the fastest growing and complex areas of big data. It’s also one of the most valuable, containing a definitive record of transactions, customer behavior, sensor readings, machine behavior, security threats, fraudulent activity and more. Machine data can be used to provide valuable insights in the form of Operational Intelligence, giving you a real-time understanding of what’s happening across your technology infrastructure and allowing you to make informed decisions.
This session will provide insight on how to get value out of the vast volumes of machine data created across your IT Operations, whether your infrastructure is predominantly cloud, on-premise or hybrid. It will detail the different stages of transforming machine data into real-time Operational Intelligence and will reference examples of how customers are benefiting across a range of industries in Switzerland.
SWITCH, Jens-Christian Fischer, Cloud Engineer
Jens-Christian is product owner of SWITCHengines, the IaaS offering by SWITCH for Swiss Academia. He is team lead of Peta Solutions, the team that builds, designs and operates this cloud solution.
Before working for SWITCH, Jens-Christian worked in the web- and startup scene in Zurich, both as the owner/director of his own consulting company as well as CTO in various startups.
He holds an MSc in Information Technology from the University of Liverpool and is a part time lecturer at the ZHAW. He is married and has two children.
SWITCHengines – Building and operating cloud solutions for Swiss Academia
In his talk, Jens-Christian describes the architecture of this (almost) public cloud, the processes built to run it and why it is important to not sell cloud in order to sell more cloud as a small cloud operator.
Swivel Secure, Andreas Schmid, Solution Engineer
Andreas is working in IT for over 20 years, is with Swivel Secure since 2016, joining as the EMEA Pre-Sales Consultant. He has an excellent understanding of the technology-side of Cybersecurity due his long-time-career with several vendors in all aspects of IT-Security.
Before joining Swivel, he worked i.e. for the Rohde & Schwarz Cyber-Security-Division, for CA Computer-Associates in the Internet-Security-Unit as well as some other well-known companies. He started his career in IT maintaining various CAD Unix systems for a vendor of CAD-Systems.
Intelligent & risk-based Authentication for the Cloud
By allowing remote access to data you are significantly increasing the risk of unauthorized access. Looking beyond binary authentication to adaptive risk-based solutions allow companies to maintain strong data security but not at the expense of usability. In this session you will learn how intelligent authentication solution adapts to the circumstances of the user’s access to a service. See how you can profit if you are doing the rules, so your implementation will be unique to your specific needs and risks.
Vectra Networks, Alex Waterman, Director of Product Management
Prior to Vectra, Alex was senior director of product management at VMware in the NSX team, where he was responsible for NSX security solutions and technology partners. Before VMware, Alex was responsible for enterprise security as the senior director of product management at Juniper Networks.
Earlier in his career, Alex held leadership positions at Cisco Systems, where he led engineering teams in security services and WAN optimization, and was founder and software architect at Netiverse, Inc., which was acquired by Cisco in 2001.
Alex holds a bachelor’s degree in computer science from the University of Colorado, Boulder.
Micro-segmentation that thinks – Automated threat management ensures real-time security with NSX micro-segmentation
Your data centers are the lifeblood of your daily business operations and contain your most valuable data and assets. While Micro-segmentation provides fine-grained access control within the data center, the detection of active attacks requires a different set of skills.
Security teams must be able to identify the hidden malicious techniques used to perform reconnaissance, lateral movement, data accumulation and exfiltration behavior. The combination of this data-center focused threat detection with the enforcement capabilities of micro-segmentation is critical for protecting your data.
In this session we will cover:
UBS AG, Daniel Stieger, CTO
PhD in computer science at the Swiss Federal Institute of Technology in Zurich (ETHZ). Headed for four years a mixed team (methodology, data management, software architecture and development) in Credit Suisse and at Fides Informatik.
Since 1997 in UBS in various roles. Currently CTO for EMEA and the Global Emerging Locations covering both business aspects and IT aspects.
Data Privacy in the Cloud
In particular when it comes to external clouds, the client and the service provider typically share the control over the data in the cloud. Thereby, the cloud service provider may be faced with contradicting legal obligations.
This presentation talks about best practices from a bank’s perspective when it comes to the implementation of internal and external cloud based solutions.
University of Innsbruck, Dr. Matthias Farwick
Dr. Matthias Farwick is research team leader in the area of IT-Asset Management at the University of Innsbruck and is the co-creator of Txture, the next generation IT-Asset Management Tool for data centers. Before his work on Txture he participated in several R&D projects in the US, Germany, Austria, Canada and China.
Data Center Intelligence – Creating Integrated Views on DevOps & IT-Management
In this talk we show how to create and maintain flexible visualizations and dashboards that provide the necessary intelligence to answer the pressing architectural questions of DevOps and IT-Management.
ID Quantique, Kelly Richdale, VP of Quantum-Safe Security & President (ISC)2 Swiss chapter
Ms Kelly Richdale is VP of Quantum-Safe Security at ID Quantique, heading the divisions for quantum and conventional cryptography as well as for random number generation. She has been working in the security industry for 15 years, focusing on cryptography, network security, and identity and access management.
Prior to ID Quantique Ms Richdale was active in biometrics and strong authentication solutions, holding the role of Managing Director International Operations of Bioscrypt, the enterprise access division of L1 Identity Solutions (now Sagem-Safran). In 2001 she founded the company A4Vision, specialising in 3D face recognition, which was acquired by Bioscrypt in March 2007. Ms Richdale holds an MBA from INSEAD (Fontainebleau, France) and a degree in modern languages (Russian & German) from Cambridge University. She is on the Advisory Board of the EPFL’s Management of Technology course, and lectures on information security at the University of Geneva.
In addition she is President of the Swiss chapter of ISC2.
|Swisscom, Klaus Gribi, Founder CSACH
Mr. Klaus Gribi is working in information security for over 20 years. He has vast experience, practical and applied knowledge within information security this allowed him to build and establish high quality security solutions within complex environments. Klaus Gribi is able to demonstrate a track record of working in large and complex Enterprise environments within different sectors from private to government and telecommunications.
Mr. Gribi has a track record for problem-solving and system enhancement, delivering streamlined, cost-effective security solutions within high pressure and quality-driven settings. As one of his roles Klaus Gribi is acting as the Chief Security Officer (CSO) providing the overarching security management and co-ordination function that ensures that IT security is aligned with business needs, and ensuring that information security is effectively managed in all activities.
In the past years he focussed on the Cloud Security topic. He is one of the leaders for Cloud Security and formed the Cloud Security Alliance Switzerland Chapter (CSACH) in 2012. Currently he is working for Swisscom (Schweiz) AG as a Senior Security Consultant for Cloud Security.
TEMET AG, Sven Schaub, Senior IT Security Consultant
Sven is Senior IT Security Consultant at TEMET AG and working on multiple security related engagements in different industries and for the Swiss eHealth initiative.
He brings in expertise in architecting IT infrastructure solutions and service management processes. In addition he is also an ITIL trainer and project management lecturer.