{"id":1620,"date":"2015-05-24T15:22:01","date_gmt":"2015-05-24T13:22:01","guid":{"rendered":"http:\/\/www.zerberos.com\/?p=501"},"modified":"2015-05-24T15:22:01","modified_gmt":"2015-05-24T13:22:01","slug":"isc2-securezuerich-conference-2015","status":"publish","type":"post","link":"https:\/\/www.netsolution.ch\/en\/2015\/05\/isc2-securezuerich-conference-2015\/","title":{"rendered":"(ISC)2 SecureZ\u00fcrich Conference 2015"},"content":{"rendered":"<p>Zerberos hat an der SecureZ\u00fcrich Conference 2015 in D\u00fcbendorf teilgenommen.<\/p>\n<p>Interessante Begegnungen und Vortr\u00e4ge haben zu einem gelungenen Tag beigetragen.<\/p>\n<ul>\n<li><strong>Keynote Address: Changing Approach to Security: A Pro-active Approach to the Adversary<br \/>\nTracy Varnum <\/strong><br \/>\nStrategic Manager, HP Enterprise Security Services, EMEA<\/li>\n<li><strong>S1:\u00a0Secure the Breach &#8211; Face reality as it is, not as it was or as you wish it to be<br \/>\nPius Graf<br \/>\n<\/strong>Regional Director, Gemalto SafeNet<\/li>\n<li><strong>S2: Defending Against Phishing Attacks: Case Studies and Human Defenses<br \/>\nJim Hansen<br \/>\n<\/strong>Executive Vice President, PhishMe<\/li>\n<li><strong>S3: Digital Forensics, from floppies to the Cloud: Can Darwin win the game of digital evolution?<br \/>\nBruno Kerouanton<br \/>\n<\/strong>CISO, Canton and Republic of Jura<\/li>\n<li><strong>S4: IT Security KPIs<br \/>\nMatthias Muhlert<br \/>\n<\/strong>Vice President, UniCredit Bank AG<\/li>\n<li><strong>(ISC)<sup>2<\/sup> Chapter Switzerland and Safe &amp; Secure Online Update<br \/>\nKelly Richdale, <\/strong>Secretary, (ISC)2 Chapter Switzerland<br \/>\n<strong>Eric Vogt, <\/strong>CTO, Leiter Technik, 1solution AG<\/li>\n<li><strong>S5: Global Workforce Study 2015<br \/>\nR\u00fcdiger Rissmann<br \/>\n<\/strong>President, (ISC)<sup>2<\/sup> Chapter Switzerland<\/li>\n<li><strong>S6: The Hunt for Patient Zero<br \/>\nSarah Swatman<br \/>\n<\/strong>Principal Consultant, Guidance Software<\/li>\n<li><strong>S7: The Impact of Industry 4.0 on Risk Analytics<br \/>\nDr. Ralf Mock <\/strong><br \/>\nLecturer, Zurich University of Applied Sciences ZHAW\/Institute of Applied Information Technology InIT<\/li>\n<li><strong>S8: Legal Aspects of IT-Security<br \/>\nProf. Ursula Sury<\/strong><br \/>\nProfessor and Lawyer, Die Advokatur Sury AG<\/li>\n<li><strong>Panel Discussion: &#8220;Today&#8217;s Hot Topics and Burning Questions&#8221;<br \/>\nModerator: Kelly Richdale<br \/>\nPanelists: Tracy Varnum, Sarah Swatman, Bruno Kerouanton and Prof. Ursula Sury<\/strong><\/li>\n<\/ul>\n<p>Gerne sind wir auch 2016 wieder dabei!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zerberos hat an der SecureZ\u00fcrich Conference 2015 in D\u00fcbendorf teilgenommen. Interessante Begegnungen und Vortr\u00e4ge haben zu einem gelungenen Tag beigetragen. Keynote Address: Changing Approach to Security: A Pro-active Approach to the Adversary Tracy Varnum Strategic Manager, HP Enterprise Security Services, EMEA S1:\u00a0Secure the Breach &#8211; Face reality as it is, not as it was or &#8230; <a title=\"(ISC)2 SecureZ\u00fcrich Conference 2015\" class=\"read-more\" href=\"https:\/\/www.netsolution.ch\/en\/2015\/05\/isc2-securezuerich-conference-2015\/\" aria-label=\"Read more about (ISC)2 SecureZ\u00fcrich Conference 2015\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","rank_math_focus_keyword":"","rank_math_title":"","rank_math_description":"","rank_math_robots":null,"rank_math_canonical_url":"","rank_math_primary_category":"","footnotes":""},"categories":[35],"tags":[],"class_list":["post-1620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"wpadmin","author_link":"https:\/\/www.netsolution.ch\/en\/author\/wpadmin\/"},"uagb_comment_info":0,"uagb_excerpt":"Zerberos hat an der SecureZ\u00fcrich Conference 2015 in D\u00fcbendorf teilgenommen. Interessante Begegnungen und Vortr\u00e4ge haben zu einem gelungenen Tag beigetragen. Keynote Address: Changing Approach to Security: A Pro-active Approach to the Adversary Tracy Varnum Strategic Manager, HP Enterprise Security Services, EMEA S1:\u00a0Secure the Breach &#8211; Face reality as it is, not as it was or&hellip;","_links":{"self":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/posts\/1620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/comments?post=1620"}],"version-history":[{"count":0,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/posts\/1620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/media?parent=1620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/categories?post=1620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/tags?post=1620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}