...
Wednesday May 3rd | ||
---|---|---|
13.30 | Welcome and introductions | Alf Moens (GÉANT ) and Rolf Sture Normann (SIKT) |
14.00 | Current Risk and Threat landscape
| David Heed (SUNET) |
15.30 | NIS2: state of affairs and how to prepare The Security Union will keep us busy in the coming years: NIS2, CER, CRA and the uncertainty about the way they will be implemented in every member state and affiliate states. One thing is certain: There will hardly be any surprises for the security requirements. Prepare for NIS2 with the GÉANT Security baseline and pick your choice of international security standards. NIS2 Directive Requirements https://wiki.geant.org/display/GWP8/NIS2+Directive+Requirements NIS 2 vs GDPR https://wiki.geant.org/display/GWP8/NIS+2+Directive+vs+GDPR BS vs S7 vs CIS https://wiki.geant.org/display/GWP8/Security+Baseline%2C+S7+Framework+and+CIS | Šarūnas Gigaliūnas (LITNET) and Vladislav Bidikov (MARnet) (online) |
17.00 | Summary of the day; evening programme | Alf Moens (GÉANT ) and Rolf Sture Normann (SIKT) |
Thursday May 4rd4th | ||
9.00 | Welcome and Coffee | |
9.30 | Security Intelligence Operations Roderick will talk with you about "Sharing agreements for Cyber Threat Intelligence" | Roderick Mooi (GÉANT), ... |
10.30 | "Successful Security Operations" Security operations should be an essential part of any organization's cyber defense. But making them work efficiently and effectively is a hard challenge. This talk shares operating models and lessons learned from over 20 years running successful security operations ourselves and helping others in their design and set up. It covers the relationships between detection and response, the importance of prevention, different ways to leverage threat intelligence and threat hunting, and how to shape constructive collaboration with IT and management. | online presentation by Christo Butcher (Fox IT/NCC group) |
11.30 | AI - Security Observations: CHATgpt | Asbjørn Thorsen (CISO, SIKT) |
12.30 | Summary, lunch and farewells |
...