AGENDA

 

PART I - 10 June 2021

14:00

TEAM

OPENING 

Welcome and introduction by the Women in Cyber Team.

14:15

Monica Ratte

National Cyber Security Center (NCSC)

EN

The (real) skills to have to work in IT security

When you start to work in IT security you think that the most needed competences are technical skills: do I know this protocol, does it have known vulnerabilities, do I understand how they work, which are the mitigation possibilities,… And then, reality strikes! In this talk, I will present you my journey towards my current role as Federal Commissioner for IT Security and the competences that are important today to work in IT security.

In particular, I will share with you many reality checks that I had since starting working at the Federal government eight years ago. And for those of you without an IT background, don’t worry, you will see that for you too there are exciting opportunities in the IT security field.

Laura Mati, Ramona Traber, Ursina Livers

Deloitte

EN

How to help businesses becoming cyber resilient – a cyber strategy toolkit

TBD Ever wondered how to build a cyber security strategy from scratch? Want to see how it is done? Join us to discover the essential ingredients and phases to build up a cyber security strategy. We will provide you with some theory and run you through a real-life, practical case we solved with one of our clients. At the end of this brief session you will have a better understanding of how things like threat landscape, talent, capabilities, etc. all come together and play an essential role in shaping a cyber strategy to keep a company more secure and make it more cyber resilient.

14:45

Dr. Myriam Dunn Cavelty

Center for Security Studies (ETH)

EN

Cyber Security Politics: successfully combining technical and political knowledge

The great thing about cyber security is its interdisciplinarity: there are countless areas in academia, the private and the public sector in which expertise at the intersection between cyber and another issue is both needed and valued. However, the hard thing about cyber security is also its interdisciplinarity: how much do we need to know about technologies, how much about other issue areas? Myriam Dunn Cavelty will share her experience from twenty years of research, teaching and policy consulting, highlighting how the field of cyber security has changed over the years, and where the main opportunities and challenges lie now and in the future.

Barbara Flaad

SWITCH

 

EN

Cybersecurity and Mindfulness

You will get a short introduction into mindfulness and how meditation will help you stay safe and sane in the crazy cybersecurity world. Mindfulness meditation can be described as a practice of paying attention in the present moment. Being aware of the present means also being more aware of possible cyber-security threats.

Criminal hackers count on us not paying attention. Phishing mails, fraudulent web shops or documents are built as such that they seem legit on a first glimpse. A closer look would reveal the signs of fraud, but we're busy and distracted most of the time. Paying attention to the moment and what we do, would prevent many of those attacks. Mindfulness not only helps in the fight against cybersecurity. It is also a method for personal stress reduction and improved physical well-being.

15:30

Dr. Maya Bundt

Swiss Re

Simone Frömming

Microsoft

EN

50 Shades of Cyber

There is no one way to make a difference in cyber space. In fact, there are thousands. Roles in cyber (-risk management, -security, -defense, -policy development, -research, -technology, …) require diverse skills and experiences. In order to bring this diversity to the forefront, we are bringing 5 real examples, portraits of 5 real women, who have made their way into a cyber role within the world's leading technology company and the world's leading reinsurer. Diversity is powerful!

Susanne Emonet

Kudelski

 

EN

IoT Security  – why YOU should care; A few delightful examples that will change your view on IoT 

IoT Security - why YOU should care? The answer is fabulously simple: Because you are directly affected by it. At work, at home, traveling…

So I would love to invite you for a few minutes to join me in my world of IoT security, share some insightful examples from different environments and make YOU care…and hopefully discover how YOU can make a difference to make our world a little more secure and sustainable.

16:00

Myla Pilao

Trend Micro

EN

CYBERSECURITY can save lives too -  Protecting the Connected

Today, we are up against faceless, nameless adversaries who have the capacity to destabilize organization’s cyber security but we also face a decade long problem of cyber skills talent shortage. If remain unsolved this renders organizations big or small unprepared to win this cyber challenge. 

So I begin to question whether what we have today is a skills gap problem or we have underrepresentation problem. Today’s cyber security industry has a gender problem a huge contributor of that is the absence of women in this in this field. Together, let us examine how we can humanize cyber security and understand the power it has to create a world that this not just bigger, better but safer . In this session we will learn :

  • Culture of Inclusion – Discover your untapped potentials and learn what skills you need to develop as cyber professional  to navigate in today’s and tomorrow’s cyber security workforce dynamics 

  • Diversity is  Necessity  -  Understand how diversity is crucial to the future of cybersecurity and what women can bring to the equation to recognize and  endorse the notion that shifting gender norms benefits everyone.

  • Changing Face of Cyber Security -  Connectivity has the power to enrich industries, economies and companies but it is not without risks as digital threats are multiplying. Learn exciting security research projects and how you can be part of the workforce that will shift the gears.

Elcin Biren

UBS

EN

Cyber Security in the DNA of Women

The shortage of Cybersecurity talent is a pressing issue, with a demand remarkably bigger than the supply. The lack of diversity actually makes the process of security an organization harder than it should be.

To encourage more women to get into the field of Cyber-Security as Elcin believes women are hard-coded by birth with the necessary skill sets - making them great Cyber Security executives. The challenge is to reveal their inner natural-born security skills.
In this session, she talks about the workforce shortage in the cybersecurity industry, her personal journey in the field, and how women can stay engaged, and, therefore, get hired.

16:30

Viola Amherd

Federal Councilor & Head of the Department of Defence

 

Q&A

Ueli Amsler, CISO

Ruth van der Zypen-Millard, Public Affairs and Training manager

GER/EN

Why the Swiss Armed Forces play an important role in cyberspace

(Video message)

Did you know that ICT and cyber play a central role in the Swiss Armed Forces? Did you also know that the Swiss Armed Forces have their own robust and independent connection network that is being continuously expanded? In her video message, Viola Amherd tells us why the army needs this independent network, why today an army remains a necessity and how Switzerland's neutrality is maintained in cyberspace as well. In order to counter today's diffuse threat scenarios, the Swiss Armed Forces need capabilities that are coordinated and perfectly harmonized with each other.

Women in the cyber domain are a personal concern for Viola Amherd. In fact, security is also female and the potential of women in ICT is enormous. The Swiss Armed Forces are always on the lookout for the best cyber talents, either in uniform or in civilian clothes.

 

 

PART II - 11 Nov 2021

14:00

TEAM

OPENING 

Welcome and introduction by the Women in Cyber Team.

14:15

Lisa Schauss

SAF

EN

Cybersecurity & Women in Military

Muriel Mathis

Néstle

EN

Are your opinions really your own? How underground services are influencing your views

In 2017, Collins Dictionary designed “Fake News” as the Word of the Year. Over the past few years, we have gotten used to hearing the term and we’ve all certainly spotted examples on our social media feeds. But in today’s world, where information can be shared with a simple click around the globe, we are surrounded by misinformation and conspiracy theories. So, are you sure you know exactly what is real and what is not? And are your opinions really your own, or are you being manipulated?
 
Manipulation of the public’s opinion is not new, in fact history has shown that new disruptive ways of communication have accelerated the spread of misinformation and propaganda. For each new communication method, society has defined norms and customs over time – except for the internet. This invites malicious actors to take advantage of it to manipulate public opinion, and that means big business. We’ll talk through a number of underground services to demonstrate how misinformation has become an industry and what techniques are used. And we’ll look at different examples from misinformation on different scales used in politics, how criminals have made massive gains through the spread of false facts at the expense of companies losing money and their reputation. And we’ll look at how deep fakes are making it even more difficult to define what is real and what is not

14:45

Monique Morrow

Syniverse Technologies

EN

Why Trust is Foundational in Our Cybersecurity World

We do not have to look far in history or in the present to explore the abuses technology abuses and the demand for ethics. We have all seen this picture before and know very well that trust is foundational to the way we communicate and operate socially. When self -governance is no longer viable due to some form of greed, who decides and how? Have we become immune to data breaches and the misuse of our own data?
There is a correlation between privacy, data abuse and you owning your data. Imagine that possibility! In the end, when trust is broken, we are broken and the call to action is to collectively fix it. The promise of Self Sovereign Identity or SSI may be a step forward. It is not too late.
There are three themes I will discuss in this talk:
1. Patterns of Technological Abuse
2. Why They Matter and the promise of Self Sovereign Identity
3. A snapshot of the VETRI Foundation

Carola Hug

Exeon Analytics

 

EN

Detecting Hidden Cyber Threats

A talk with various examples on cyber attacks which haven’t been detected in due time and an illustration how machine learning and big data could help find those attacks). Followed by a brief live hacking.

15:30

Maryam Zayat

FEDPOL

EN

TBD

TBD

Solange Ghernaouti

University of Lausanne

 

EN

Emerging Trends in Cybersecurity: Issues and Challenges in Capacity Building, Research, Practices and Career Development 

TBD

16:00

Eva Schönleitner

ABB

Sandra Tobler

Futurae

Lajla Aganovic

Swisscom

EN

Collaborative Innovation Between Startups and Corporates in the Cyber Space

16:30

Chelsey Slack
NATO

EN

TBD

TBD