Speakers at the Command Control 2020
Here you can see the first speakers we have selected for you.
“Digital security and privacy in an interconnected ecosystem”
As “CISO on demand” Magda Chelly, Ph.D., CISSP spends most of her time supporting chief information security officers in their cyber security strategy and roadmap. The Singapore based Cyber Security Evangelist holds a Masters degree in Telecommunication Engineering and is seen as a Cyberfeminist in the industry. With her technical background and experience from various worldwide projects she’s able to support companies with a 360 degrees view on cybersecurity.
Magda is fascinated by the human aspect of cybersecurity, diversity and cultural influences on privacy and security. She has been awarded Top 10 cybersecurity experts to follow on Twitter in 2018 as well as Top 17 Cybersecurity Influencers in 2018 worldwide.
Look forward to Magda Chelly's keynote on cybersecurity—challenges for businesses and how to ensure that they are cyber ready and cyberresilient.
“Active Cyber Defence with the human sensor: Leveraging users as the strongest link in security operations against social engineering threats”
Dr. Ryan Heartfield received his BSc degree in computer systems and completed a PhD in cybersecurity focusing on semantic social engineering attacks in computer systems in 2017. He is one of the leading researcher at the University of Greenwich involved in multiple UK and EU Horizon2020 research projects in cybersecurity, ranging from the security of autonomous vehicles, measuring the trustworthiness of human sensor platforms, as well as studying cyber threats and the emotional impact of security breaches in smart home environments.
In his keynote on “Active Cyber Defence with the human sensor: Leveraging users as the strongest link in security operations against social engineering threats” he will also share latest insights from the Horizon2020 project ACCEPT in which he is eamining new innovations by exploring the “feedback-loop” of user threat detection. Whilst the bulk of conclusions have been made from academic studies, his experiments made were empirical outside of usual lab environments and conducted with users real working and technology environments. In that sense, the benefits for the Command Control attendees is taking away insights that apply practically in industry. The objective is here to provide a set of key principles for how organizations can leverage the methodologies.
“Trust on the inside—Mitigating the insider threat”
Dr. Edith Huber is head of the department for research and international affairs at one of the leading universities in Austria. Together with Bettina Pospisil, she will offer a workshop on the subject of “Cybercrime In-House perpetrators” on an exclusive basis and will present her latest research from extensive case—analyzes of in-sider attacks of recent years, reconstruct the typical course of events as well discuss targeted Awareness and Resilience activities with you.
As an expert in cybercrime, legal and criminal sociology, Edith Huber has 10 years of research experience in the field of security research, continues to work as a reviewer for the European Commission for Security Research Programs and is a member of the German Association of Criminologists.
“Cyber-Security Neu Denken – Cyber-Resilienz verlangt ein neues Mindset”
Viktor Mayer-Schönberger is Professor of Internet Governance and Regulation at the Oxford Internet Institute. The studied lawyer, futurologist and author of over a dozen books focuses his research on BigData, digital economy, as well as institutions and governance in the data age.
In his current project, he is researching the determinants of individual cybersecurity behavior: Why many people know what is right but behave differently. He also believes that there can be no100 percent cyber security, but that more resilient structures are urgently needed.
Listen to his entertaining, inspiring keynote on the necessary mindshift in companies and learn what resilience has in common with judo!
“Beyond the Security Looking Glass”
Jimmy Sanders is Head of Information Security at Netflix and President of the San Francisco Chapter of ISSA, an international not-for-profit organization of IT security experts and practitioners. The security professional says about himself: “Essentially, I design, implement, and operationalize security infrastructures.” This self-portrait does not adequately describe his day-to-day work at one of the world's largest streaming providers—trust, mutual support and resilient structures play an important role here.
At Command Control, he will speak in his keynote about Security by Design and how AI and automation can help build a neural security network that is both customizable and proactive.
Be curious about the essential insights of the person who ensures the business continuity of your favorite series!
“Trust in Technology”
Dominik Schiener is co-founder and CEO of IOTA, a novel cryptocurrency that focuses on secure communication and payment between two machines on the Internet of Things, which is not based on a blockchain.
As in some TV appearances, he will also provide the Command Control attendees with his vision for the IOTA project in a vivid and understandable manner, giving them a business-oriented insight into the impressive tangle technology.
The partnership with Jaguar Land Rover, which was signed in April 2019, is just the beginning of his plans for the IOTA project—look forward to seeing exciting new use cases from the real use of the cryptocurrency in his keynote address. Discuss with him in the attached panel about future uses and opportunities.
John A. Wheeler
“Ask the Expert: Why Integrated Risk Management Is Critical for Enterprise Risk Management Success”
John A. Wheeler is an absolute expert in the area of integrated risk management. As the Global Research Leader for Risk Management Technology at Gartner he is a Thought Leader on digital risk management, vendor risk management, business continuity management, audit management and corporate compliance. With over 28 years of professional experience in a variety of executive management, financial operations, risk management and information technology leadership roles, Mr. Wheeler is a recognized expert on the effective use of risk management practices in large, complex organizations, as well as medium-sized businesses. For his achievements as VP & Risk Officer within the Corporate Risk Management division at a major U.S. financial services company he got awarded as “Top 40 Finance Executives under 40”. In his blog, he regularly provides impulses on the subject of GRC vs. Integrated Risk Management—you can look forward to his latest insights and best practices on our mainstage and learn how risk management can be implemented cost effectively and agile.
Secure your early-bird ticket now
Those who book earlier have more to enjoy—and will be rewarded with special early bird prices.