ConferencesI spoke at numerous conferences, like Blackhat, FIRST, Defcon, ISF, and the like around the world.All Talks 34 conference or invited talks Talk (EN) BIC | Key Drivers of Cyber Security BIC | Key Drivers of Cyber Security - any lessons from history? Talk (EN) DFS | Cyber Threats in Aviation - Any lessons from history? DFS | What are the cyber threats and defenses for the aviation industry in the digital age? What are the lessons we can draw from other industries or history Talk (EN) SCTT | Security and integrity of the supply chain (IoT, Smart-X) SCTT | Swiss Cyber Think Tank - Security and integrity of the supply chain (IoT, Smart-X) Talk (EN) Dankse Bank | Cyber Security - Keeping pace with cyber security in the digital age Danske Bank| Cyber Security - Keeping pace with cyber security in the digital age Talk (EN) METAS | Key Drivers Behind Cyber Security METAS | Key Drivers Behind Cyber Security / Eidgenössisches Institut für Metrologie METAS Talk (EN) DSHK | Cyber Security – Key drivers and no crash-test dummies DSHK | Cyber Security – Key drivers and no crash-test dummies Talk (EN) vCockpit | Cyber Threats in Aviation VCockpit | Cyber Threats in Aviation Talk (EN) SCOR | Cyber- Risk and Insurability – Are we prepared SCOR | Panel and workshop on cyber- risk and Insurability Talk (EN) ISF | Supply Chain Integrity & Trust ISF | Supply Chain Security & Integrity Talk (EN) ISD | Supply Chain Integrity and Trust ISD | Supply Chain Integrity and Trust Talk (EN) FHP | Cyber Threats & Aviation - Any Lessons from other Industries? FHP | Cyber Threats & Aviation - Any Lessons from other Industries? Talk (EN) BSides | The Known Unknowns & Outbidding Cyber Criminals BSides | The Known Unknowns & Outbidding Cyber Criminals Talk (EN) ISSS | The Known Unknowns & Outbidding Cyber Criminals ISSS | The Known Unknowns & Outbidding Cyber Criminals Talk (EN) Area41 | International Vulnerability Purchase Program Area41 | What would it mean and cost to outbid cyber criminals? Talk (EN) ISF | Defense Evasion Modeling – Fault correlation and bypassing the cyber kill chain ISF | Defense Evasion Modeling – Fault correlation and bypassing the cyber kill chain Talk (EN) ISSS | Defense Evasion Modelling ISSS | Defense Evasion Modelling Talk (EN) BSI | Cybercrime Kill Chain vs. Defense Effectiveness BSI | Cybercrime Kill Chain vs. Defense Effectiveness Talk (EN) RSA | Vulnerability Threat Trends RSA | Vulnerability Threat Trends Talk (EN) RSA | Cybercrime Kill Chain RSA | Cybercrime Kill Chain Talk (EN) BlackHat | Cybercrime Kill Chain vs. Defense Effectiveness BlackHat | Cybercrime Kill Chain Vs. Effectiveness Of Defense Layers Talk (EN) ISF | Cybercrime Kill Chain vs. Defense Effectiveness ISF | Cybercrime Kill Chain vs. Defense Effectiveness Talk (EN) ESP | The Dynamics and Threats of End-Point Software Portfolios ESP | The Dynamics and Threats of End-Point Software Portfolios Talk (EN) FIRST | The Dynamics and Threats of End-Point Software Portfolios FIRST | The Dynamics and Threats of End-Point Software Portfolios Talk (EN) SCS | Fixing the Fundamental Failures of End-Point Security SCS | Fixing the Fundamental Failures of End-Point Security Talk (EN) RSA | Fundamental Failures of End-Point Security RSA | Fundamental Failures of End-Point Security Talk (EN) eCrime | Fixing the fundamental failures of endpoint security eCrime | Fixing the fundamental failures of endpoint security Talk (EN) MIS | Fundamental Failures of End-Point Security MIS | Fundamental Failures of End-Point Security Talk (EN) SCMAG | The Fundamental Failures of End-Point Security SCMAG | The Fundamental Failures of End-Point Security Talk (EN) eCrime | e-Crime & Cybersecurity Congress eCrime | e-Crime & Cybersecurity Congress Talk (EN) StaPo | Internetkriminalität StaPo | Internetkriminalität Talk (EN) SwissSign | SwissSign-Event: «Sicherheit in der digitalen Welt» SwissSign-Event: «Sicherheit in der digitalen Welt», Sep 18th, 2008, Zurich Talk (EN) FIRST | Putting Private And Government CERT’s To The Test FIRST | We monitored for more than 18 months the world’s top security advisory providers. Talk (EN) Blackhat | 0-Day-Patch Exposure Blackhat | We introduce the 0-day patch rate as metric to measure the evolution of the security ecosystem and the performance of software vendors to protect their customers. Talk (EN) Blackhat | Analysis of the Speed of Security vs. Insecurity Blackhat | In the research, we examined how vulnerabilities are handled in large-scale by analyzing 80,000+ security advisories published since 1995
Talk (EN) BIC | Key Drivers of Cyber Security BIC | Key Drivers of Cyber Security - any lessons from history?
Talk (EN) DFS | Cyber Threats in Aviation - Any lessons from history? DFS | What are the cyber threats and defenses for the aviation industry in the digital age? What are the lessons we can draw from other industries or history
Talk (EN) SCTT | Security and integrity of the supply chain (IoT, Smart-X) SCTT | Swiss Cyber Think Tank - Security and integrity of the supply chain (IoT, Smart-X)
Talk (EN) Dankse Bank | Cyber Security - Keeping pace with cyber security in the digital age Danske Bank| Cyber Security - Keeping pace with cyber security in the digital age
Talk (EN) METAS | Key Drivers Behind Cyber Security METAS | Key Drivers Behind Cyber Security / Eidgenössisches Institut für Metrologie METAS
Talk (EN) DSHK | Cyber Security – Key drivers and no crash-test dummies DSHK | Cyber Security – Key drivers and no crash-test dummies
Talk (EN) SCOR | Cyber- Risk and Insurability – Are we prepared SCOR | Panel and workshop on cyber- risk and Insurability
Talk (EN) FHP | Cyber Threats & Aviation - Any Lessons from other Industries? FHP | Cyber Threats & Aviation - Any Lessons from other Industries?
Talk (EN) BSides | The Known Unknowns & Outbidding Cyber Criminals BSides | The Known Unknowns & Outbidding Cyber Criminals
Talk (EN) ISSS | The Known Unknowns & Outbidding Cyber Criminals ISSS | The Known Unknowns & Outbidding Cyber Criminals
Talk (EN) Area41 | International Vulnerability Purchase Program Area41 | What would it mean and cost to outbid cyber criminals?
Talk (EN) ISF | Defense Evasion Modeling – Fault correlation and bypassing the cyber kill chain ISF | Defense Evasion Modeling – Fault correlation and bypassing the cyber kill chain
Talk (EN) BSI | Cybercrime Kill Chain vs. Defense Effectiveness BSI | Cybercrime Kill Chain vs. Defense Effectiveness
Talk (EN) BlackHat | Cybercrime Kill Chain vs. Defense Effectiveness BlackHat | Cybercrime Kill Chain Vs. Effectiveness Of Defense Layers
Talk (EN) ISF | Cybercrime Kill Chain vs. Defense Effectiveness ISF | Cybercrime Kill Chain vs. Defense Effectiveness
Talk (EN) ESP | The Dynamics and Threats of End-Point Software Portfolios ESP | The Dynamics and Threats of End-Point Software Portfolios
Talk (EN) FIRST | The Dynamics and Threats of End-Point Software Portfolios FIRST | The Dynamics and Threats of End-Point Software Portfolios
Talk (EN) SCS | Fixing the Fundamental Failures of End-Point Security SCS | Fixing the Fundamental Failures of End-Point Security
Talk (EN) RSA | Fundamental Failures of End-Point Security RSA | Fundamental Failures of End-Point Security
Talk (EN) eCrime | Fixing the fundamental failures of endpoint security eCrime | Fixing the fundamental failures of endpoint security
Talk (EN) MIS | Fundamental Failures of End-Point Security MIS | Fundamental Failures of End-Point Security
Talk (EN) SCMAG | The Fundamental Failures of End-Point Security SCMAG | The Fundamental Failures of End-Point Security
Talk (EN) SwissSign | SwissSign-Event: «Sicherheit in der digitalen Welt» SwissSign-Event: «Sicherheit in der digitalen Welt», Sep 18th, 2008, Zurich
Talk (EN) FIRST | Putting Private And Government CERT’s To The Test FIRST | We monitored for more than 18 months the world’s top security advisory providers.
Talk (EN) Blackhat | 0-Day-Patch Exposure Blackhat | We introduce the 0-day patch rate as metric to measure the evolution of the security ecosystem and the performance of software vendors to protect their customers.
Talk (EN) Blackhat | Analysis of the Speed of Security vs. Insecurity Blackhat | In the research, we examined how vulnerabilities are handled in large-scale by analyzing 80,000+ security advisories published since 1995