Archive

Index of Talks

This page provides an index of talks that were held during previous iterations of Swiss Cyber Storm.

Event
Part
Track
Speakers
Title
Slides
Video
SCS2025ConferenceArenaDr. Christian FoliniOpening Ceremony
SCS2025ConferenceArenaMark BarwinskiOpening Keynote: Between Headlines and Incidents: Keeping Mission and Morale Aligned Slides Video
SCS2025ConferenceArenaMarc Bollhalder, Manuel BürgeSwiss Hacking Challenge Slides Video
SCS2025ConferenceArenaCharlie EdwardsThe Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure Slides Video
SCS2025ConferenceArenaCamino KavanaghAchieving Depth: Subsea Cables as Critical Infrastructure
SCS2025ConferenceArenaAram HovsepyanYour Security Dashboard is Lying to You: The Science of Metrics Slides Video
SCS2025ConferenceArenaPatrick MillerResilience for Electric Grids – Containment, Control, and Survival in Critical Infrastructure
SCS2025ConferenceArenaTomas KokolevskyResilience When U.S. Laws Turn Cloud Providers Into a Threat Slides Video
SCS2025ConferenceArenaRoman HüssyOdysee in Cyberspace – Cases from the Interweb Slides Video
SCS2025ConferenceArenaMichael HausdingThe DNS as National Critical Infrastructure in an Era of Geopolitical Tensions Slides Video
SCS2025ConferenceArenaArrigo TriulziClosing Keynote: It Depends... Fireside Tales from Incident Response
SCS2025ConferenceScenarioProf. Dr. Adrian PerrigSCION: A Next-generation Internet for Next-generation Security. IETF Update and Everyday Use Cases Slides Video
SCS2025ConferenceScenarioAlessandro De CarliFrom Cloud-First to Self-Sovereign: E-ID and the Future of Enterprise Identity Infrastructure Video
SCS2025ConferenceScenarioMarina BochenkovaFrom Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities Slides Video
SCS2025ConferenceScenarioOlle E. JohanssonThe SBOM and the Software Security Regulation Revolution Video
SCS2025ConferenceScenarioPanos VlachosCyber Peace in a Mad World Slides Video
SCS2025ConferenceScenarioVerena ZimmermannBetter Together? – on the Resilience of Human-technology Teams Slides Video
SCS2025ConferenceScenarioCarlos IshimaruGhost in the RaaS: Ransomware-as-a-Service from the Perspective of an Affiliate
SCS2025ConferencePanorama – SponsoringArthur VuagniauxDetect and Adapt: Building Resilience Through Cloud Detection Slides Video
SCS2025ConferencePanorama – SponsoringChristian BernaskoEthics vs. The Reality of Cybercrime. How Vulnerabilities Are Exploited and Ransomware Strikes Video
SCS2025ConferencePanorama – SponsoringAngelo ViolettiNext-Gen IR: Swisscom’s Framework for Microsoft 365 Slides Video
SCS2025ConferencePanorama – SponsoringDavid Fridrih, Dario WeissInitial Access Reloaded – Perimeter Breaches Beyond the Mainstream Slides Video
SCS2025ConferencePanorama – SponsoringGregor WegbergMotivate and Prepare for Cyber Crises Slides Video
SCS2025ConferencePanorama – SponsoringMoritz ZollingerKeeping Pace: How to Integrate Security Requirements into Fast-Moving IT Slides Video
SCS2025ConferencePanorama – SponsoringAlain MowatWyse Management Subversion: Taking over Dell's Wyse Management Suite Slides Video
SCS2025AI VillageAare Foyer – Stand 1Prof. Dr. Ariane Trammell, Maurice AmonTowards an AI-based Security Consultant for SMEs Slides
SCS2025AI VillageAare Foyer – Stand 2Dr. Nicolas BadouxNo App No Problem: Learning and Fuzzing Library Usage Automatically Slides
SCS2025AI VillageAare Foyer – Stand 3Paul BagourdLeveraging Graph Neural Network for Predicting Emerging Technologies: Use Case with Quantum Computing
SCS2025AI VillageAare Foyer – Stand 4Tomas Joaquin AndereggTechRank: A Graph-Based Framework for Identifying High-Growth Emerging Tech Companies Slides
SCS2025AI VillageAare Foyer – Stand 5Dr. Anastasiia KucherenkoMapping LLM Training Data for Safety and Explainability: Approach of Low Perplexity Slides
SCS2025AI VillageAare Foyer – Stand 6Dr. Elena NazarenkoLong-Text Classification: A Practical Alternative to LLMs Slides
SCS2025AI VillageAare Foyer – Stand 7Alexander SternfeldTypePilot: Securing LLM-Generated Code with the Scala Type System
SCS2025AI VillageAare Foyer – Stand 8Dr. Loic Marechal, Dr. Sébastien RouaultSwissCyber Initiative: Mapping the Swiss Cybersecurity Landscape Slides
SCS2025CISO SummitPanorama 5Prof. Dr. Bernhard HämmerliCISO Summit
SCS2024ConferenceArenaDr. Christian FoliniOpening Ceremony
SCS2024ConferenceArenaDaniel MiesslerOpening Keynote: How to Run Your Security Program with AI Before Someone Else Does Slides Video
SCS2024ConferenceArenaMarc Bollhalder, Manuel BürgeSwiss Hacking Challenge Slides Video
SCS2024ConferenceArenaRuben SantamartaWhen Physics Meets (Reverse) Engineering: Understanding Cyber-Physical Attacks Against Nuclear Reactors Slides Video
SCS2024ConferenceArenaLukasz OlejnikAI and Technology Powered Propaganda and Disinformation Operations
SCS2024ConferenceArenaMaya Bundt, Fabian WilliAn Insider Perspective on Cyber Insurance – Yes or No? Slides Video
SCS2024ConferenceArenaEva WolfangelWhen Chatbots Talk Too Much: The Risks and Rewards of AI Manipulation Slides Video
SCS2024ConferenceArenaKathrin GrosseTowards More Practical Threat Models in Artificial Intelligence Security
SCS2024ConferenceArenaAllyn StottThe Fault in Our Metrics. Rethinking How We Measure Detection & Response Slides Video
SCS2024ConferenceArenaVíctor Mayoral VilchesCybersecurity AIs: From PentestGPT to Building an AI-Powered Robot Immune System Slides Video
SCS2024ConferenceArenaJohn Graham-CummingClosing Keynote: Lessons from Using Machine Learning for Active Defense Over 20 Years
SCS2024ConferenceScenarioDavid RosenthalHow to Talk AI to Your Lawyers Slides Video
SCS2024ConferenceScenarioEmanuel Seemann(Un-)Natural Language Processing: Defensive AI in Practice Slides Video
SCS2024ConferenceScenarioMonica AmgwerdLaw Beats Code: Enforcing a Legal Base for a Safe and Human-Centric AI Slides Video
SCS2024ConferenceScenarioIda HameeteOvercoming Resistance with Purpose-Driven Security. A Lesson in Practical Socio-Dynamics Slides Video
SCS2024ConferenceScenarioMatt TesauroHacking And Defending APIs: Red And Blue Make Purple Slides Video
SCS2024ConferenceScenarioCornelia PuhzeHuman-Centred Security Meets AI: How to Navigate New Threats Slides Video
SCS2024ConferenceScenarioBonnie ViteriGrowing a Security Champion Program Into a Security Powerhouse Slides Video
SCS2024ConferencePanorama – SponsoringRaphael RufBreach & Attack Simulation - Continuous Security Validation (incl. live demo) Slides Video
SCS2024ConferencePanorama – SponsoringSandro BachmannArtificial Intelligence and Cybersecurity: A New Era of Defense Video
SCS2024ConferencePanorama – SponsoringGregor WegbergDon’t Forget the Human Video
SCS2024ConferencePanorama – SponsoringJulien ObersonModern TPM Sniffing and Multi-Factor Authentication
SCS2024ConferencePanorama – SponsoringMichael Landolt, Umberto Annino“How much does my CEO earn?” – Avoid Data Security Pitfalls in the Era of AI Video
SCS2024ConferencePanorama – SponsoringBruno BlumenthalAI Compliance Essentials: Standards and Emerging Regulations Slides Video
SCS2024CISO SummitPanorama 5Prof. Dr. Bernhard HämmerliCISO Summit
SCS2023ConferenceArenaDr. Christian FoliniOpening Ceremony
SCS2023ConferenceArenaEva GalperinOpening Keynote: Risky Business: Some High-Risk Users You May Not Have Thought of and How to Protect Them Slides Video
SCS2023ConferenceArenaDavid JacobySponsor Keynote: Client based attacks in a hybrid cloud environment
SCS2023ConferenceArenaChristina LekatiSocial Engineering: Targeting Key Individuals, Profiling, and Weaponizing Psychology Slides Video
SCS2023ConferenceArenaJoe SlowikConverging Behaviors Across Threat Actors Slides Video
SCS2023ConferenceArenaJoseph Da SilvaTeacher, enforcer, soothsayer, scapegoat: the life of the CISO
SCS2023ConferenceArenaMauro VerderosaBeyond Classical MFA: Reinforcing Systems in an Evolving Digital Landscape Slides Video
SCS2023ConferenceArenaSheila A. BertaTurning the Tables: Honeypots Flawed Logic and Counter-Intelligence Slides Video
SCS2023ConferenceArenaStefan LüdersHelp! I Have Data Center Nightmares Slides Video
SCS2023ConferenceArenaStefan SoesantoMaking sense of data dumps and data leaks in times of war and peace Slides Video
SCS2023ConferenceArenaYanya ViskovichClosing Keynote: The Human OS: U Can't Tech This Slides Video
SCS2023ConferenceScenarioOmer AkgulBug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem Video
SCS2023ConferenceScenarioChristine BejerascoSecure-by-Design: How do you Design with a Security Mindset for the User? Slides Video
SCS2023ConferenceScenarioAlexandra ArniCyber Resilience on the Swiss Financial Center – the Swiss FS-CSC Slides Video
SCS2023ConferenceScenarioTim BlazytkoUnveiling Malicious Behavior in Unknown Binaries Slides Video
SCS2023ConferenceScenarioEdzo BotjesHow to deal with the inevitable chaos of the cloud: on humans and reality. Slides Video
SCS2023ConferenceScenarioEdwin FoudilNavigating The Coordinated Vulnerability Disclosure Landscape Slides Video
SCS2023ConferenceScenarioRaphael SchaffoHow to Run a Great Security Champion Program Slides Video
SCS2023ConferencePanorama – SponsoringGregor WegbergOur supplier has been hit! What do we do now? Slides Video
SCS2023ConferencePanorama – SponsoringHans-Peter WaldeggerHow adaptive is the CAT? Slides Video
SCS2023ConferencePanorama – SponsoringJörg Jungblut, Markus GüntherOne size fits all was yesterday - efficient awareness made @SBB Slides Video
SCS2023ConferencePanorama – SponsoringMario BischofTell me what you use and I will tell you who you are! Slides Video
SCS2023ConferencePanorama – SponsoringFelix AeppliNavigating the Perils: The Precarious Depths of Device Code Phishing in Azure AD Video
SCS2023ConferencePanorama – SponsoringAngelo ViolettiResilience Rising: Countering the Threat Actors Behind Black Basta Ransomware Slides Video
SCS2023ConferencePanorama – SponsoringRobert RolleFrom Data Center Centric To Data Centric - Stories from companies that got resilient the hard way Slides Video
SCS2023CISO SummitPanorama 5Prof. Dr. Bernhard HämmerliCISO Summit
SCS2022ConferenceArenaDr. Christian FoliniOpening Ceremony
SCS2022ConferenceArenaJoseph CarsonOpening Keynote: Unlocking Digital Identities – The Journey and Path to a Digital Society Slides Video
SCS2022ConferenceArenaSandro NafzgerThe Swiss Ecosystem for Vulnerability Management and Public Trust Slides Video
SCS2022ConferenceArenaBrandon ValerianoThe Missing Cyber Storm: Russian Cyber Operations During the Russo-Ukrainian War Slides Video
SCS2022ConferenceArenaSven FassbenderMeineImpfungen, the Organ Donor Register and the NTC – a Carte Blanche
SCS2022ConferenceArenaIppolito ForniRansomware as Smokescreen for Nation State Sponsored Cyber Operations Slides Video
SCS2022ConferenceArenaNikos KarapanosHello passkeys! Goodbye passwords Slides Video
SCS2022ConferenceArenaCarmela TroncosoDigital Identities and the Role of Privacy Engineering Slides Video
SCS2022ConferenceArenaDr. Marisa TschoppIn AI We Trust?
SCS2022ConferenceArenaDagmawi MulugetaDetecting Cloud Command and Control Slides Video
SCS2022ConferenceArenaJaya BalooClosing Keynote: Cyber Security and Quantum Readiness
SCS2022ConferenceScenarioWill PearceMachine Learning and the Optimization of Virtual Personae for Phishing Scams Slides Video
SCS2022ConferenceScenarioAna FerreiraSecuring the Digital "Who's" in Healthcare Slides Video
SCS2022ConferenceScenarioEddi BlenkersA short introduction to Memory Forensics Slides Video
SCS2022ConferenceScenarioKrzysztof SwaczyńskiProtecting Advanced Metering Infrastructure Slides Video
SCS2022ConferenceScenarioWout DebaenstDon't Blame the User! Stop the Phish Before it is even Sent
SCS2022ConferenceScenarioMarkus ThüringSwiss IT Desasters and What They Teach Us Slides Video
SCS2022ConferenceScenarioDave LewisID and DNA: Don‘t You Know Who I Think I Am?
SCS2022ConferencePanorama – SponsoringStephan BergerThe Seven Deadly Sins Slides Video
SCS2022ConferencePanorama – SponsoringGregor WegbergWhat You Can Learn from Cyber Incidents to Improve Your Resilience Slides Video
SCS2022ConferencePanorama – SponsoringChristian Das NevesHuman n’ Machine - Leveraging Automated Tool To Enhance Manual Analysis Video
SCS2022ConferencePanorama – SponsoringBruno BlumenthalAgile Use Case Development With MITRE ATT&CK Slides Video
SCS2022ConferencePanorama – SponsoringYves PellatonHow Secure Is Your Environment? Hacker’s Perspectives ... Slides Video
SCS2022ConferencePanorama – SponsoringDavid GugelmannFuture-proof Network Detection and Response for Holistic Visibility into Enterprise Networks
SCS2022ConferencePanorama – SponsoringThomas Kurth, Christoph DüggeliEmerging Threats - Turning from the Hunter to the Hunted
SCS2022ConferenceLibrarySimon KindhauserInterview: Meet /mnt/ain
SCS2022CISO SummitPanorama 5Prof. Dr. Bernhard HämmerliCISO Summit
SCS2021ConferenceArenaDr. Christian FoliniOpening Ceremony
SCS2021ConferenceArenaWendy NatherOpening Keynote: Securing the Supply Chain Without Drowning in the Data Slides Video
SCS2021ConferenceArenaSandro NafzgerSponsor Keynote: Security through Vulnerability in a connected World Slides Video
SCS2021ConferenceArenaNadim KobeissiPrivate Devices No Longer Private: The Broader Implications of Apple's Content Scanning Push Slides Video
SCS2021ConferenceArenaPhilippe de RyckPatterns and anti-patterns in software development Slides Video
SCS2021ConferenceArenaJarrod OversonState of the art credential stuffing Slides Video
SCS2021ConferenceArenaChris KubeckaWhen they attacked the supply chain of a nuclear power plant Slides Video
SCS2021ConferenceArenaPhilipp AmannInternational cooperation and the Europol Joint Cybercrime Action Taskforce (J-CAT) Slides Video
SCS2021ConferenceArenaSerge DrozICT4Peace and the quest for norms and rules in interstate cyber conflicts Slides Video
SCS2021ConferenceArenaDr. Ksenia PegueroImpact of Frameworks on Security of JavaScript applications Slides Video
SCS2021ConferenceArenaDr.-Ing. Mario HeiderichClosing Keynote Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Florian HartmannLiving Cybersecurity - Understanding and Defending against the Unknown Unknowns Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Yves BieriSuppliers! Resist Phishing, Implement FIDO2 Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Stephan BergerRansomware in Switzerland and around the world: insights, facts and findings Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Fabian GonzalezAssessing and Securing Third-Party Maintenance Accessi Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Dr. Alex Rhomberg, Giampaolo TrentaAccess management turned around Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Rolf HeftiSecurity Automation: Reduce workload und speed up your incident response Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Florian BadertscherTales and Vulnerabilities from our Bug Bounty Adventures Slides Video
SCS2021ConferenceScenario 1 (Sponsors)Anthony Schneiter, Miro HallerClimbing the Hacking /mnt/ain Slides Video
SCS2021ConferenceScenario 2Trey HerrShades of crisis across an insecure software supply chain Slides Video
SCS2021ConferenceScenario 2Kavya PearlmanA primer on security and safety in eXtended / Augmented Reality environments (XR)i Slides Video
SCS2021ConferenceScenario 2Patrick DwyerHow a Software Bill of Materials is a key factor when securing the supply chain Slides Video
SCS2021ConferenceScenario 2Désirée Sacher-BoldewinHow to Integrate Continuous Improvement in Daily SOC Operations - Focus Point: Integrity and Configuration Compliance Monitoring Slides Video
SCS2021ConferenceScenario 2Dr.-Ing. Mario HeiderichMXSS in 2021 - One Long Solved Problem? Slides Video
SCS2021ConferenceScenario 2Marina KrotofilAttack Surface of Supply Chain: Exploiting Software Architecture Design of Industrial Controllers Slides Video
SCS2021ConferenceScenario 2Merry Ember MouHow Zoom is Building End-to-End Encryption Slides Video
SCS2021CISO SummitPanorama 5Prof. Dr. Bernhard HämmerliCISO Summit
SCS2021SCS in a NutshellKursaal BernDr. Christian Folini, Tobias Ospelt, Raphaël ArrouasSCS in a Nutshell with Tobias Ospelt and Raphaël Arrouas Video
SCS2021SCS in a NutshellKursaal BernDr. Christian Folini, Thomas Süssli, Myriam Dunn CaveltySCS in a Nutshell with Thomas Süssli Myriam Dunn Cavelty Video
SCS2021SCS in a NutshellKursaal BernDr. Christian Folini, Jean-Philippe Aumasson, Jonas WagnerSCS in a Nutshell with Jean-Philippe Aumasson and Jonas Wagner Video
SCS2020SCS in a NutshellEPFLDr. Christian Folini, Florian Schutz, Edouard BugnionSCS in a Nutshell with Florian Schütz and Edouard Bugnion Video
SCS2019ConferenceMain Track / Tech TrackDr. Bernhard Tellenbach, Dr. Christian FoliniOpening Ceremony
SCS2019ConferenceMain Track / Tech TrackDave LewisEmbracing the Hackers: Opening Keynote by Gattaca Video
SCS2019ConferenceMain Track / Tech TrackCatherine ChapmanPaying hackers to break into your business (and improve security) with bug bounties
SCS2019ConferenceMain Track / Tech TrackSarah Jamie LewisHow Not to Secure Your E-Voting system Video
SCS2019ConferenceMain Track / Tech TrackTobias OspeltFuzzying Java Code With the Help of JQF Video
SCS2019ConferenceMain Track / Tech TrackChristian Killer, Melchior LimacherDigital Exposure of Traditional Swiss Voting Channels Video
SCS2019ConferenceMain Track / Tech TrackEnrique SerranoNot Only On Apple: Spying on Android Users Through The Camera Video
SCS2019ConferenceMain Track / Tech TrackNikita StupinAccess control vulnerabilities in GraphQL APIs Video
SCS2019ConferenceMain Track / Tech TrackDr. Melanie RiebackPentesting ChatOps Video
SCS2019ConferenceMain Track / Tech TrackDavid JohanssonThreat Modelling Stories From the Front Line Video
SCS2019ConferenceMain Track / Tech TrackJaya BalooKeynote Closing: 7 Years a CISO: Lessons From the Trenches
SCS2019ConferenceManagement Track / Academy TalksNicoletta della Valle, Sandra SchweingruberAn Exemplary Case of International Financial Fraud
SCS2019ConferenceManagement Track / Academy TalksNicole BecherA Primer on Cyber Insurance and Insight Into Zurich vs. Mondelez Video
SCS2019ConferenceManagement Track / Academy TalksDaniel VotipkaHackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes Video
SCS2019ConferenceManagement Track / Academy TalksPeter HladkýIntelligence-Driven Red Teaming
SCS2019ConferenceManagement Track / Academy TalksMichael HausdingDNS Wars Video
SCS2019ConferenceManagement Track / Academy TalksMarcel ZumbühlTowards Customer Trust
SCS2019ConferenceManagement Track / Academy TalksProf. Dr. Endre Bangerter, Prof. Dr. Bruce NikkelRecent Initiatives in Research and Education Video
SCS2019ConferenceManagement Track / Academy TalksMalte KushnirYes We Scan! Automating Application Security Video
SCS2019ConferenceSponsoring TrackJan AlsenzHacking Smart Meters - Introduction and access to G3-PLC
SCS2019ConferenceSponsoring TrackMichel de CrevoisierFacing the challenge of Windows logs collection to leverage valuable IOCs
SCS2019ConferenceSponsoring TrackLucas PhilippeFrom Bug Bounty to Big Bounty
SCS2019ConferenceSponsoring TrackShiri BandHow CISOs Gain Trust in the Boardroom
SCS2019ConferenceSponsoring TrackBruno BlumenthalIn our SOC we Trust
SCS2019ConferenceSponsoring TrackCyrill BannwartMalware Attacks on Smartphones
SCS2019ConferenceSponsoring TrackBen MathisDDoS Protection: Choosing the Right Solution
SCS2019ConferenceFoyerDr. Christian Folini, Sarah Jamie Lewis, Dave LewisFireside Chat with Sarah Jamie Lewis and Dave Lewis
SCS2019CISO SummitPanorama 5Prof. Dr. Bernhard HämmerliCISO Summit
SCS2018ConferenceMain Track / Tech TrackDr. Bernhard Tellenbach, Dr. Christian FoliniOpening Ceremony
SCS2018ConferenceMain Track / Tech TrackCory DoctorowOpening Keynote: Trust as a Base for All Things Security
SCS2018ConferenceMain Track / Tech TrackFranck BraunstedterSponsoring Keynote: Make Your Cloud Faster, Cheaper and More Secure with a Fully Automated Cloud Environment! Slides
SCS2018ConferenceMain Track / Tech TrackNick SullivanThe Evolving Architecture of the Web and Its Impact on Security
SCS2018ConferenceMain Track / Tech TrackGrzegorz MilkaAnatomy of an Account Takeover – And How We Build Up Trust Again Slides
SCS2018ConferenceMain Track / Tech TrackOliver SimonnetWhat Does It Take to Steal $81m? Slides
SCS2018ConferenceMain Track / Tech TrackLilly RyanPractical Facial Recognition or How to Disappear Completely Slides
SCS2018ConferenceMain Track / Tech TrackAstha SinghalEmbracing DevOps as a Security Professional Slides
SCS2018ConferenceMain Track / Tech TrackKatherine JarmulDeep Learning Blindspots
SCS2018ConferenceMain Track / Tech TrackMark BurgessTrust and Microservices - The Scaling of True and False Slides
SCS2018ConferenceMain Track / Tech TrackIvan RistićPurpose-Driven Design in Computer Security: My SSL Labs Journey Slides
SCS2018ConferenceMain Track / Tech TrackMarie MoeA History of my Heart - How Can I Trust the Code Inside of Me?
SCS2018ConferenceManagement Track / Academy TalksRobert RogenmoserHow I Ended Up as a Producer of Trustworthy Hardware in Switzerland Slides
SCS2018ConferenceManagement Track / Academy TalksLydie NogolHow Communication Can Make or Break Your Cyber Security Program Slides
SCS2018ConferenceManagement Track / Academy TalksOliver SpycherTrust in E-Voting Slides
SCS2018ConferenceManagement Track / Academy TalksNicolas Vernaz5 months later: Is GDPR a Means to Bring Back Trust to Online Privacy? Slides
SCS2018ConferenceManagement Track / Academy TalksMoonbeom ParkA South Korean Perspective on North Korean Cyber Attacks
SCS2018ConferenceManagement Track / Academy TalksJérémy MatosMan in the Contacts - Where Trust in Secure Messenger Leads to Spear Phishing Slides
SCS2018ConferenceManagement Track / Academy TalksRoger KnoepfelCybercrime Cases
SCS2018ConferenceManagement Track / Academy TalksProf. Dr. Emmanuel BenoistDarknet Markets Observatory
SCS2018ConferenceManagement Track / Academy TalksDr. Bernhard TellenbachHow to Phish – How Does the Perfect Embedded Training Look Like?
SCS2018ConferenceSponsoring TrackMathias FrankInternet of Babies – an IoT Security Study
SCS2018ConferenceSponsoring TrackStefan MardakHow Companies Proactively Protect Themselves from DNS Attacks
SCS2018ConferenceSponsoring TrackDamian PfammatterHidden Inbox Rules in Microsoft Exchange... Or How to Permanently Steal Your Messages
SCS2018ConferenceSponsoring TrackRick El-DarwishPenetration Testing: an old practice with new objectives
SCS2018ConferenceSponsoring TrackUrs RuferHow to Combine Machine Learning with Expertise of Security Analysts to Enhance SOC Performance
SCS2018ConferenceSponsoring TrackTobias EllenbergerThe 3 Most Important Aspects of (Non-)Successful Incident Response
SCS2018ConferenceSponsoring TrackStéphane AdamisteStreamlining the security and privacy aspects in IT projects using threat modelling
SCS2018ConferenceSponsoring TrackKris McConkeyEvolving Cyber Threats Detection and Response
SCS2017ConferenceAuditoriumDr. Bernhard Tellenbach, Dr. Christian FoliniOpening Ceremony: Welcome - Infos about the program and the rooms
SCS2017ConferenceAuditoriumPaul VixieKeynote 1
SCS2017ConferenceAuditoriumAldo Frick, Harald ReisingerKeynote 2: Transforming a Cyber Defense Center into a Value Proposition
SCS2017ConferenceAuditoriumDeviant OllamPhysical Access Control Slides
SCS2017ConferenceAuditoriumDhia MahjoubBehaviours and Patterns of Bullet Proof Hosters
SCS2017ConferenceAuditoriumJos WetzelsIndustrial Control System / IoT Security Slides
SCS2017ConferenceAuditoriumDr. Raphael ReischukThe SCION Project
SCS2017ConferenceAuditoriumAntonio Barresi, Matthias GanzModern Memory Corruption Exploit Mitigations Slides
SCS2017ConferenceAuditoriumClément GuittonAttribution Slides
SCS2017ConferenceAuditoriumBryan FordE-Voting Focus - Introduction to E-Voting with a Focus on Switzerland Slides
SCS2017ConferenceAuditoriumJordi PuiggalíE-Voting Focus - The E-Voting Offering of Swiss Post Slides
SCS2017ConferenceAuditoriumThomas HoferE-Voting Focus - The E-Voting Offering of the State of Geneva Slides
SCS2017ConferenceTerrassensaalTanya JancaPushing Left like a Boss Slides
SCS2017ConferenceTerrassensaalStefan LüdersIoT and Corporate IT Security Slides
SCS2017ConferenceTerrassensaalTarah WheelerFintech and Digital Transformation
SCS2017ConferenceTerrassensaalAnthony VanceUsable Security from a Neuroscience Perspective Slides
SCS2017ConferenceTerrassensaalDaniela OliveiraSusceptibility of C-Level Management to Spear Phishing Slides
SCS2017ConferenceSpeakers’ CornerMario BischofPhishing - there's life in the old dog yet
SCS2017ConferenceSpeakers’ CornerCyrill BrunschwilerHacking bIOTech Slides
SCS2017ConferenceSpeakers’ CornerMiro LjubicicWhy Cyber Security Should Never Be an Afterthought
Copyright © 2025
 
Swiss Cyber Storm
Hosting graciously provided for free by Nine