| SCS2025 | Conference | Arena | Dr. Christian Folini | Opening Ceremony | | |
| SCS2025 | Conference | Arena | Mark Barwinski | Opening Keynote: Between Headlines and Incidents: Keeping Mission and Morale Aligned |
Slides |
Video |
| SCS2025 | Conference | Arena | Marc Bollhalder,
Manuel Bürge | Swiss Hacking Challenge |
Slides |
Video |
| SCS2025 | Conference | Arena | Charlie Edwards | The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure |
Slides |
Video |
| SCS2025 | Conference | Arena | Camino Kavanagh | Achieving Depth: Subsea Cables as Critical Infrastructure | | |
| SCS2025 | Conference | Arena | Aram Hovsepyan | Your Security Dashboard is Lying to You: The Science of Metrics |
Slides |
Video |
| SCS2025 | Conference | Arena | Patrick Miller | Resilience for Electric Grids – Containment, Control, and Survival in Critical Infrastructure | | |
| SCS2025 | Conference | Arena | Tomas Kokolevsky | Resilience When U.S. Laws Turn Cloud Providers Into a Threat |
Slides |
Video |
| SCS2025 | Conference | Arena | Roman Hüssy | Odysee in Cyberspace – Cases from the Interweb |
Slides |
Video |
| SCS2025 | Conference | Arena | Michael Hausding | The DNS as National Critical Infrastructure in an Era of Geopolitical Tensions |
Slides |
Video |
| SCS2025 | Conference | Arena | Arrigo Triulzi | Closing Keynote: It Depends... Fireside Tales from Incident Response | | |
| SCS2025 | Conference | Scenario | Prof. Dr. Adrian Perrig | SCION: A Next-generation Internet for Next-generation Security. IETF Update and Everyday Use Cases |
Slides |
Video |
| SCS2025 | Conference | Scenario | Alessandro De Carli | From Cloud-First to Self-Sovereign: E-ID and the Future of Enterprise Identity Infrastructure | |
Video |
| SCS2025 | Conference | Scenario | Marina Bochenkova | From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities |
Slides |
Video |
| SCS2025 | Conference | Scenario | Olle E. Johansson | The SBOM and the Software Security Regulation Revolution | |
Video |
| SCS2025 | Conference | Scenario | Panos Vlachos | Cyber Peace in a Mad World |
Slides |
Video |
| SCS2025 | Conference | Scenario | Verena Zimmermann | Better Together? – on the Resilience of Human-technology Teams |
Slides |
Video |
| SCS2025 | Conference | Scenario | Carlos Ishimaru | Ghost in the RaaS: Ransomware-as-a-Service from the Perspective of an Affiliate | | |
| SCS2025 | Conference | Panorama – Sponsoring | Arthur Vuagniaux | Detect and Adapt: Building Resilience Through Cloud Detection |
Slides |
Video |
| SCS2025 | Conference | Panorama – Sponsoring | Christian Bernasko | Ethics vs. The Reality of Cybercrime. How Vulnerabilities Are Exploited and Ransomware Strikes | |
Video |
| SCS2025 | Conference | Panorama – Sponsoring | Angelo Violetti | Next-Gen IR: Swisscom’s Framework for Microsoft 365 |
Slides |
Video |
| SCS2025 | Conference | Panorama – Sponsoring | David Fridrih,
Dario Weiss | Initial Access Reloaded – Perimeter Breaches Beyond the Mainstream |
Slides |
Video |
| SCS2025 | Conference | Panorama – Sponsoring | Gregor Wegberg | Motivate and Prepare for Cyber Crises |
Slides |
Video |
| SCS2025 | Conference | Panorama – Sponsoring | Moritz Zollinger | Keeping Pace: How to Integrate Security Requirements into Fast-Moving IT |
Slides |
Video |
| SCS2025 | Conference | Panorama – Sponsoring | Alain Mowat | Wyse Management Subversion: Taking over Dell's Wyse Management Suite |
Slides |
Video |
| SCS2025 | AI Village | Aare Foyer – Stand 1 | Prof. Dr. Ariane Trammell,
Maurice Amon | Towards an AI-based Security Consultant for SMEs |
Slides | |
| SCS2025 | AI Village | Aare Foyer – Stand 2 | Dr. Nicolas Badoux | No App No Problem: Learning and Fuzzing Library Usage Automatically |
Slides | |
| SCS2025 | AI Village | Aare Foyer – Stand 3 | Paul Bagourd | Leveraging Graph Neural Network for Predicting Emerging Technologies: Use Case with Quantum Computing | | |
| SCS2025 | AI Village | Aare Foyer – Stand 4 | Tomas Joaquin Anderegg | TechRank: A Graph-Based Framework for Identifying High-Growth Emerging Tech Companies |
Slides | |
| SCS2025 | AI Village | Aare Foyer – Stand 5 | Dr. Anastasiia Kucherenko | Mapping LLM Training Data for Safety and Explainability: Approach of Low Perplexity |
Slides | |
| SCS2025 | AI Village | Aare Foyer – Stand 6 | Dr. Elena Nazarenko | Long-Text Classification: A Practical Alternative to LLMs |
Slides | |
| SCS2025 | AI Village | Aare Foyer – Stand 7 | Alexander Sternfeld | TypePilot: Securing LLM-Generated Code with the Scala Type System | | |
| SCS2025 | AI Village | Aare Foyer – Stand 8 | Dr. Loic Marechal,
Dr. Sébastien Rouault | SwissCyber Initiative: Mapping the Swiss Cybersecurity Landscape |
Slides | |
| SCS2025 | CISO Summit | Panorama 5 | Prof. Dr. Bernhard Hämmerli | CISO Summit | | |
| SCS2024 | Conference | Arena | Dr. Christian Folini | Opening Ceremony | | |
| SCS2024 | Conference | Arena | Daniel Miessler | Opening Keynote: How to Run Your Security Program with AI Before Someone Else Does |
Slides |
Video |
| SCS2024 | Conference | Arena | Marc Bollhalder,
Manuel Bürge | Swiss Hacking Challenge |
Slides |
Video |
| SCS2024 | Conference | Arena | Ruben Santamarta | When Physics Meets (Reverse) Engineering: Understanding Cyber-Physical Attacks Against Nuclear Reactors |
Slides |
Video |
| SCS2024 | Conference | Arena | Lukasz Olejnik | AI and Technology Powered Propaganda and Disinformation Operations | | |
| SCS2024 | Conference | Arena | Maya Bundt,
Fabian Willi | An Insider Perspective on Cyber Insurance – Yes or No? |
Slides |
Video |
| SCS2024 | Conference | Arena | Eva Wolfangel | When Chatbots Talk Too Much: The Risks and Rewards of AI Manipulation |
Slides |
Video |
| SCS2024 | Conference | Arena | Kathrin Grosse | Towards More Practical Threat Models in Artificial Intelligence Security | | |
| SCS2024 | Conference | Arena | Allyn Stott | The Fault in Our Metrics. Rethinking How We Measure Detection & Response |
Slides |
Video |
| SCS2024 | Conference | Arena | Víctor Mayoral Vilches | Cybersecurity AIs: From PentestGPT to Building an AI-Powered Robot Immune System |
Slides |
Video |
| SCS2024 | Conference | Arena | John Graham-Cumming | Closing Keynote: Lessons from Using Machine Learning for Active Defense Over 20 Years | | |
| SCS2024 | Conference | Scenario | David Rosenthal | How to Talk AI to Your Lawyers |
Slides |
Video |
| SCS2024 | Conference | Scenario | Emanuel Seemann | (Un-)Natural Language Processing: Defensive AI in Practice |
Slides |
Video |
| SCS2024 | Conference | Scenario | Monica Amgwerd | Law Beats Code: Enforcing a Legal Base for a Safe and Human-Centric AI |
Slides |
Video |
| SCS2024 | Conference | Scenario | Ida Hameete | Overcoming Resistance with Purpose-Driven Security. A Lesson in Practical Socio-Dynamics |
Slides |
Video |
| SCS2024 | Conference | Scenario | Matt Tesauro | Hacking And Defending APIs: Red And Blue Make Purple |
Slides |
Video |
| SCS2024 | Conference | Scenario | Cornelia Puhze | Human-Centred Security Meets AI: How to Navigate New Threats |
Slides |
Video |
| SCS2024 | Conference | Scenario | Bonnie Viteri | Growing a Security Champion Program Into a Security Powerhouse |
Slides |
Video |
| SCS2024 | Conference | Panorama – Sponsoring | Raphael Ruf | Breach & Attack Simulation - Continuous Security Validation (incl. live demo) |
Slides |
Video |
| SCS2024 | Conference | Panorama – Sponsoring | Sandro Bachmann | Artificial Intelligence and Cybersecurity: A New Era of Defense | |
Video |
| SCS2024 | Conference | Panorama – Sponsoring | Gregor Wegberg | Don’t Forget the Human | |
Video |
| SCS2024 | Conference | Panorama – Sponsoring | Julien Oberson | Modern TPM Sniffing and Multi-Factor Authentication | | |
| SCS2024 | Conference | Panorama – Sponsoring | Michael Landolt,
Umberto Annino | “How much does my CEO earn?” – Avoid Data Security Pitfalls in the Era of AI | |
Video |
| SCS2024 | Conference | Panorama – Sponsoring | Bruno Blumenthal | AI Compliance Essentials: Standards and Emerging Regulations |
Slides |
Video |
| SCS2024 | CISO Summit | Panorama 5 | Prof. Dr. Bernhard Hämmerli | CISO Summit | | |
| SCS2023 | Conference | Arena | Dr. Christian Folini | Opening Ceremony | | |
| SCS2023 | Conference | Arena | Eva Galperin | Opening Keynote: Risky Business: Some High-Risk Users You May Not Have Thought of and How to Protect Them |
Slides |
Video |
| SCS2023 | Conference | Arena | David Jacoby | Sponsor Keynote: Client based attacks in a hybrid cloud environment | | |
| SCS2023 | Conference | Arena | Christina Lekati | Social Engineering: Targeting Key Individuals, Profiling, and Weaponizing Psychology |
Slides |
Video |
| SCS2023 | Conference | Arena | Joe Slowik | Converging Behaviors Across Threat Actors |
Slides |
Video |
| SCS2023 | Conference | Arena | Joseph Da Silva | Teacher, enforcer, soothsayer, scapegoat: the life of the CISO | | |
| SCS2023 | Conference | Arena | Mauro Verderosa | Beyond Classical MFA: Reinforcing Systems in an Evolving Digital Landscape |
Slides |
Video |
| SCS2023 | Conference | Arena | Sheila A. Berta | Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence |
Slides |
Video |
| SCS2023 | Conference | Arena | Stefan Lüders | Help! I Have Data Center Nightmares |
Slides |
Video |
| SCS2023 | Conference | Arena | Stefan Soesanto | Making sense of data dumps and data leaks in times of war and peace |
Slides |
Video |
| SCS2023 | Conference | Arena | Yanya Viskovich | Closing Keynote: The Human OS: U Can't Tech This |
Slides |
Video |
| SCS2023 | Conference | Scenario | Omer Akgul | Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | |
Video |
| SCS2023 | Conference | Scenario | Christine Bejerasco | Secure-by-Design: How do you Design with a Security Mindset for the User? |
Slides |
Video |
| SCS2023 | Conference | Scenario | Alexandra Arni | Cyber Resilience on the Swiss Financial Center – the Swiss FS-CSC |
Slides |
Video |
| SCS2023 | Conference | Scenario | Tim Blazytko | Unveiling Malicious Behavior in Unknown Binaries |
Slides |
Video |
| SCS2023 | Conference | Scenario | Edzo Botjes | How to deal with the inevitable chaos of the cloud: on humans and reality. |
Slides |
Video |
| SCS2023 | Conference | Scenario | Edwin Foudil | Navigating The Coordinated Vulnerability Disclosure Landscape |
Slides |
Video |
| SCS2023 | Conference | Scenario | Raphael Schaffo | How to Run a Great Security Champion Program |
Slides |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Gregor Wegberg | Our supplier has been hit! What do we do now? |
Slides |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Hans-Peter Waldegger | How adaptive is the CAT? |
Slides |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Jörg Jungblut,
Markus Günther | One size fits all was yesterday - efficient awareness made @SBB |
Slides |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Mario Bischof | Tell me what you use and I will tell you who you are! |
Slides |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Felix Aeppli | Navigating the Perils: The Precarious Depths of Device Code Phishing in Azure AD | |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Angelo Violetti | Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware |
Slides |
Video |
| SCS2023 | Conference | Panorama – Sponsoring | Robert Rolle | From Data Center Centric To Data Centric - Stories from companies that got resilient the hard way |
Slides |
Video |
| SCS2023 | CISO Summit | Panorama 5 | Prof. Dr. Bernhard Hämmerli | CISO Summit | | |
| SCS2022 | Conference | Arena | Dr. Christian Folini | Opening Ceremony | | |
| SCS2022 | Conference | Arena | Joseph Carson | Opening Keynote: Unlocking Digital Identities – The Journey and Path to a Digital Society |
Slides |
Video |
| SCS2022 | Conference | Arena | Sandro Nafzger | The Swiss Ecosystem for Vulnerability Management and Public Trust |
Slides |
Video |
| SCS2022 | Conference | Arena | Brandon Valeriano | The Missing Cyber Storm: Russian Cyber Operations During the Russo-Ukrainian War |
Slides |
Video |
| SCS2022 | Conference | Arena | Sven Fassbender | MeineImpfungen, the Organ Donor Register and the NTC – a Carte Blanche | | |
| SCS2022 | Conference | Arena | Ippolito Forni | Ransomware as Smokescreen for Nation State Sponsored Cyber Operations |
Slides |
Video |
| SCS2022 | Conference | Arena | Nikos Karapanos | Hello passkeys! Goodbye passwords |
Slides |
Video |
| SCS2022 | Conference | Arena | Carmela Troncoso | Digital Identities and the Role of Privacy Engineering |
Slides |
Video |
| SCS2022 | Conference | Arena | Dr. Marisa Tschopp | In AI We Trust? | | |
| SCS2022 | Conference | Arena | Dagmawi Mulugeta | Detecting Cloud Command and Control |
Slides |
Video |
| SCS2022 | Conference | Arena | Jaya Baloo | Closing Keynote: Cyber Security and Quantum Readiness | | |
| SCS2022 | Conference | Scenario | Will Pearce | Machine Learning and the Optimization of Virtual Personae for Phishing Scams |
Slides |
Video |
| SCS2022 | Conference | Scenario | Ana Ferreira | Securing the Digital "Who's" in Healthcare |
Slides |
Video |
| SCS2022 | Conference | Scenario | Eddi Blenkers | A short introduction to Memory Forensics |
Slides |
Video |
| SCS2022 | Conference | Scenario | Krzysztof Swaczyński | Protecting Advanced Metering Infrastructure |
Slides |
Video |
| SCS2022 | Conference | Scenario | Wout Debaenst | Don't Blame the User! Stop the Phish Before it is even Sent | | |
| SCS2022 | Conference | Scenario | Markus Thüring | Swiss IT Desasters and What They Teach Us |
Slides |
Video |
| SCS2022 | Conference | Scenario | Dave Lewis | ID and DNA: Don‘t You Know Who I Think I Am? | | |
| SCS2022 | Conference | Panorama – Sponsoring | Stephan Berger | The Seven Deadly Sins |
Slides |
Video |
| SCS2022 | Conference | Panorama – Sponsoring | Gregor Wegberg | What You Can Learn from Cyber Incidents to Improve Your Resilience |
Slides |
Video |
| SCS2022 | Conference | Panorama – Sponsoring | Christian Das Neves | Human n’ Machine - Leveraging Automated Tool To Enhance Manual Analysis | |
Video |
| SCS2022 | Conference | Panorama – Sponsoring | Bruno Blumenthal | Agile Use Case Development With MITRE ATT&CK |
Slides |
Video |
| SCS2022 | Conference | Panorama – Sponsoring | Yves Pellaton | How Secure Is Your Environment? Hacker’s Perspectives ... |
Slides |
Video |
| SCS2022 | Conference | Panorama – Sponsoring | David Gugelmann | Future-proof Network Detection and Response for Holistic Visibility into Enterprise Networks | | |
| SCS2022 | Conference | Panorama – Sponsoring | Thomas Kurth,
Christoph Düggeli | Emerging Threats - Turning from the Hunter to the Hunted | | |
| SCS2022 | Conference | Library | Simon Kindhauser | Interview: Meet /mnt/ain | | |
| SCS2022 | CISO Summit | Panorama 5 | Prof. Dr. Bernhard Hämmerli | CISO Summit | | |
| SCS2021 | Conference | Arena | Dr. Christian Folini | Opening Ceremony | | |
| SCS2021 | Conference | Arena | Wendy Nather | Opening Keynote: Securing the Supply Chain Without Drowning in the Data |
Slides |
Video |
| SCS2021 | Conference | Arena | Sandro Nafzger | Sponsor Keynote: Security through Vulnerability in a connected World |
Slides |
Video |
| SCS2021 | Conference | Arena | Nadim Kobeissi | Private Devices No Longer Private: The Broader Implications of Apple's Content Scanning Push |
Slides |
Video |
| SCS2021 | Conference | Arena | Philippe de Ryck | Patterns and anti-patterns in software development |
Slides |
Video |
| SCS2021 | Conference | Arena | Jarrod Overson | State of the art credential stuffing |
Slides |
Video |
| SCS2021 | Conference | Arena | Chris Kubecka | When they attacked the supply chain of a nuclear power plant |
Slides |
Video |
| SCS2021 | Conference | Arena | Philipp Amann | International cooperation and the Europol Joint Cybercrime Action Taskforce (J-CAT) |
Slides |
Video |
| SCS2021 | Conference | Arena | Serge Droz | ICT4Peace and the quest for norms and rules in interstate cyber conflicts |
Slides |
Video |
| SCS2021 | Conference | Arena | Dr. Ksenia Peguero | Impact of Frameworks on Security of JavaScript applications |
Slides |
Video |
| SCS2021 | Conference | Arena | Dr.-Ing. Mario Heiderich | Closing Keynote |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Florian Hartmann | Living Cybersecurity - Understanding and Defending against the Unknown Unknowns |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Yves Bieri | Suppliers! Resist Phishing, Implement FIDO2 |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Stephan Berger | Ransomware in Switzerland and around the world: insights, facts and findings |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Fabian Gonzalez | Assessing and Securing Third-Party Maintenance Accessi |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Dr. Alex Rhomberg,
Giampaolo Trenta | Access management turned around |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Rolf Hefti | Security Automation: Reduce workload und speed up your incident response |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Florian Badertscher | Tales and Vulnerabilities from our Bug Bounty Adventures |
Slides |
Video |
| SCS2021 | Conference | Scenario 1 (Sponsors) | Anthony Schneiter,
Miro Haller | Climbing the Hacking /mnt/ain |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Trey Herr | Shades of crisis across an insecure software supply chain |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Kavya Pearlman | A primer on security and safety in eXtended / Augmented Reality environments (XR)i |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Patrick Dwyer | How a Software Bill of Materials is a key factor when securing the supply chain |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Désirée Sacher-Boldewin | How to Integrate Continuous Improvement in Daily SOC Operations - Focus Point: Integrity and Configuration Compliance Monitoring |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Dr.-Ing. Mario Heiderich | MXSS in 2021 - One Long Solved Problem? |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Marina Krotofil | Attack Surface of Supply Chain: Exploiting Software Architecture Design of Industrial Controllers |
Slides |
Video |
| SCS2021 | Conference | Scenario 2 | Merry Ember Mou | How Zoom is Building End-to-End Encryption |
Slides |
Video |
| SCS2021 | CISO Summit | Panorama 5 | Prof. Dr. Bernhard Hämmerli | CISO Summit | | |
| SCS2021 | SCS in a Nutshell | Kursaal Bern | Dr. Christian Folini,
Tobias Ospelt,
Raphaël Arrouas | SCS in a Nutshell with Tobias Ospelt and Raphaël Arrouas | |
Video |
| SCS2021 | SCS in a Nutshell | Kursaal Bern | Dr. Christian Folini,
Thomas Süssli,
Myriam Dunn Cavelty | SCS in a Nutshell with Thomas Süssli Myriam Dunn Cavelty | |
Video |
| SCS2021 | SCS in a Nutshell | Kursaal Bern | Dr. Christian Folini,
Jean-Philippe Aumasson,
Jonas Wagner | SCS in a Nutshell with Jean-Philippe Aumasson and Jonas Wagner | |
Video |
| SCS2020 | SCS in a Nutshell | EPFL | Dr. Christian Folini,
Florian Schutz,
Edouard Bugnion | SCS in a Nutshell with Florian Schütz and Edouard Bugnion | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Dr. Bernhard Tellenbach,
Dr. Christian Folini | Opening Ceremony | | |
| SCS2019 | Conference | Main Track / Tech Track | Dave Lewis | Embracing the Hackers: Opening Keynote by Gattaca | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Catherine Chapman | Paying hackers to break into your business (and improve security) with bug bounties | | |
| SCS2019 | Conference | Main Track / Tech Track | Sarah Jamie Lewis | How Not to Secure Your E-Voting system | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Tobias Ospelt | Fuzzying Java Code With the Help of JQF | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Christian Killer,
Melchior Limacher | Digital Exposure of Traditional Swiss Voting Channels | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Enrique Serrano | Not Only On Apple: Spying on Android Users Through The Camera | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Nikita Stupin | Access control vulnerabilities in GraphQL APIs | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Dr. Melanie Rieback | Pentesting ChatOps | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | David Johansson | Threat Modelling Stories From the Front Line | |
Video |
| SCS2019 | Conference | Main Track / Tech Track | Jaya Baloo | Keynote Closing: 7 Years a CISO: Lessons From the Trenches | | |
| SCS2019 | Conference | Management Track / Academy Talks | Nicoletta della Valle,
Sandra Schweingruber | An Exemplary Case of International Financial Fraud | | |
| SCS2019 | Conference | Management Track / Academy Talks | Nicole Becher | A Primer on Cyber Insurance and Insight Into Zurich vs. Mondelez | |
Video |
| SCS2019 | Conference | Management Track / Academy Talks | Daniel Votipka | Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes | |
Video |
| SCS2019 | Conference | Management Track / Academy Talks | Peter Hladký | Intelligence-Driven Red Teaming | | |
| SCS2019 | Conference | Management Track / Academy Talks | Michael Hausding | DNS Wars | |
Video |
| SCS2019 | Conference | Management Track / Academy Talks | Marcel Zumbühl | Towards Customer Trust | | |
| SCS2019 | Conference | Management Track / Academy Talks | Prof. Dr. Endre Bangerter,
Prof. Dr. Bruce Nikkel | Recent Initiatives in Research and Education | |
Video |
| SCS2019 | Conference | Management Track / Academy Talks | Malte Kushnir | Yes We Scan! Automating Application Security | |
Video |
| SCS2019 | Conference | Sponsoring Track | Jan Alsenz | Hacking Smart Meters - Introduction and access to G3-PLC | | |
| SCS2019 | Conference | Sponsoring Track | Michel de Crevoisier | Facing the challenge of Windows logs collection to leverage valuable IOCs | | |
| SCS2019 | Conference | Sponsoring Track | Lucas Philippe | From Bug Bounty to Big Bounty | | |
| SCS2019 | Conference | Sponsoring Track | Shiri Band | How CISOs Gain Trust in the Boardroom | | |
| SCS2019 | Conference | Sponsoring Track | Bruno Blumenthal | In our SOC we Trust | | |
| SCS2019 | Conference | Sponsoring Track | Cyrill Bannwart | Malware Attacks on Smartphones | | |
| SCS2019 | Conference | Sponsoring Track | Ben Mathis | DDoS Protection: Choosing the Right Solution | | |
| SCS2019 | Conference | Foyer | Dr. Christian Folini,
Sarah Jamie Lewis,
Dave Lewis | Fireside Chat with Sarah Jamie Lewis and Dave Lewis | | |
| SCS2019 | CISO Summit | Panorama 5 | Prof. Dr. Bernhard Hämmerli | CISO Summit | | |
| SCS2018 | Conference | Main Track / Tech Track | Dr. Bernhard Tellenbach,
Dr. Christian Folini | Opening Ceremony | | |
| SCS2018 | Conference | Main Track / Tech Track | Cory Doctorow | Opening Keynote: Trust as a Base for All Things Security | | |
| SCS2018 | Conference | Main Track / Tech Track | Franck Braunstedter | Sponsoring Keynote: Make Your Cloud Faster, Cheaper and More Secure with a Fully Automated Cloud Environment! |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Nick Sullivan | The Evolving Architecture of the Web and Its Impact on Security | | |
| SCS2018 | Conference | Main Track / Tech Track | Grzegorz Milka | Anatomy of an Account Takeover – And How We Build Up Trust Again |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Oliver Simonnet | What Does It Take to Steal $81m? |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Lilly Ryan | Practical Facial Recognition or How to Disappear Completely |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Astha Singhal | Embracing DevOps as a Security Professional |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Katherine Jarmul | Deep Learning Blindspots | | |
| SCS2018 | Conference | Main Track / Tech Track | Mark Burgess | Trust and Microservices - The Scaling of True and False |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Ivan Ristić | Purpose-Driven Design in Computer Security: My SSL Labs Journey |
Slides | |
| SCS2018 | Conference | Main Track / Tech Track | Marie Moe | A History of my Heart - How Can I Trust the Code Inside of Me? | | |
| SCS2018 | Conference | Management Track / Academy Talks | Robert Rogenmoser | How I Ended Up as a Producer of Trustworthy Hardware in Switzerland |
Slides | |
| SCS2018 | Conference | Management Track / Academy Talks | Lydie Nogol | How Communication Can Make or Break Your Cyber Security Program |
Slides | |
| SCS2018 | Conference | Management Track / Academy Talks | Oliver Spycher | Trust in E-Voting |
Slides | |
| SCS2018 | Conference | Management Track / Academy Talks | Nicolas Vernaz | 5 months later: Is GDPR a Means to Bring Back Trust to Online Privacy? |
Slides | |
| SCS2018 | Conference | Management Track / Academy Talks | Moonbeom Park | A South Korean Perspective on North Korean Cyber Attacks | | |
| SCS2018 | Conference | Management Track / Academy Talks | Jérémy Matos | Man in the Contacts - Where Trust in Secure Messenger Leads to Spear Phishing |
Slides | |
| SCS2018 | Conference | Management Track / Academy Talks | Roger Knoepfel | Cybercrime Cases | | |
| SCS2018 | Conference | Management Track / Academy Talks | Prof. Dr. Emmanuel Benoist | Darknet Markets Observatory | | |
| SCS2018 | Conference | Management Track / Academy Talks | Dr. Bernhard Tellenbach | How to Phish – How Does the Perfect Embedded Training Look Like? | | |
| SCS2018 | Conference | Sponsoring Track | Mathias Frank | Internet of Babies – an IoT Security Study | | |
| SCS2018 | Conference | Sponsoring Track | Stefan Mardak | How Companies Proactively Protect Themselves from DNS Attacks | | |
| SCS2018 | Conference | Sponsoring Track | Damian Pfammatter | Hidden Inbox Rules in Microsoft Exchange... Or How to Permanently Steal Your Messages | | |
| SCS2018 | Conference | Sponsoring Track | Rick El-Darwish | Penetration Testing: an old practice with new objectives | | |
| SCS2018 | Conference | Sponsoring Track | Urs Rufer | How to Combine Machine Learning with Expertise of Security Analysts to Enhance SOC Performance | | |
| SCS2018 | Conference | Sponsoring Track | Tobias Ellenberger | The 3 Most Important Aspects of (Non-)Successful Incident Response | | |
| SCS2018 | Conference | Sponsoring Track | Stéphane Adamiste | Streamlining the security and privacy aspects in IT projects using threat modelling | | |
| SCS2018 | Conference | Sponsoring Track | Kris McConkey | Evolving Cyber Threats Detection and Response | | |
| SCS2017 | Conference | Auditorium | Dr. Bernhard Tellenbach,
Dr. Christian Folini | Opening Ceremony: Welcome - Infos about the program and the rooms | | |
| SCS2017 | Conference | Auditorium | Paul Vixie | Keynote 1 | | |
| SCS2017 | Conference | Auditorium | Aldo Frick,
Harald Reisinger | Keynote 2: Transforming a Cyber Defense Center into a Value Proposition | | |
| SCS2017 | Conference | Auditorium | Deviant Ollam | Physical Access Control |
Slides | |
| SCS2017 | Conference | Auditorium | Dhia Mahjoub | Behaviours and Patterns of Bullet Proof Hosters | | |
| SCS2017 | Conference | Auditorium | Jos Wetzels | Industrial Control System / IoT Security |
Slides | |
| SCS2017 | Conference | Auditorium | Dr. Raphael Reischuk | The SCION Project | | |
| SCS2017 | Conference | Auditorium | Antonio Barresi,
Matthias Ganz | Modern Memory Corruption Exploit Mitigations |
Slides | |
| SCS2017 | Conference | Auditorium | Clément Guitton | Attribution |
Slides | |
| SCS2017 | Conference | Auditorium | Bryan Ford | E-Voting Focus - Introduction to E-Voting with a Focus on Switzerland |
Slides | |
| SCS2017 | Conference | Auditorium | Jordi Puiggalí | E-Voting Focus - The E-Voting Offering of Swiss Post |
Slides | |
| SCS2017 | Conference | Auditorium | Thomas Hofer | E-Voting Focus - The E-Voting Offering of the State of Geneva |
Slides | |
| SCS2017 | Conference | Terrassensaal | Tanya Janca | Pushing Left like a Boss |
Slides | |
| SCS2017 | Conference | Terrassensaal | Stefan Lüders | IoT and Corporate IT Security |
Slides | |
| SCS2017 | Conference | Terrassensaal | Tarah Wheeler | Fintech and Digital Transformation | | |
| SCS2017 | Conference | Terrassensaal | Anthony Vance | Usable Security from a Neuroscience Perspective |
Slides | |
| SCS2017 | Conference | Terrassensaal | Daniela Oliveira | Susceptibility of C-Level Management to Spear Phishing |
Slides | |
| SCS2017 | Conference | Speakers’ Corner | Mario Bischof | Phishing - there's life in the old dog yet | | |
| SCS2017 | Conference | Speakers’ Corner | Cyrill Brunschwiler | Hacking bIOTech |
Slides | |
| SCS2017 | Conference | Speakers’ Corner | Miro Ljubicic | Why Cyber Security Should Never Be an Afterthought | | |