Index of Talks
This page provides an index of talks that were held during previous iterations of Swiss Cyber Storm.
Event
| Part
| Track
| Speakers
| Title
| AI
| Slides
| Video
| |
|---|---|---|---|---|---|---|---|---|
| SCS2026 Event SCS2026 Part Conference Track Talks | Conference Part Conference | Talks Track Talks | Speakers Jeroen van der Ham-de Vos | Title Talk by Jeroen van der Ham-de Vos | ||||
| SCS2026 Event SCS2026 Part Conference Track Talks | Conference Part Conference | Talks Track Talks | Speakers Stephane Adamiste | Title Auditing the Swiss E-Voting System: Lessons Learned from the Field | ||||
| SCS2026 Event SCS2026 Part Conference Track Talks | Conference Part Conference | Talks Track Talks | Speakers Ivano Somaini | Title The Modern Investigator: OSINT in the Age of AI | ||||
| SCS2026 Event SCS2026 Part Conference Track Talks | Conference Part Conference | Talks Track Talks | Speakers Sébastian Schnyder | Title Adversarial uses of AI: a voyage along vibe coded kill chains | ||||
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Mark Barwinski | Title Opening Keynote: Between Headlines and Incidents: Keeping Mission and Morale Aligned | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Marc Bollhalder, Manuel Bürge | Title Swiss Hacking Challenge | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Charlie Edwards | Title The Scale of Russian Sabotage Operations Against Europe’s Critical Infrastructure | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Camino Kavanagh | Title Achieving Depth: Subsea Cables as Critical Infrastructure | ||||
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Aram Hovsepyan | Title Your Security Dashboard is Lying to You: The Science of Metrics | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Patrick Miller | Title Resilience for Electric Grids – Containment, Control, and Survival in Critical Infrastructure | ||||
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Tomas Kokolevsky | Title Resilience When U.S. Laws Turn Cloud Providers Into a Threat | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Roman Hüssy | Title Odysee in Cyberspace – Cases from the Interweb | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Michael Hausding | Title The DNS as National Critical Infrastructure in an Era of Geopolitical Tensions | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Arrigo Triulzi | Title Closing Keynote: It Depends... Fireside Tales from Incident Response | ||||
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Prof. Dr. Adrian Perrig | Title SCION: A Next-generation Internet for Next-generation Security. IETF Update and Everyday Use Cases | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Alessandro De Carli | Title From Cloud-First to Self-Sovereign: E-ID and the Future of Enterprise Identity Infrastructure | Video | Video | ||
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Marina Bochenkova | Title From Buzzword to Battlefield: The Cybersecurity Challenges of Smart Cities | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Olle E. Johansson | Title The SBOM and the Software Security Regulation Revolution | Video | Video | ||
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Panos Vlachos | Title Cyber Peace in a Mad World | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Verena Zimmermann | Title Better Together? – on the Resilience of Human-technology Teams | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Carlos Ishimaru | Title Ghost in the RaaS: Ransomware-as-a-Service from the Perspective of an Affiliate | ||||
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Arthur Vuagniaux | Title Detect and Adapt: Building Resilience Through Cloud Detection | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Christian Bernasko | Title Ethics vs. The Reality of Cybercrime. How Vulnerabilities Are Exploited and Ransomware Strikes | Video | Video | ||
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Angelo Violetti | Title Next-Gen IR: Swisscom’s Framework for Microsoft 365 | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers David Fridrih, Dario Weiss | Title Initial Access Reloaded – Perimeter Breaches Beyond the Mainstream | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Gregor Wegberg | Title Motivate and Prepare for Cyber Crises | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Moritz Zollinger | Title Keeping Pace: How to Integrate Security Requirements into Fast-Moving IT | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Alain Mowat | Title Wyse Management Subversion: Taking over Dell's Wyse Management Suite | Slides Video | Slides | Video | |
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 1 | AI Village Part AI Village | Aare Foyer – Stand 1 Track Aare Foyer – Stand 1 | Speakers Prof. Dr. Ariane Trammell, Maurice Amon | Title Towards an AI-based Security Consultant for SMEs | Slides | Slides | ||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 2 | AI Village Part AI Village | Aare Foyer – Stand 2 Track Aare Foyer – Stand 2 | Speakers Dr. Nicolas Badoux | Title No App No Problem: Learning and Fuzzing Library Usage Automatically | Slides | Slides | ||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 3 | AI Village Part AI Village | Aare Foyer – Stand 3 Track Aare Foyer – Stand 3 | Speakers Paul Bagourd | Title Leveraging Graph Neural Network for Predicting Emerging Technologies: Use Case with Quantum Computing | ||||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 4 | AI Village Part AI Village | Aare Foyer – Stand 4 Track Aare Foyer – Stand 4 | Speakers Tomas Joaquin Anderegg | Title TechRank: A Graph-Based Framework for Identifying High-Growth Emerging Tech Companies | Slides | Slides | ||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 5 | AI Village Part AI Village | Aare Foyer – Stand 5 Track Aare Foyer – Stand 5 | Speakers Dr. Anastasiia Kucherenko | Title Mapping LLM Training Data for Safety and Explainability: Approach of Low Perplexity | Slides | Slides | ||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 6 | AI Village Part AI Village | Aare Foyer – Stand 6 Track Aare Foyer – Stand 6 | Speakers Dr. Elena Nazarenko | Title Long-Text Classification: A Practical Alternative to LLMs | Slides | Slides | ||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 7 | AI Village Part AI Village | Aare Foyer – Stand 7 Track Aare Foyer – Stand 7 | Speakers Alexander Sternfeld | Title TypePilot: Securing LLM-Generated Code with the Scala Type System | ||||
| SCS2025 Event SCS2025 Part AI Village Track Aare Foyer – Stand 8 | AI Village Part AI Village | Aare Foyer – Stand 8 Track Aare Foyer – Stand 8 | Speakers Dr. Loic Marechal, Dr. Sébastien Rouault | Title SwissCyber Initiative: Mapping the Swiss Cybersecurity Landscape | Slides | Slides | ||
| SCS2025 Event SCS2025 Part CISO Summit Track Panorama 5 | CISO Summit Part CISO Summit | Panorama 5 Track Panorama 5 | Speakers Prof. Dr. Bernhard Hämmerli | Title CISO Summit | ||||
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Daniel Miessler | Title Opening Keynote: How to Run Your Security Program with AI Before Someone Else Does | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Marc Bollhalder, Manuel Bürge | Title Swiss Hacking Challenge | Slides Video | Slides | Video | |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Ruben Santamarta | Title When Physics Meets (Reverse) Engineering: Understanding Cyber-Physical Attacks Against Nuclear Reactors | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Lukasz Olejnik | Title AI and Technology Powered Propaganda and Disinformation Operations | ||||
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Maya Bundt, Fabian Willi | Title An Insider Perspective on Cyber Insurance – Yes or No? | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Eva Wolfangel | Title When Chatbots Talk Too Much: The Risks and Rewards of AI Manipulation | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Kathrin Grosse | Title Towards More Practical Threat Models in Artificial Intelligence Security | ||||
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Allyn Stott | Title The Fault in Our Metrics. Rethinking How We Measure Detection & Response | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Víctor Mayoral Vilches | Title Cybersecurity AIs: From PentestGPT to Building an AI-Powered Robot Immune System | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers John Graham-Cumming | Title Closing Keynote: Lessons from Using Machine Learning for Active Defense Over 20 Years | ||||
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers David Rosenthal | Title How to Talk AI to Your Lawyers | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Emanuel Seemann | Title (Un-)Natural Language Processing: Defensive AI in Practice | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Monica Amgwerd | Title Law Beats Code: Enforcing a Legal Base for a Safe and Human-Centric AI | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Ida Hameete | Title Overcoming Resistance with Purpose-Driven Security. A Lesson in Practical Socio-Dynamics | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Matt Tesauro | Title Hacking And Defending APIs: Red And Blue Make Purple | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Cornelia Puhze | Title Human-Centred Security Meets AI: How to Navigate New Threats | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Bonnie Viteri | Title Growing a Security Champion Program Into a Security Powerhouse | Slides Video | Slides | Video | |
| SCS2024 Event SCS2024 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Raphael Ruf | Title Breach & Attack Simulation - Continuous Security Validation (incl. live demo) | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Sandro Bachmann | Title Artificial Intelligence and Cybersecurity: A New Era of Defense | AI Summary Video | AI Summary | Video | |
| SCS2024 Event SCS2024 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Gregor Wegberg | Title Don’t Forget the Human | AI Summary Video | AI Summary | Video | |
| SCS2024 Event SCS2024 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Julien Oberson | Title Modern TPM Sniffing and Multi-Factor Authentication | ||||
| SCS2024 Event SCS2024 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Michael Landolt, Umberto Annino | Title “How much does my CEO earn?” – Avoid Data Security Pitfalls in the Era of AI | AI Summary Video | AI Summary | Video | |
| SCS2024 Event SCS2024 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Bruno Blumenthal | Title AI Compliance Essentials: Standards and Emerging Regulations | AI Summary Slides Video | AI Summary | Slides | Video |
| SCS2024 Event SCS2024 Part CISO Summit Track Panorama 5 | CISO Summit Part CISO Summit | Panorama 5 Track Panorama 5 | Speakers Prof. Dr. Bernhard Hämmerli | Title CISO Summit | ||||
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Eva Galperin | Title Opening Keynote: Risky Business: Some High-Risk Users You May Not Have Thought of and How to Protect Them | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers David Jacoby | Title Sponsor Keynote: Client based attacks in a hybrid cloud environment | ||||
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Christina Lekati | Title Social Engineering: Targeting Key Individuals, Profiling, and Weaponizing Psychology | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Joe Slowik | Title Converging Behaviors Across Threat Actors | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Joseph Da Silva | Title Teacher, enforcer, soothsayer, scapegoat: the life of the CISO | ||||
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Mauro Verderosa | Title Beyond Classical MFA: Reinforcing Systems in an Evolving Digital Landscape | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Sheila A. Berta | Title Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Stefan Lüders | Title Help! I Have Data Center Nightmares | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Stefan Soesanto | Title Making sense of data dumps and data leaks in times of war and peace | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Yanya Viskovich | Title Closing Keynote: The Human OS: U Can't Tech This | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Omer Akgul | Title Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem | Video | Video | ||
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Christine Bejerasco | Title Secure-by-Design: How do you Design with a Security Mindset for the User? | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Alexandra Arni | Title Cyber Resilience on the Swiss Financial Center – the Swiss FS-CSC | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Tim Blazytko | Title Unveiling Malicious Behavior in Unknown Binaries | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Edzo Botjes | Title How to deal with the inevitable chaos of the cloud: on humans and reality. | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Edwin Foudil | Title Navigating The Coordinated Vulnerability Disclosure Landscape | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Raphael Schaffo | Title How to Run a Great Security Champion Program | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Gregor Wegberg | Title Our supplier has been hit! What do we do now? | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Hans-Peter Waldegger | Title How adaptive is the CAT? | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Jörg Jungblut, Markus Günther | Title One size fits all was yesterday - efficient awareness made @SBB | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Mario Bischof | Title Tell me what you use and I will tell you who you are! | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Felix Aeppli | Title Navigating the Perils: The Precarious Depths of Device Code Phishing in Azure AD | Video | Video | ||
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Angelo Violetti | Title Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Robert Rolle | Title From Data Center Centric To Data Centric - Stories from companies that got resilient the hard way | Slides Video | Slides | Video | |
| SCS2023 Event SCS2023 Part CISO Summit Track Panorama 5 | CISO Summit Part CISO Summit | Panorama 5 Track Panorama 5 | Speakers Prof. Dr. Bernhard Hämmerli | Title CISO Summit | ||||
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Joseph Carson | Title Opening Keynote: Unlocking Digital Identities – The Journey and Path to a Digital Society | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Sandro Nafzger | Title The Swiss Ecosystem for Vulnerability Management and Public Trust | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Brandon Valeriano | Title The Missing Cyber Storm: Russian Cyber Operations During the Russo-Ukrainian War | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Sven Fassbender | Title MeineImpfungen, the Organ Donor Register and the NTC – a Carte Blanche | ||||
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Ippolito Forni | Title Ransomware as Smokescreen for Nation State Sponsored Cyber Operations | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Nikos Karapanos | Title Hello passkeys! Goodbye passwords | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Carmela Troncoso | Title Digital Identities and the Role of Privacy Engineering | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Marisa Tschopp | Title In AI We Trust? | ||||
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dagmawi Mulugeta | Title Detecting Cloud Command and Control | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Jaya Baloo | Title Closing Keynote: Cyber Security and Quantum Readiness | ||||
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Will Pearce | Title Machine Learning and the Optimization of Virtual Personae for Phishing Scams | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Ana Ferreira | Title Securing the Digital "Who's" in Healthcare | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Eddi Blenkers | Title A short introduction to Memory Forensics | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Krzysztof Swaczyński | Title Protecting Advanced Metering Infrastructure | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Wout Debaenst | Title Don't Blame the User! Stop the Phish Before it is even Sent | ||||
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Markus Thüring | Title Swiss IT Desasters and What They Teach Us | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Scenario | Conference Part Conference | Scenario Track Scenario | Speakers Dave Lewis | Title ID and DNA: Don‘t You Know Who I Think I Am? | ||||
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Stephan Berger | Title The Seven Deadly Sins | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Gregor Wegberg | Title What You Can Learn from Cyber Incidents to Improve Your Resilience | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Christian Das Neves | Title Human n’ Machine - Leveraging Automated Tool To Enhance Manual Analysis | Video | Video | ||
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Bruno Blumenthal | Title Agile Use Case Development With MITRE ATT&CK | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Yves Pellaton | Title How Secure Is Your Environment? Hacker’s Perspectives ... | Slides Video | Slides | Video | |
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers David Gugelmann | Title Future-proof Network Detection and Response for Holistic Visibility into Enterprise Networks | ||||
| SCS2022 Event SCS2022 Part Conference Track Panorama – Sponsoring | Conference Part Conference | Panorama – Sponsoring Track Panorama – Sponsoring | Speakers Thomas Kurth, Christoph Düggeli | Title Emerging Threats - Turning from the Hunter to the Hunted | ||||
| SCS2022 Event SCS2022 Part Conference Track Library | Conference Part Conference | Library Track Library | Speakers Simon Kindhauser | Title Interview: Meet /mnt/ain | ||||
| SCS2022 Event SCS2022 Part CISO Summit Track Panorama 5 | CISO Summit Part CISO Summit | Panorama 5 Track Panorama 5 | Speakers Prof. Dr. Bernhard Hämmerli | Title CISO Summit | ||||
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Wendy Nather | Title Opening Keynote: Securing the Supply Chain Without Drowning in the Data | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Sandro Nafzger | Title Sponsor Keynote: Security through Vulnerability in a connected World | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Nadim Kobeissi | Title Private Devices No Longer Private: The Broader Implications of Apple's Content Scanning Push | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Philippe de Ryck | Title Patterns and anti-patterns in software development | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Jarrod Overson | Title State of the art credential stuffing | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Chris Kubecka | Title When they attacked the supply chain of a nuclear power plant | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Philipp Amann | Title International cooperation and the Europol Joint Cybercrime Action Taskforce (J-CAT) | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Serge Droz | Title ICT4Peace and the quest for norms and rules in interstate cyber conflicts | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr. Ksenia Peguero | Title Impact of Frameworks on Security of JavaScript applications | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Arena | Conference Part Conference | Arena Track Arena | Speakers Dr.-Ing. Mario Heiderich | Title Closing Keynote | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Florian Hartmann | Title Living Cybersecurity - Understanding and Defending against the Unknown Unknowns | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Yves Bieri | Title Suppliers! Resist Phishing, Implement FIDO2 | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Stephan Berger | Title Ransomware in Switzerland and around the world: insights, facts and findings | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Fabian Gonzalez | Title Assessing and Securing Third-Party Maintenance Accessi | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Dr. Alex Rhomberg, Giampaolo Trenta | Title Access management turned around | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Rolf Hefti | Title Security Automation: Reduce workload und speed up your incident response | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Florian Badertscher | Title Tales and Vulnerabilities from our Bug Bounty Adventures | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 1 (Sponsors) | Conference Part Conference | Scenario 1 (Sponsors) Track Scenario 1 (Sponsors) | Speakers Anthony Schneiter, Miro Haller | Title Climbing the Hacking /mnt/ain | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Trey Herr | Title Shades of crisis across an insecure software supply chain | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Kavya Pearlman | Title A primer on security and safety in eXtended / Augmented Reality environments (XR)i | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Patrick Dwyer | Title How a Software Bill of Materials is a key factor when securing the supply chain | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Désirée Sacher-Boldewin | Title How to Integrate Continuous Improvement in Daily SOC Operations - Focus Point: Integrity and Configuration Compliance Monitoring | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Dr.-Ing. Mario Heiderich | Title MXSS in 2021 - One Long Solved Problem? | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Marina Krotofil | Title Attack Surface of Supply Chain: Exploiting Software Architecture Design of Industrial Controllers | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part Conference Track Scenario 2 | Conference Part Conference | Scenario 2 Track Scenario 2 | Speakers Merry Ember Mou | Title How Zoom is Building End-to-End Encryption | Slides Video | Slides | Video | |
| SCS2021 Event SCS2021 Part CISO Summit Track Panorama 5 | CISO Summit Part CISO Summit | Panorama 5 Track Panorama 5 | Speakers Prof. Dr. Bernhard Hämmerli | Title CISO Summit | ||||
| SCS2021 Event SCS2021 Part SCS in a Nutshell Track Kursaal Bern | SCS in a Nutshell Part SCS in a Nutshell | Kursaal Bern Track Kursaal Bern | Speakers Dr. Christian Folini, Tobias Ospelt, Raphaël Arrouas | Title SCS in a Nutshell with Tobias Ospelt and Raphaël Arrouas | Video | Video | ||
| SCS2021 Event SCS2021 Part SCS in a Nutshell Track Kursaal Bern | SCS in a Nutshell Part SCS in a Nutshell | Kursaal Bern Track Kursaal Bern | Speakers Dr. Christian Folini, Thomas Süssli, Myriam Dunn Cavelty | Title SCS in a Nutshell with Thomas Süssli Myriam Dunn Cavelty | Video | Video | ||
| SCS2021 Event SCS2021 Part SCS in a Nutshell Track Kursaal Bern | SCS in a Nutshell Part SCS in a Nutshell | Kursaal Bern Track Kursaal Bern | Speakers Dr. Christian Folini, Jean-Philippe Aumasson, Jonas Wagner | Title SCS in a Nutshell with Jean-Philippe Aumasson and Jonas Wagner | Video | Video | ||
| SCS2020 Event SCS2020 Part SCS in a Nutshell Track EPFL | SCS in a Nutshell Part SCS in a Nutshell | EPFL Track EPFL | Speakers Dr. Christian Folini, Florian Schutz, Edouard Bugnion | Title SCS in a Nutshell with Florian Schütz and Edouard Bugnion | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Dr. Bernhard Tellenbach, Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Dave Lewis | Title Embracing the Hackers: Opening Keynote by Gattaca | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Catherine Chapman | Title Paying hackers to break into your business (and improve security) with bug bounties | ||||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Sarah Jamie Lewis | Title How Not to Secure Your E-Voting system | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Tobias Ospelt | Title Fuzzying Java Code With the Help of JQF | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Christian Killer, Melchior Limacher | Title Digital Exposure of Traditional Swiss Voting Channels | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Enrique Serrano | Title Not Only On Apple: Spying on Android Users Through The Camera | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Nikita Stupin | Title Access control vulnerabilities in GraphQL APIs | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Dr. Melanie Rieback | Title Pentesting ChatOps | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers David Johansson | Title Threat Modelling Stories From the Front Line | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Jaya Baloo | Title Keynote Closing: 7 Years a CISO: Lessons From the Trenches | ||||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Nicoletta della Valle, Sandra Schweingruber | Title An Exemplary Case of International Financial Fraud | ||||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Nicole Becher | Title A Primer on Cyber Insurance and Insight Into Zurich vs. Mondelez | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Daniel Votipka | Title Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Peter Hladký | Title Intelligence-Driven Red Teaming | ||||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Michael Hausding | Title DNS Wars | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Marcel Zumbühl | Title Towards Customer Trust | ||||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Prof. Dr. Endre Bangerter, Prof. Dr. Bruce Nikkel | Title Recent Initiatives in Research and Education | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Malte Kushnir | Title Yes We Scan! Automating Application Security | Video | Video | ||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Jan Alsenz | Title Hacking Smart Meters - Introduction and access to G3-PLC | ||||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Michel de Crevoisier | Title Facing the challenge of Windows logs collection to leverage valuable IOCs | ||||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Lucas Philippe | Title From Bug Bounty to Big Bounty | ||||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Shiri Band | Title How CISOs Gain Trust in the Boardroom | ||||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Bruno Blumenthal | Title In our SOC we Trust | ||||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Cyrill Bannwart | Title Malware Attacks on Smartphones | ||||
| SCS2019 Event SCS2019 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Ben Mathis | Title DDoS Protection: Choosing the Right Solution | ||||
| SCS2019 Event SCS2019 Part Conference Track Foyer | Conference Part Conference | Foyer Track Foyer | Speakers Dr. Christian Folini, Sarah Jamie Lewis, Dave Lewis | Title Fireside Chat with Sarah Jamie Lewis and Dave Lewis | ||||
| SCS2019 Event SCS2019 Part CISO Summit Track Panorama 5 | CISO Summit Part CISO Summit | Panorama 5 Track Panorama 5 | Speakers Prof. Dr. Bernhard Hämmerli | Title CISO Summit | ||||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Dr. Bernhard Tellenbach, Dr. Christian Folini | Title Opening Ceremony | ||||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Cory Doctorow | Title Opening Keynote: Trust as a Base for All Things Security | ||||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Franck Braunstedter | Title Sponsoring Keynote: Make Your Cloud Faster, Cheaper and More Secure with a Fully Automated Cloud Environment! | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Nick Sullivan | Title The Evolving Architecture of the Web and Its Impact on Security | ||||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Grzegorz Milka | Title Anatomy of an Account Takeover – And How We Build Up Trust Again | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Oliver Simonnet | Title What Does It Take to Steal $81m? | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Lilly Ryan | Title Practical Facial Recognition or How to Disappear Completely | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Astha Singhal | Title Embracing DevOps as a Security Professional | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Katherine Jarmul | Title Deep Learning Blindspots | ||||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Mark Burgess | Title Trust and Microservices - The Scaling of True and False | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Ivan Ristić | Title Purpose-Driven Design in Computer Security: My SSL Labs Journey | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Main Track / Tech Track | Conference Part Conference | Main Track / Tech Track Track Main Track / Tech Track | Speakers Marie Moe | Title A History of my Heart - How Can I Trust the Code Inside of Me? | ||||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Robert Rogenmoser | Title How I Ended Up as a Producer of Trustworthy Hardware in Switzerland | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Lydie Nogol | Title How Communication Can Make or Break Your Cyber Security Program | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Oliver Spycher | Title Trust in E-Voting | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Nicolas Vernaz | Title 5 months later: Is GDPR a Means to Bring Back Trust to Online Privacy? | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Moonbeom Park | Title A South Korean Perspective on North Korean Cyber Attacks | ||||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Jérémy Matos | Title Man in the Contacts - Where Trust in Secure Messenger Leads to Spear Phishing | Slides | Slides | ||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Roger Knoepfel | Title Cybercrime Cases | ||||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Prof. Dr. Emmanuel Benoist | Title Darknet Markets Observatory | ||||
| SCS2018 Event SCS2018 Part Conference Track Management Track / Academy Talks | Conference Part Conference | Management Track / Academy Talks Track Management Track / Academy Talks | Speakers Dr. Bernhard Tellenbach | Title How to Phish – How Does the Perfect Embedded Training Look Like? | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Mathias Frank | Title Internet of Babies – an IoT Security Study | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Stefan Mardak | Title How Companies Proactively Protect Themselves from DNS Attacks | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Damian Pfammatter | Title Hidden Inbox Rules in Microsoft Exchange... Or How to Permanently Steal Your Messages | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Rick El-Darwish | Title Penetration Testing: an old practice with new objectives | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Urs Rufer | Title How to Combine Machine Learning with Expertise of Security Analysts to Enhance SOC Performance | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Tobias Ellenberger | Title The 3 Most Important Aspects of (Non-)Successful Incident Response | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Stephane Adamiste | Title Streamlining the security and privacy aspects in IT projects using threat modelling | ||||
| SCS2018 Event SCS2018 Part Conference Track Sponsoring Track | Conference Part Conference | Sponsoring Track Track Sponsoring Track | Speakers Kris McConkey | Title Evolving Cyber Threats Detection and Response | ||||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Dr. Bernhard Tellenbach, Dr. Christian Folini | Title Opening Ceremony: Welcome - Infos about the program and the rooms | ||||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Paul Vixie | Title Keynote 1 | ||||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Aldo Frick, Harald Reisinger | Title Keynote 2: Transforming a Cyber Defense Center into a Value Proposition | ||||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Deviant Ollam | Title Physical Access Control | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Dhia Mahjoub | Title Behaviours and Patterns of Bullet Proof Hosters | ||||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Jos Wetzels | Title Industrial Control System / IoT Security | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Dr. Raphael Reischuk | Title The SCION Project | ||||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Antonio Barresi, Matthias Ganz | Title Modern Memory Corruption Exploit Mitigations | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Clément Guitton | Title Attribution | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Bryan Ford | Title E-Voting Focus - Introduction to E-Voting with a Focus on Switzerland | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Jordi Puiggalí | Title E-Voting Focus - The E-Voting Offering of Swiss Post | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Auditorium | Conference Part Conference | Auditorium Track Auditorium | Speakers Thomas Hofer | Title E-Voting Focus - The E-Voting Offering of the State of Geneva | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Terrassensaal | Conference Part Conference | Terrassensaal Track Terrassensaal | Speakers Tanya Janca | Title Pushing Left like a Boss | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Terrassensaal | Conference Part Conference | Terrassensaal Track Terrassensaal | Speakers Stefan Lüders | Title IoT and Corporate IT Security | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Terrassensaal | Conference Part Conference | Terrassensaal Track Terrassensaal | Speakers Tarah Wheeler | Title Fintech and Digital Transformation | ||||
| SCS2017 Event SCS2017 Part Conference Track Terrassensaal | Conference Part Conference | Terrassensaal Track Terrassensaal | Speakers Anthony Vance | Title Usable Security from a Neuroscience Perspective | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Terrassensaal | Conference Part Conference | Terrassensaal Track Terrassensaal | Speakers Daniela Oliveira | Title Susceptibility of C-Level Management to Spear Phishing | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Speakers’ Corner | Conference Part Conference | Speakers’ Corner Track Speakers’ Corner | Speakers Mario Bischof | Title Phishing - there's life in the old dog yet | ||||
| SCS2017 Event SCS2017 Part Conference Track Speakers’ Corner | Conference Part Conference | Speakers’ Corner Track Speakers’ Corner | Speakers Cyrill Brunschwiler | Title Hacking bIOTech | Slides | Slides | ||
| SCS2017 Event SCS2017 Part Conference Track Speakers’ Corner | Conference Part Conference | Speakers’ Corner Track Speakers’ Corner | Speakers Miro Ljubicic | Title Why Cyber Security Should Never Be an Afterthought | ||||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Dr. Bernhard Tellenbach | Title Opening Ceremony: Welcome | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Troy Hunt | Title Lessons from Billions of Breached Records | ||||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Herbert Bos | Title Exploiting Software Without Bugs | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Robert Randall | Title The Cyber Kill Chain: Use it to Protect Yourself - Knowing the Limitations! | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers John Matherly | Title State of the Internet | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Nick Galbreath | Title Engineering Software for Resilience | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Scott Helme | Title *** SECRET TOPIC *** | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Mazin Ahmed | Title Bounty Hunting in Sudan and Abroad | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Prof. Dr. Endre Bangerter | Title Turbo Talks | ||||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Marc Ruef | Title Darknet Investigations | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Raoul Chiesa | Title What Vendors Are Not Telling You | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Andrea Klaes | Title Logfile Analysis: Actions Leave Traces - Know What to Look For | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Mark Barwinski | Title Cross-border Hunting of Sophisticated Threat Actors in Enterprise Networks – Challenges and Success Factors. | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Walter Belgers | Title Lockpicking and IT Security | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Riccardo Sibillia | Title Benefits of participating in NATO Locked Shield Exercises - Management Perspective | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers David Rosenthal | Title Important EU-Cyber Regulations Switzerland Must Apply Until 2018 | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Prof. Dr. Marc Rennhard | Title Turbo Talks | Slides | Slides | ||
| SCS2016 Event SCS2016 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Ivan Butler, Dr. Bernhard Tellenbach | Title Turbo Talks | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Dr. Bernhard Tellenbach | Title Opening Ceremony: Welcome | ||||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Kevin Beaver | Title Why Organizations Keep Getting Breached....Still, in 2015. | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Enrico Petrov, Daniel Just | Title Effective Methods to Detect Current Threats | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Thom Langford | Title Flushing Away Preconceptions of Risk | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Alan Neville, Tom Grasso | Title Working Together: Law enforcement and private sector botnet takedowns | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Dr. Yuejin Du | Title Differences and new challenges of cybersecurity issues from the angle of Alibaba | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Richard Dorough | Title State of the Cyber Threat & Consequences of Inaction | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Paul Crichard, Robert Rodriguez | Title Fireside Chat: The 2020 CISO, What will their roll look like? | ||||
| SCS2015 Event SCS2015 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Patrick Miller | Title Threat Intelligence Sharing – Lessons from the Front Lines | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Daniel White | Title New generation timeline tools: A case study | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Dmitry Slinkov | Title Black Market of Cybercrime in Russia | Slides | Slides | ||
| SCS2015 Event SCS2015 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Dr. Louis Marinos | Title Visibility in the ENISA Threat Landscape | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Dr. Bernhard Tellenbach | Title Opening Ceremony: Welcome | ||||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Robert Rodriguez | Title Opening Keynote: Looking Back to Advance the Future - Leading Change | ||||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Elia Florio | Title The Exploitation Arms Race between Attackers and Defender | ||||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Urs Rufer | Title Talk Urs Rufer | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers ObstdG Mag. Walter Unger | Title Cyberdefence as Building Block of the Austrian Cyber Security Strategy | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Patrick Miller | Title Critical Infrastructure Protection - Separating Fact from Fiction: Just How Vulnerable is Vulnerable? | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Pascal Lamia, Dr. Alain Gut | Title Public Private Partnership - Security Experts | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Michel Herzog | Title Incident and Crisis Management in the Context of Cyber Risk | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Management Track | Conference Part Conference | Management Track Track Management Track | Speakers Peter Gutmann | Title The Psychology of Computer Insecurity | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Tech Track | Conference Part Conference | Tech Track Track Tech Track | Speakers Aaron Philipp | Title Leveraging Big Data Analytics for Cyber Security | ||||
| SCS2014 Event SCS2014 Part Conference Track Tech Track | Conference Part Conference | Tech Track Track Tech Track | Speakers Steve Poulson | Title Protect with Visibility | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Tech Track | Conference Part Conference | Tech Track Track Tech Track | Speakers Peter Clay | Title The Need For Speed: Respond Quickly To Cyber Threats | Slides | Slides | ||
| SCS2014 Event SCS2014 Part Conference Track Tech Track | Conference Part Conference | Tech Track Track Tech Track | Speakers Roberto Perdisci | Title Effective Malware Download Defense via Network-Centric Behavior-Based Learning | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Costin G. Raiu | Title Keynote Opening: Advanced malware cyberespionage: From Flame and RedOctober to Miniduke | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Michael Anti | Title Cyber Security and Censorship: The Unconventional War | ||||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Candid Wüest | Title Targeted attacks: How sophisticated are they really? | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Dr. Thomas Maillart | Title On the Importance of Human Timing for Quantitative Cyber Risks Management | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers John Matherly | Title Internet Cartography: Using Shodan to Explore Uncharted Territory | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Dr. Timo Steffens | Title An in-depth analysis of Advanced Persistent Threats campaigns | ||||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Yaron Blachman | Title Cyber Threat Intelligence – Buzzword or Real Thing? | ||||
| SCS2013 Event SCS2013 Part Conference Track Track 1 | Conference Part Conference | Track 1 Track Track 1 | Speakers Oliver Münchow, Manuel Krucker | Title APT live – An in-depth example of an professional inside-out attack | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Dr. Stefanie Frey | Title Implementing the National Strategy for Protection of Switzerland against Cyber Risks | ||||
| SCS2013 Event SCS2013 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Michael Pilgermann | Title Implementing a Cybersecurity Strategy in CIIP | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Stefan Lüders | Title Why SCADA Security Is NOT Like Computer Centre Security | Slides | Slides | ||
| SCS2013 Event SCS2013 Part Conference Track Track 2 | Conference Part Conference | Track 2 Track Track 2 | Speakers Mark Tibbs | Title The Industrialisation of Cybercrime |