Conference – October 28, 2025
Resilience in a mad, mad world
Time | Arena | Scenario | Panorama – Sponsoring |
---|---|---|---|
Moderator | |||
08:00
-
09:00 | |||
09:00
-
09:15 | ![]() Dr. Christian Folini Program Chair, Swiss Cyber Storm Show descriptionGuests are welcomed by the organizers for this year’s Swiss Cyber Storm conference. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:15
-
09:55 | ![]() Mark Barwinski Global Cybersecurity Leader and Board Adviser | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:55
-
10:05 | ![]() Marc Bollhalder Organizer and Lead, Swiss Hacking Challenge ![]() Manuel Bürge Organizer, Swiss Hacking Challenge | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
10:05
-
10:50 | |||
10:50
-
11:20 | ![]() Arthur Vuagnioux Team Leader SOC
at
Swiss Post Cybersecurity AG Show descriptionAbstract of the talk: In today’s unpredictable digital landscape, resilience is a necessity, not a luxury.
This talk will explore how cloud-native detection systems are reshaping the resilience landscape.
Leveraging scalable platforms such as Microsoft Sentinel and Defender XDR, along with advanced threat intelligence and automated response playbooks, cloud technologies offer unparalleled reach and agility.
This talk will demonstrate, through practical examples and strategic perspectives, that detection at cloud scale is not merely a technical capability, but a cornerstone of modern resilience. | ||
11:25
-
11:55 | |||
12:00
-
12:30 | ![]() Aram Hovsepyan Founder and CEO of Codific Show descriptionSecurity teams love metrics.
Beautiful dashboards, filled with vulnerability counts, alert volumes, SLA compliance for fix times, training hours logged, etc.
However, do any of these metrics actually make organizations more secure? The uncomfortable truth is that most security metrics are questionable, at least from a scientific perspective. | Show description„Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities.
Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems.
Smart Cities by nature use a combination of IT and OT systems, but have no established or holistic approach for managing overlapping risks to both.
The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined.
Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors. | ![]() Angelo Violetti B2B CSIRT Analyst
at
Swisscom Show descriptionMicrosoft 365 has become a cornerstone of enterprise productivity — and a growing target for sophisticated cyber threats. In this talk, we’ll explore how Swisscom’s B2B CSIRT has optimised the incident response process for Microsoft 365 through automation and expert-driven detection logic. We’ll introduce Swisscom’s Next-Gen IR automation framework, which enables rapid, secure collection of forensic logs by registering a dedicated application in the customer’s tenant with appropriate permissions. This automation significantly accelerates the start of investigations and ensures comprehensive visibility across M365 workloads. |
12:30
-
14:00 | |||
14:00
-
14:30 | ![]() David Fridrih Senior Penetration Tester
at
InfoGuard AG ![]() Dario Weiss Penetration Tester
at
InfoGuard AG Show descriptionReal-life pentests! Creative attack paths into the heart of the network.
It’s not always the big exploits – often small vulnerabilities and clever ideas are enough.
In this interesting and insightful presentation, the InfoGuard pentesting team uses real-life examples to show how zero-day vulnerabilities, misconfigurations or social engineering attacks opened the way for complete network takeovers.
A must for security teams, IT managers and anyone who wants to understand how creative penetration testing works—beyond the standard checklists. | ||
14:35
-
15:05 | ![]() Panos Vlachos Lead Information Security Engineer
at
Mastercard | ||
15:10
-
15:40 | ![]() Roman Hüssy Co-head of GovCERT
at
NCSC | Show descriptionThe talk sheds light on the complex interplay of humans and technology in cybersecurity.
It provides insights into the relevance of the human factor in cybersecurity and explains why it is not sufficient to make cybersecurity technologies usable to enhance security.
Rather than independent system components or even “enemies”, humans and technology should be considered as a team.
Augmenting each other’s strengths can enhance resilience, i.e., the ability to adapt to unforeseen circumstances – which is crucial in uncertain times. | ![]() Moritz Zollinger Security Consultant
at
TEMET AG Show descriptionBusiness is driving rapidly changing IT, constantly demanding new services and technology.
Setting up AI and SaaS in corporations has never been easier.
Therefore, lots of apps and services pop up left and right, and it’s getting tougher to keep our heads above water when it comes to cybersecurity and compliance. |
15:40
-
16:20 | |||
16:20
-
16:50 | ![]() Michael Hausding Incident and Abuse Handler
at
Switch CERT | ||
16:55
-
17:30 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. | Show descriptionDistribution of prizes for the Sponsoring Raffle. | Show descriptionDistribution of prizes for the Sponsoring Raffle. |
Time | Arena |
---|---|
Moderator | |
08:00
-
09:00 | |
09:00
-
09:15 | ![]() Dr. Christian Folini Program Chair, Swiss Cyber Storm Show descriptionGuests are welcomed by the organizers for this year’s Swiss Cyber Storm conference. |
09:15
-
09:55 | ![]() Mark Barwinski Global Cybersecurity Leader and Board Adviser |
09:55
-
10:05 | ![]() Marc Bollhalder Organizer and Lead, Swiss Hacking Challenge ![]() Manuel Bürge Organizer, Swiss Hacking Challenge |
10:05
-
10:50 | |
10:50
-
11:20 | |
11:25
-
11:55 | |
12:00
-
12:30 | ![]() Aram Hovsepyan Founder and CEO of Codific Show descriptionSecurity teams love metrics.
Beautiful dashboards, filled with vulnerability counts, alert volumes, SLA compliance for fix times, training hours logged, etc.
However, do any of these metrics actually make organizations more secure? The uncomfortable truth is that most security metrics are questionable, at least from a scientific perspective. |
12:30
-
14:00 | |
14:00
-
14:30 | |
14:35
-
15:05 | |
15:10
-
15:40 | ![]() Roman Hüssy Co-head of GovCERT
at
NCSC |
15:40
-
16:20 | |
16:20
-
16:50 | ![]() Michael Hausding Incident and Abuse Handler
at
Switch CERT |
16:55
-
17:30 | |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. |
Time | Scenario |
---|---|
Moderator | |
08:00
-
09:00 | |
09:00
-
09:15 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:15
-
09:55 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:55
-
10:05 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
10:05
-
10:50 | |
10:50
-
11:20 | |
11:25
-
11:55 | |
12:00
-
12:30 | Show description„Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities.
Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems.
Smart Cities by nature use a combination of IT and OT systems, but have no established or holistic approach for managing overlapping risks to both.
The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined.
Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors. |
12:30
-
14:00 | |
14:00
-
14:30 | |
14:35
-
15:05 | ![]() Panos Vlachos Lead Information Security Engineer
at
Mastercard |
15:10
-
15:40 | Show descriptionThe talk sheds light on the complex interplay of humans and technology in cybersecurity.
It provides insights into the relevance of the human factor in cybersecurity and explains why it is not sufficient to make cybersecurity technologies usable to enhance security.
Rather than independent system components or even “enemies”, humans and technology should be considered as a team.
Augmenting each other’s strengths can enhance resilience, i.e., the ability to adapt to unforeseen circumstances – which is crucial in uncertain times. |
15:40
-
16:20 | |
16:20
-
16:50 | |
16:55
-
17:30 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. |
Time | Panorama – Sponsoring |
---|---|
Moderator | |
08:00
-
09:00 | |
09:00
-
09:15 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:15
-
09:55 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:55
-
10:05 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
10:05
-
10:50 | |
10:50
-
11:20 | ![]() Arthur Vuagnioux Team Leader SOC
at
Swiss Post Cybersecurity AG Show descriptionAbstract of the talk: In today’s unpredictable digital landscape, resilience is a necessity, not a luxury.
This talk will explore how cloud-native detection systems are reshaping the resilience landscape.
Leveraging scalable platforms such as Microsoft Sentinel and Defender XDR, along with advanced threat intelligence and automated response playbooks, cloud technologies offer unparalleled reach and agility.
This talk will demonstrate, through practical examples and strategic perspectives, that detection at cloud scale is not merely a technical capability, but a cornerstone of modern resilience. |
11:25
-
11:55 | |
12:00
-
12:30 | ![]() Angelo Violetti B2B CSIRT Analyst
at
Swisscom Show descriptionMicrosoft 365 has become a cornerstone of enterprise productivity — and a growing target for sophisticated cyber threats. In this talk, we’ll explore how Swisscom’s B2B CSIRT has optimised the incident response process for Microsoft 365 through automation and expert-driven detection logic. We’ll introduce Swisscom’s Next-Gen IR automation framework, which enables rapid, secure collection of forensic logs by registering a dedicated application in the customer’s tenant with appropriate permissions. This automation significantly accelerates the start of investigations and ensures comprehensive visibility across M365 workloads. |
12:30
-
14:00 | |
14:00
-
14:30 | ![]() David Fridrih Senior Penetration Tester
at
InfoGuard AG ![]() Dario Weiss Penetration Tester
at
InfoGuard AG Show descriptionReal-life pentests! Creative attack paths into the heart of the network.
It’s not always the big exploits – often small vulnerabilities and clever ideas are enough.
In this interesting and insightful presentation, the InfoGuard pentesting team uses real-life examples to show how zero-day vulnerabilities, misconfigurations or social engineering attacks opened the way for complete network takeovers.
A must for security teams, IT managers and anyone who wants to understand how creative penetration testing works—beyond the standard checklists. |
14:35
-
15:05 | |
15:10
-
15:40 | ![]() Moritz Zollinger Security Consultant
at
TEMET AG Show descriptionBusiness is driving rapidly changing IT, constantly demanding new services and technology.
Setting up AI and SaaS in corporations has never been easier.
Therefore, lots of apps and services pop up left and right, and it’s getting tougher to keep our heads above water when it comes to cybersecurity and compliance. |
15:40
-
16:20 | |
16:20
-
16:50 | |
16:55
-
17:30 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. |