Schedule

Conference – October 28, 2025

Resilience in a mad, mad world

Sessions related to the main conference topic „Resilience in a mad, mad world” are highlighted with a gray background.
Time Arena
Moderator
08:00 - 09:00
09:00 - 09:15
Dr. Christian Folini's avatar
Dr. Christian Folini
Program Chair, Swiss Cyber Storm
Show description
Guests are welcomed by the organizers for this year’s Swiss Cyber Storm conference.
09:15 - 09:55
Mark Barwinski's avatar
Mark Barwinski
Global Cybersecurity Leader and Board Adviser
09:55 - 10:05
10:05 - 10:50
10:50 - 11:20
11:25 - 11:55
12:00 - 12:30
Aram Hovsepyan's avatar
Aram Hovsepyan
Founder and CEO of Codific
Show description
Security teams love metrics. Beautiful dashboards, filled with vulnerability counts, alert volumes, SLA compliance for fix times, training hours logged, etc. However, do any of these metrics actually make organizations more secure? The uncomfortable truth is that most security metrics are questionable, at least from a scientific perspective.
12:30 - 14:00
14:00 - 14:30
14:35 - 15:05
15:10 - 15:40
15:40 - 16:20
16:20 - 16:50
16:55 - 17:30
17:30 - 21:00
Show description
Our standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day. Naturally, most of the speakers will still be around, so don’t rush off after the last talk.
18:30 - 18:45
Show description
Distribution of prizes for the Sponsoring Raffle.
Time Scenario
Moderator
08:00 - 09:00
09:00 - 09:15
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:15 - 09:55
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:55 - 10:05
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
10:05 - 10:50
10:50 - 11:20
11:25 - 11:55
12:00 - 12:30
Show description
„Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities. Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems. Smart Cities by nature use a combination of IT and OT systems, but have no established or holistic approach for managing overlapping risks to both. The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined. Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors.
12:30 - 14:00
14:00 - 14:30
14:35 - 15:05
Panos Vlachos's avatar
Panos Vlachos
Lead Information Security Engineer at Mastercard
15:10 - 15:40
Show description
The talk sheds light on the complex interplay of humans and technology in cybersecurity. It provides insights into the relevance of the human factor in cybersecurity and explains why it is not sufficient to make cybersecurity technologies usable to enhance security. Rather than independent system components or even “enemies”, humans and technology should be considered as a team. Augmenting each other’s strengths can enhance resilience, i.e., the ability to adapt to unforeseen circumstances – which is crucial in uncertain times.
15:40 - 16:20
16:20 - 16:50
16:55 - 17:30
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
17:30 - 21:00
Show description
Our standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day. Naturally, most of the speakers will still be around, so don’t rush off after the last talk.
18:30 - 18:45
Show description
Distribution of prizes for the Sponsoring Raffle.
Time Panorama – Sponsoring
Moderator
08:00 - 09:00
09:00 - 09:15
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:15 - 09:55
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:55 - 10:05
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
10:05 - 10:50
10:50 - 11:20
Show description
Abstract of the talk: In today’s unpredictable digital landscape, resilience is a necessity, not a luxury. This talk will explore how cloud-native detection systems are reshaping the resilience landscape. Leveraging scalable platforms such as Microsoft Sentinel and Defender XDR, along with advanced threat intelligence and automated response playbooks, cloud technologies offer unparalleled reach and agility. This talk will demonstrate, through practical examples and strategic perspectives, that detection at cloud scale is not merely a technical capability, but a cornerstone of modern resilience.
11:25 - 11:55
12:00 - 12:30
Angelo Violetti's avatar
Angelo Violetti
B2B CSIRT Analyst at Swisscom
Show description

Microsoft 365 has become a cornerstone of enterprise productivity — and a growing target for sophisticated cyber threats. In this talk, we’ll explore how Swisscom’s B2B CSIRT has optimised the incident response process for Microsoft 365 through automation and expert-driven detection logic.

We’ll introduce Swisscom’s Next-Gen IR automation framework, which enables rapid, secure collection of forensic logs by registering a dedicated application in the customer’s tenant with appropriate permissions. This automation significantly accelerates the start of investigations and ensures comprehensive visibility across M365 workloads.

12:30 - 14:00
14:00 - 14:30
David Fridrih's avatar
David Fridrih
Senior Penetration Tester at InfoGuard AG
Dario Weiss's avatar
Dario Weiss
Penetration Tester at InfoGuard AG
Show description
Real-life pentests! Creative attack paths into the heart of the network. It’s not always the big exploits – often small vulnerabilities and clever ideas are enough. In this interesting and insightful presentation, the InfoGuard pentesting team uses real-life examples to show how zero-day vulnerabilities, misconfigurations or social engineering attacks opened the way for complete network takeovers. A must for security teams, IT managers and anyone who wants to understand how creative penetration testing works—beyond the standard checklists.
14:35 - 15:05
15:10 - 15:40
Moritz Zollinger's avatar
Moritz Zollinger
Security Consultant at TEMET AG
Show description
Business is driving rapidly changing IT, constantly demanding new services and technology. Setting up AI and SaaS in corporations has never been easier. Therefore, lots of apps and services pop up left and right, and it’s getting tougher to keep our heads above water when it comes to cybersecurity and compliance.
15:40 - 16:20
16:20 - 16:50
16:55 - 17:30
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
17:30 - 21:00
Show description
Our standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day. Naturally, most of the speakers will still be around, so don’t rush off after the last talk.
18:30 - 18:45
Show description
Distribution of prizes for the Sponsoring Raffle.
Copyright © 2025
 
Swiss Cyber Storm
Hosting graciously provided for free by Nine