addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Surveillance, Cyber Crime & Cyber Espionage

The Misuse of Internet Vulnerabilities against Cyber Security - The German and U.S. Approach to a Common Challenge

Hackers and insiders sneak into computers, steal data and can bring entire production facilities to their knees. Attacks from cyberspace are a real global threat, and a cyber-warfare is no less dangerous than a conventional combat. Threats are evolving to a whole new dimension since global hackers are increasingly targeting value chains. We are encountering an entire new generation of malware specifically designed for industrial espionage and sabotage. Across the globe, governments, societies, businesses, and individuals are facing a number of critical challenges regarding cyberspace, data integrity, authenticity, confidentiality, and more often, trust. As a response to a rising number of cyber threats, an increasing number of governments are introducing cyber security strategies. Will those strategies limit existing threats?
Are the rules, processes and responsibilities clearly defined?
Is there a universal plan of action to set international standards?
Germany is known for being very privacy-conscious. Therefore Germans were deeply concerned after documents leaked by former NSA contractor Edward Snowden showing that Germany was a large target for surveillance. The widespread and increasing misuse of security vulnerabilities in the Internet presents new challenges onto society and technologies. We have to recognize this: Conventional IT and IT security technologies cannot stop all attackers. Trust in key enterprises and governments are mandatory to build up secure IT and IT security technologies and solutions.

Howard Schmidt, retired Special Assistant to the President, Cyber Security Coordinator at Executive Office of the President, White House
Norbert Pohlmann, Professor and Director Institute for Internet Security and Chairman, TeleTrusT - IT Security Association Germany
Joerg Borchert, Vice President, Infineon Technologies
Kurt Roemer, Chief Security Strategist, Citrix Systems
Samir Kapuria, Vice President of Business Strategy and Security Intelligence, Symantec

Jarad Carleton, Principal Consultant, Frost & Sullivan

Agenda: 10:30 – 11:00 am Registration and Networking Reception
11:00 - 12:30 pm Program
12:30 - 1:30 pm Lunch and Networking

Complimentary lunch will be served. Following the panel discussion you are invited to attend a TeleTrusT/Symantec Expert meeting from 1:30 to 3:00pm

Early Bird until Feb 18: $15 Members, $25 Non-Members
Regular: $20 Members, $30 Non-Members,$40 at the Door

For more information and registration please visit:

Join or login to comment.

2 went

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy