Dr Gregoire Ribordy has 20 years of experience in various R&D and management roles in optical measurements and communication systems. He founded ID Quantique in 2001 and has managed the company since. Before that he was a research fellow at the Group of Applied Physics of the University of Geneva between 1997 and 2001. In this position, he actively developed quantum cryptography technology and holds a number of patents in the field. Between 1995 and 1996, Dr Ribordy worked in the R&D division of Nikon Corp. in Tokyo.
Dr Ribordy is the recipient of several awards such as the 2001 New Entrepreneurs in Technology and Science prize, the 2002 de Vigier award and the Swiss Society for Optics and Microscopy 1999 prize. At the end of 2005, he was selected as one of the most innovative individuals in information technology worldwide by the World Technology Network.
Arrival of the quantum computer will herald a new era. It will enable us, on one hand, to undertake complex calculations in a fraction of the time it takes today. However, it will also break public key cryptographic systems that protect today’s data. In our talk, we will explore the impact of the quantum computer on current data security in different industries and applications, and provide a risk assessment model for quantum attacks. We will also discuss different options for transitioning to quantum-safe security to protect data against such attacks, reviewing quantum-safe solutions which are already available and picturing their evolution in the next decade.
Noam Rosenfeld is a highly-experienced authority in the fields of cyber defence and IT. Mr. Rosenfeld is currently Senior VP of R&D and Delivery for Verint CIS (Communications & Cyber Intelligence). In this position, he leads a staff of 650 professionals, runs strategic external partnerships, manages Global Research & Development, and directs the creation and delivery of new products.
Before joining Verint, Mr. Rosenfeld was the head of the Cyber Defense Unit of the Israel Defense Forces (IDF) at the rank of Colonel. He directed the development of innovative cyber systems, established the IDF CERT, managed 200 technologists, and held overall responsibility for the cyber domain within the IDF. Prior to that position, he was the head of the IDF’s main IT unit (Mamram) and was also head of the IDF Network Centric Warfare development unit. Mr. Rosenfeld holds a B.Sc in Computer Science from the Technion University.
Cyber security is constantly evolving, bringing with it new complex challenges and a host of new priorities for governments, organizations and the private sectors. Cyber adversaries are using increasingly sophisticated techniques to launch attacks, specifically designed to evade cyber defences. And yet, our approach to combating cyber-crime remains based on aged paradigms, which have not kept up with the evolution of cyber threats.
Coming from a military intelligence background, and working at a company that lives and breathes Cyber Intelligence, Noam Rosenfeld shares insights on the commonalities in real world terrorist attacks and cyber-attacks which drove him to adopt an intelligence powered approach to cyber security in the IDF, and later at Verint.
Noam’s presentation will address critical capabilities for building an Effective, Intelligence Powered Threat Protection Solution including:
Holistic Kill Chain Coverage
Using multiple sensors working in tandem to monitor network, endpoints, files, C&C, lateral movement and identify unknown threats using machine learning, big data and behavioural analysis
Extending Cyber Investigations Beyond the Organization
Scour the open, deep and dark web to identify planned and active cyber-crime campaigns, illegal commerce of exploits and vulnerabilities and indicators of breaches and data leaks
Automating Cyber Investigations
Leveraging artificial intelligence and big data analytics to cross reference and automatically investigate 100% of alerts from detection and forensic sensors to build visual, prioritized security incidents
Simplified SOC Operations
Replacing the need for multiple security tools with a single unified investigation platform that provides analysts with visual attack storylines, right click forensics, documentation & reporting, and integrated response