Schedule

Conference – October 28, 2025

Resilience in a mad, mad world

Sessions related to the main conference topic „Resilience in a mad, mad world” are highlighted with a gray background.
Time Arena
Moderator
08:00 - 09:00
09:00 - 09:15
Dr. Christian Folini's avatar
Dr. Christian Folini
Program Chair, Swiss Cyber Storm
Show description
Guests are welcomed by the organizers for this year’s Swiss Cyber Storm conference.
09:15 - 09:55
Mark Barwinski's avatar
Mark Barwinski
Global Cybersecurity Leader and Board Adviser
09:55 - 10:05
10:05 - 10:50
10:50 - 11:20
11:25 - 11:55
12:00 - 12:30
Aram Hovsepyan's avatar
Aram Hovsepyan
Founder and CEO of Codific
Show description
Security teams love metrics. Beautiful dashboards, filled with vulnerability counts, alert volumes, SLA compliance for fix times, training hours logged, etc. However, do any of these metrics actually make organizations more secure? The uncomfortable truth is that most security metrics are questionable, at least from a scientific perspective.
12:30 - 14:00
14:00 - 14:30
14:35 - 15:05
15:10 - 15:40
Roman Hüssy's avatar
Roman Hüssy
Co-head of GovCERT at NCSC
Show description

In this talk I will give you some insights into our work at the NCSC and the cyber threat landscape in Switzerland by presenting two real-world cases that we have handled this year.

In the first part, I will show how a suspected nation state threat actor used an Open-Relay-Box (ORB) network in Switzerland to attack an NGO in Switzerland. In the second part, I will shed some light into suspected DPRK activities that are targeting employees of Swiss Crypto Firms with fake job offers.

15:40 - 16:20
16:20 - 16:50
16:55 - 17:30
17:30 - 21:00
Show description
Our standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day. Naturally, most of the speakers will still be around, so don’t rush off after the last talk.
18:30 - 18:45
Show description
Distribution of prizes for the Sponsoring Raffle.
Time Scenario
Moderator
08:00 - 09:00
09:00 - 09:15
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:15 - 09:55
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:55 - 10:05
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
10:05 - 10:50
10:50 - 11:20
11:25 - 11:55
Show description

Geopolitical uncertainties and advancing cryptographic technologies are reshaping enterprise identity architecture. While organizations migrated from on-premises Active Directory to cloud solutions for better user experience, self-sovereign identity (SSI) frameworks now present a paradigm shift toward decentralized identity management.

This presentation examines how the Swiss E-ID transforms enterprise identity strategies beyond government services. We analyze technical foundations of SSI implementations, comparing zero-knowledge proof mechanisms with confidential computing approaches for secure credential storage and selective disclosure.

12:00 - 12:30
Show description
„Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities. Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems. Smart Cities by nature use a combination of IT and OT systems, but have no established or holistic approach for managing overlapping risks to both. The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined. Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors.
12:30 - 14:00
14:00 - 14:30
14:35 - 15:05
Panos Vlachos's avatar
Panos Vlachos
Lead Information Security Engineer at Mastercard
Show description
In a world where digital threats increasingly target the most vulnerable, the CyberPeace Builders programme stands as a beacon of resilience and solidarity. This talk introduces the initiative led by the CyberPeace Institute, which connects cybersecurity professionals with NGOs – often described as target rich, resource poor, due to their limited cyber resources. Drawing from personal experience as a CyberPeace Builder and Cyber Ranger, Panos shares stories from real-world missions – from warzone border crossings to dark web threat monitoring and securing high-stakes AI services – highlighting how empathy, adaptability, and collaboration can transform digital defence into a humanitarian act. Attendees will gain insight into how the programme works, why it matters, and how they too can contribute to building cyber peace. Whether you’re a seasoned CISO or an aspiring engineer, your unique skills can make a real diMerence. Join us in rethinking resilience not just as a technical goal, but as a shared humanitarian responsibility and a unique.
15:10 - 15:40
Show description
The talk sheds light on the complex interplay of humans and technology in cybersecurity. It provides insights into the relevance of the human factor in cybersecurity and explains why it is not sufficient to make cybersecurity technologies usable to enhance security. Rather than independent system components or even “enemies”, humans and technology should be considered as a team. Augmenting each other’s strengths can enhance resilience, i.e., the ability to adapt to unforeseen circumstances – which is crucial in uncertain times.
15:40 - 16:20
16:20 - 16:50
16:55 - 17:30
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
17:30 - 21:00
Show description
Our standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day. Naturally, most of the speakers will still be around, so don’t rush off after the last talk.
18:30 - 18:45
Show description
Distribution of prizes for the Sponsoring Raffle.
Time Panorama – Sponsoring
Moderator
08:00 - 09:00
09:00 - 09:15
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:15 - 09:55
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
09:55 - 10:05
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
10:05 - 10:50
10:50 - 11:20
Show description
In today’s unpredictable digital landscape, resilience is a necessity, not a luxury. This talk will explore how cloud-native detection systems are reshaping the resilience landscape. Leveraging scalable platforms such as Microsoft Sentinel and Defender XDR, along with advanced threat intelligence and automated response playbooks, cloud technologies offer unparalleled reach and agility. This talk will demonstrate, through practical examples and strategic perspectives, that detection at cloud scale is not merely a technical capability, but a cornerstone of modern resilience.
11:25 - 11:55
12:00 - 12:30
Angelo Violetti's avatar
Angelo Violetti
B2B CSIRT Analyst at Swisscom
Show description

Microsoft 365 has become a cornerstone of enterprise productivity — and a growing target for sophisticated cyber threats. In this talk, we’ll explore how Swisscom’s B2B CSIRT has optimised the incident response process for Microsoft 365 through automation and expert-driven detection logic.

We’ll introduce Swisscom’s Next-Gen IR automation framework, which enables rapid, secure collection of forensic logs by registering a dedicated application in the customer’s tenant with appropriate permissions. This automation significantly accelerates the start of investigations and ensures comprehensive visibility across M365 workloads.

12:30 - 14:00
14:00 - 14:30
David Fridrih's avatar
David Fridrih
Senior Penetration Tester at InfoGuard AG
Dario Weiss's avatar
Dario Weiss
Penetration Tester at InfoGuard AG
Show description
Real-life pentests! Creative attack paths into the heart of the network. It’s not always the big exploits – often small vulnerabilities and clever ideas are enough. In this interesting and insightful presentation, the InfoGuard pentesting team uses real-life examples to show how zero-day vulnerabilities, misconfigurations or social engineering attacks opened the way for complete network takeovers. A must for security teams, IT managers and anyone who wants to understand how creative penetration testing works—beyond the standard checklists.
14:35 - 15:05
15:10 - 15:40
Moritz Zollinger's avatar
Moritz Zollinger
Security Consultant at TEMET AG
Show description
Business is driving rapidly changing IT, constantly demanding new services and technology. Setting up AI and SaaS in corporations has never been easier. Therefore, lots of apps and services pop up left and right, and it’s getting tougher to keep our heads above water when it comes to cybersecurity and compliance.
15:40 - 16:20
16:20 - 16:50
Alain Mowat's avatar
Alain Mowat
Head of Research and Development at Orange Cyberdefense Switzerland
Show description
By its own definition, Dell’s Wyse Management Suite is „a secure hybrid cloud management solution for Dell thin clients”. While attempting to determine how secrets are encrypted in the policies pushed to thin clients, we stumbled down a rabbit hole which led to the discovery of multiple vulnerabilities.
16:55 - 17:30
Show description
There is no talk on this track at this time, check the schedule of the Arena track instead.
17:30 - 21:00
Show description
Our standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day. Naturally, most of the speakers will still be around, so don’t rush off after the last talk.
18:30 - 18:45
Show description
Distribution of prizes for the Sponsoring Raffle.
Copyright © 2025
 
Swiss Cyber Storm
Hosting graciously provided for free by Nine