Conference – October 28, 2025
Resilience in a mad, mad world
Time | Arena | Scenario | Panorama – Sponsoring |
---|---|---|---|
Moderator | |||
08:00
-
09:00 | |||
09:00
-
09:15 | ![]() Dr. Christian Folini Program Chair, Swiss Cyber Storm Show descriptionGuests are welcomed by the organizers for this year’s Swiss Cyber Storm conference. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:15
-
09:55 | ![]() Mark Barwinski Global Cybersecurity Leader and Board Adviser | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:55
-
10:05 | ![]() Marc Bollhalder Organizer and Lead, Swiss Hacking Challenge ![]() Manuel Bürge Organizer, Swiss Hacking Challenge | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
10:05
-
10:50 | |||
10:50
-
11:20 | ![]() Arthur Vuagnioux Team Leader SOC
at
Swiss Post Cybersecurity AG Show descriptionIn today’s unpredictable digital landscape, resilience is a necessity, not a luxury.
This talk will explore how cloud-native detection systems are reshaping the resilience landscape.
Leveraging scalable platforms such as Microsoft Sentinel and Defender XDR, along with advanced threat intelligence and automated response playbooks, cloud technologies offer unparalleled reach and agility.
This talk will demonstrate, through practical examples and strategic perspectives, that detection at cloud scale is not merely a technical capability, but a cornerstone of modern resilience. | ||
11:25
-
11:55 | Show descriptionGeopolitical uncertainties and advancing cryptographic technologies are reshaping enterprise identity architecture. While organizations migrated from on-premises Active Directory to cloud solutions for better user experience, self-sovereign identity (SSI) frameworks now present a paradigm shift toward decentralized identity management. This presentation examines how the Swiss E-ID transforms enterprise identity strategies beyond government services. We analyze technical foundations of SSI implementations, comparing zero-knowledge proof mechanisms with confidential computing approaches for secure credential storage and selective disclosure. | ||
12:00
-
12:30 | ![]() Aram Hovsepyan Founder and CEO of Codific Show descriptionSecurity teams love metrics.
Beautiful dashboards, filled with vulnerability counts, alert volumes, SLA compliance for fix times, training hours logged, etc.
However, do any of these metrics actually make organizations more secure? The uncomfortable truth is that most security metrics are questionable, at least from a scientific perspective. | Show description„Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities.
Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems.
Smart Cities by nature use a combination of IT and OT systems, but have no established or holistic approach for managing overlapping risks to both.
The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined.
Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors. | ![]() Angelo Violetti B2B CSIRT Analyst
at
Swisscom Show descriptionMicrosoft 365 has become a cornerstone of enterprise productivity — and a growing target for sophisticated cyber threats. In this talk, we’ll explore how Swisscom’s B2B CSIRT has optimised the incident response process for Microsoft 365 through automation and expert-driven detection logic. We’ll introduce Swisscom’s Next-Gen IR automation framework, which enables rapid, secure collection of forensic logs by registering a dedicated application in the customer’s tenant with appropriate permissions. This automation significantly accelerates the start of investigations and ensures comprehensive visibility across M365 workloads. |
12:30
-
14:00 | |||
14:00
-
14:30 | ![]() David Fridrih Senior Penetration Tester
at
InfoGuard AG ![]() Dario Weiss Penetration Tester
at
InfoGuard AG Show descriptionReal-life pentests! Creative attack paths into the heart of the network.
It’s not always the big exploits – often small vulnerabilities and clever ideas are enough.
In this interesting and insightful presentation, the InfoGuard pentesting team uses real-life examples to show how zero-day vulnerabilities, misconfigurations or social engineering attacks opened the way for complete network takeovers.
A must for security teams, IT managers and anyone who wants to understand how creative penetration testing works—beyond the standard checklists. | ||
14:35
-
15:05 | ![]() Panos Vlachos Lead Information Security Engineer
at
Mastercard Show descriptionIn a world where digital threats increasingly target the most vulnerable, the CyberPeace Builders programme stands as a beacon of resilience and solidarity.
This talk introduces the initiative led by the CyberPeace Institute, which connects cybersecurity professionals with NGOs – often described as target rich, resource poor, due to their limited cyber resources.
Drawing from personal experience as a CyberPeace Builder and Cyber Ranger, Panos shares stories from real-world missions – from warzone border crossings to dark web threat monitoring and securing high-stakes AI services – highlighting how empathy, adaptability, and collaboration can transform digital defence into a humanitarian act.
Attendees will gain insight into how the programme works, why it matters, and how they too can contribute to building cyber peace.
Whether you’re a seasoned CISO or an aspiring engineer, your unique skills can make a real diMerence.
Join us in rethinking resilience not just as a technical goal, but as a shared humanitarian responsibility and a unique. | ||
15:10
-
15:40 | ![]() Roman Hüssy Co-head of GovCERT
at
NCSC Show descriptionIn this talk I will give you some insights into our work at the NCSC and the cyber threat landscape in Switzerland by presenting two real-world cases that we have handled this year. In the first part, I will show how a suspected nation state threat actor used an Open-Relay-Box (ORB) network in Switzerland to attack an NGO in Switzerland. In the second part, I will shed some light into suspected DPRK activities that are targeting employees of Swiss Crypto Firms with fake job offers. | Show descriptionThe talk sheds light on the complex interplay of humans and technology in cybersecurity.
It provides insights into the relevance of the human factor in cybersecurity and explains why it is not sufficient to make cybersecurity technologies usable to enhance security.
Rather than independent system components or even “enemies”, humans and technology should be considered as a team.
Augmenting each other’s strengths can enhance resilience, i.e., the ability to adapt to unforeseen circumstances – which is crucial in uncertain times. | ![]() Moritz Zollinger Security Consultant
at
TEMET AG Show descriptionBusiness is driving rapidly changing IT, constantly demanding new services and technology.
Setting up AI and SaaS in corporations has never been easier.
Therefore, lots of apps and services pop up left and right, and it’s getting tougher to keep our heads above water when it comes to cybersecurity and compliance. |
15:40
-
16:20 | |||
16:20
-
16:50 | ![]() Michael Hausding Incident and Abuse Handler
at
Switch CERT | ![]() Alain Mowat Head of Research and Development
at
Orange Cyberdefense Switzerland Show descriptionBy its own definition, Dell’s Wyse Management Suite is „a secure hybrid cloud management solution for Dell thin clients”.
While attempting to determine how secrets are encrypted in the policies pushed to thin clients, we stumbled down a rabbit hole which led to the discovery of multiple vulnerabilities. | |
16:55
-
17:30 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. | |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. | Show descriptionDistribution of prizes for the Sponsoring Raffle. | Show descriptionDistribution of prizes for the Sponsoring Raffle. |
Time | Arena |
---|---|
Moderator | |
08:00
-
09:00 | |
09:00
-
09:15 | ![]() Dr. Christian Folini Program Chair, Swiss Cyber Storm Show descriptionGuests are welcomed by the organizers for this year’s Swiss Cyber Storm conference. |
09:15
-
09:55 | ![]() Mark Barwinski Global Cybersecurity Leader and Board Adviser |
09:55
-
10:05 | ![]() Marc Bollhalder Organizer and Lead, Swiss Hacking Challenge ![]() Manuel Bürge Organizer, Swiss Hacking Challenge |
10:05
-
10:50 | |
10:50
-
11:20 | |
11:25
-
11:55 | |
12:00
-
12:30 | ![]() Aram Hovsepyan Founder and CEO of Codific Show descriptionSecurity teams love metrics.
Beautiful dashboards, filled with vulnerability counts, alert volumes, SLA compliance for fix times, training hours logged, etc.
However, do any of these metrics actually make organizations more secure? The uncomfortable truth is that most security metrics are questionable, at least from a scientific perspective. |
12:30
-
14:00 | |
14:00
-
14:30 | |
14:35
-
15:05 | |
15:10
-
15:40 | ![]() Roman Hüssy Co-head of GovCERT
at
NCSC Show descriptionIn this talk I will give you some insights into our work at the NCSC and the cyber threat landscape in Switzerland by presenting two real-world cases that we have handled this year. In the first part, I will show how a suspected nation state threat actor used an Open-Relay-Box (ORB) network in Switzerland to attack an NGO in Switzerland. In the second part, I will shed some light into suspected DPRK activities that are targeting employees of Swiss Crypto Firms with fake job offers. |
15:40
-
16:20 | |
16:20
-
16:50 | ![]() Michael Hausding Incident and Abuse Handler
at
Switch CERT |
16:55
-
17:30 | |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. |
Time | Scenario |
---|---|
Moderator | |
08:00
-
09:00 | |
09:00
-
09:15 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:15
-
09:55 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:55
-
10:05 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
10:05
-
10:50 | |
10:50
-
11:20 | |
11:25
-
11:55 | Show descriptionGeopolitical uncertainties and advancing cryptographic technologies are reshaping enterprise identity architecture. While organizations migrated from on-premises Active Directory to cloud solutions for better user experience, self-sovereign identity (SSI) frameworks now present a paradigm shift toward decentralized identity management. This presentation examines how the Swiss E-ID transforms enterprise identity strategies beyond government services. We analyze technical foundations of SSI implementations, comparing zero-knowledge proof mechanisms with confidential computing approaches for secure credential storage and selective disclosure. |
12:00
-
12:30 | Show description„Smart City” has been a trendy buzzphrase used by politicians, city planners, and tech companies for over a decade now — but their shiny promises gloss over dangerous realities.
Downtime and damages in municipalities due to cyberattacks regularly make the news, but we focus primarily on securing and recovering IT systems.
Smart Cities by nature use a combination of IT and OT systems, but have no established or holistic approach for managing overlapping risks to both.
The consequences to security from varied stakeholders involved in Smart City planning and implementation go unexamined.
Human hazards, vulnerable devices, and data management issues build on these to create diverse and creative attack paths for all sorts of threat actors. |
12:30
-
14:00 | |
14:00
-
14:30 | |
14:35
-
15:05 | ![]() Panos Vlachos Lead Information Security Engineer
at
Mastercard Show descriptionIn a world where digital threats increasingly target the most vulnerable, the CyberPeace Builders programme stands as a beacon of resilience and solidarity.
This talk introduces the initiative led by the CyberPeace Institute, which connects cybersecurity professionals with NGOs – often described as target rich, resource poor, due to their limited cyber resources.
Drawing from personal experience as a CyberPeace Builder and Cyber Ranger, Panos shares stories from real-world missions – from warzone border crossings to dark web threat monitoring and securing high-stakes AI services – highlighting how empathy, adaptability, and collaboration can transform digital defence into a humanitarian act.
Attendees will gain insight into how the programme works, why it matters, and how they too can contribute to building cyber peace.
Whether you’re a seasoned CISO or an aspiring engineer, your unique skills can make a real diMerence.
Join us in rethinking resilience not just as a technical goal, but as a shared humanitarian responsibility and a unique. |
15:10
-
15:40 | Show descriptionThe talk sheds light on the complex interplay of humans and technology in cybersecurity.
It provides insights into the relevance of the human factor in cybersecurity and explains why it is not sufficient to make cybersecurity technologies usable to enhance security.
Rather than independent system components or even “enemies”, humans and technology should be considered as a team.
Augmenting each other’s strengths can enhance resilience, i.e., the ability to adapt to unforeseen circumstances – which is crucial in uncertain times. |
15:40
-
16:20 | |
16:20
-
16:50 | |
16:55
-
17:30 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. |
Time | Panorama – Sponsoring |
---|---|
Moderator | |
08:00
-
09:00 | |
09:00
-
09:15 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:15
-
09:55 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
09:55
-
10:05 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
10:05
-
10:50 | |
10:50
-
11:20 | ![]() Arthur Vuagnioux Team Leader SOC
at
Swiss Post Cybersecurity AG Show descriptionIn today’s unpredictable digital landscape, resilience is a necessity, not a luxury.
This talk will explore how cloud-native detection systems are reshaping the resilience landscape.
Leveraging scalable platforms such as Microsoft Sentinel and Defender XDR, along with advanced threat intelligence and automated response playbooks, cloud technologies offer unparalleled reach and agility.
This talk will demonstrate, through practical examples and strategic perspectives, that detection at cloud scale is not merely a technical capability, but a cornerstone of modern resilience. |
11:25
-
11:55 | |
12:00
-
12:30 | ![]() Angelo Violetti B2B CSIRT Analyst
at
Swisscom Show descriptionMicrosoft 365 has become a cornerstone of enterprise productivity — and a growing target for sophisticated cyber threats. In this talk, we’ll explore how Swisscom’s B2B CSIRT has optimised the incident response process for Microsoft 365 through automation and expert-driven detection logic. We’ll introduce Swisscom’s Next-Gen IR automation framework, which enables rapid, secure collection of forensic logs by registering a dedicated application in the customer’s tenant with appropriate permissions. This automation significantly accelerates the start of investigations and ensures comprehensive visibility across M365 workloads. |
12:30
-
14:00 | |
14:00
-
14:30 | ![]() David Fridrih Senior Penetration Tester
at
InfoGuard AG ![]() Dario Weiss Penetration Tester
at
InfoGuard AG Show descriptionReal-life pentests! Creative attack paths into the heart of the network.
It’s not always the big exploits – often small vulnerabilities and clever ideas are enough.
In this interesting and insightful presentation, the InfoGuard pentesting team uses real-life examples to show how zero-day vulnerabilities, misconfigurations or social engineering attacks opened the way for complete network takeovers.
A must for security teams, IT managers and anyone who wants to understand how creative penetration testing works—beyond the standard checklists. |
14:35
-
15:05 | |
15:10
-
15:40 | ![]() Moritz Zollinger Security Consultant
at
TEMET AG Show descriptionBusiness is driving rapidly changing IT, constantly demanding new services and technology.
Setting up AI and SaaS in corporations has never been easier.
Therefore, lots of apps and services pop up left and right, and it’s getting tougher to keep our heads above water when it comes to cybersecurity and compliance. |
15:40
-
16:20 | |
16:20
-
16:50 | ![]() Alain Mowat Head of Research and Development
at
Orange Cyberdefense Switzerland Show descriptionBy its own definition, Dell’s Wyse Management Suite is „a secure hybrid cloud management solution for Dell thin clients”.
While attempting to determine how secrets are encrypted in the policies pushed to thin clients, we stumbled down a rabbit hole which led to the discovery of multiple vulnerabilities. |
16:55
-
17:30 | Show descriptionThere is no talk on this track at this time, check the schedule of the Arena track instead. |
17:30
-
21:00 | Show descriptionOur standing dinner allows everybody to mingle, meet friends and talk about the many interesting talks of the day.
Naturally, most of the speakers will still be around, so don’t rush off after the last talk. |
18:30
-
18:45 | Show descriptionDistribution of prizes for the Sponsoring Raffle. |