Information Security Challenges at Scale

Abstract: In order to support its fast growing business Zalando applies Radical Agility, a software development methodology that allows engineers to get work done while management gets out of the way. It’s based on three pillars: Autonomy, Mastery, and Purpose, all held together and bound by organisational trust. While this enables our engineers to build

Fully Verified Outsourced Computation

Abstract: Frequent headline-grabbing data breaches suggest that current best practices for safeguarding personal data are woefully inadequate.  To try to move beyond the cycle of attacks and patches we see today, my group designs and builds systems with formal end-to-end guarantees.  For example, to provide strong guarantees for outsourced computations, my colleagues and I developed

Insights into Cyber Assurance Testing

Abstract: Independent reviews of effectiveness of cyber controls and capabilities to respond to cyber events are fundamental components in the overall cyber security strategy for an organization. This session aims to propose participants with insights on Cyber Assurance Testing methodologies including Red Team Testing, Education and Awareness Testing and Cyber Assurance exercises.

Development & Innovation at Swiss Post

Abstract: Swiss Post is a diversified Group that operates in four markets. Its three subsidiaries Post CH Ltd, PostFinance Ltd and PostBus Ltd provide high-quality, marketable and innovative services, and make every effort to satisfy the high expectations of their customers. Swiss Post constantly develops new solutions at the interface between the physical and digital

SPARK for Security

Abstract: The SPARK open source technology developed and commercialized by AdaCore (since 2008) and Altran (since 1987) is both a programming language and formal program verification toolset aimed at the highest levels of software assurance. In this presentation, we will give an overview of the SPARK Ada language and SPARK proof technology, focusing on its

Adversaries beyond neglect: a stroll through the garden of differential privacy

Abstract: We have a clear understanding about how to handle information security in cryptographic cases where adversaries (provably) have a negligible chance of success. Definitions are solid and all is well. However, in many cases relevant for privacy, we cannot achieve such strong notions without paying outrageous costs: a utility approaching zero, vast communication costs,

SpyPi

Abstract Over the past years technology has become an essential part of our daily life. Be it free time, work, research or education – with the help of technology we’re able to set foot on yet unknown terrain, save resources and be more productive. We’re assumingly about to face even more fundamental changes considering the