11 annual e-crime germany - akj associates german… · 11th annual e-crime germany akj associates...
Post on 09-Oct-2020
2 Views
Preview:
TRANSCRIPT
11th Annual e-Crime Germany
AKJ Associates
19th January, 2018, Munich
Achieving compliance, maintaining securityBalancing the demands of GDPR and the next wave of security technology
!!!"#$%#&&'()#*+&"(',-+.+/*-0+1,#/2
AKJ Associates
!"#$%&'%()*%+,'(%-*+./-0/1%2*.3%2*(%0/%425*3'*4630(27%8/%,/*%'0-*9%%0/:,3+.(0,/%'*4630(2%;3,:*''0,/.<'%+6'(%*/'63*%4,+;<0./4*%=0()%>?@A9%.%-.(.%;30B.42%-03*4(0B*%().(%3*C603*'%4,+;./0*'%(,%(36<2%6/-*3'(./-%()*%'+.<<*'(%-*(.0<'%,:%()*03%-.(.%:<,='%./-%56'0/*''%(*4)/,<,127%
D6(%,/%()*%,()*39%.%/*=%425*3'*4630(2%.3+'%3.4*%0'%6/-*3%=.29%=)04)%3*C603*'%E&F8'%./-%()*03%;**3'%(,%6/-*3'(./-%2*(%./,()*3%/*=%1*/*3.(0,/%,:%,::*/'0B*%./-%-*:*/'0B*%(*4)/,<,10*'G%H&%./-%.6(,+.(0,/%<,,I%<0I*%.(%<*.'(%;.3(%,:%.%B0.5<*%',<6(0,/%(,%()*%;3,5<*+'%,:%'4.<*%./-%0//,B.(0,/%0/%()*%()3*.('4.;*7%
H'%.((.4I*3'%-*B*<,;%'./-5,J%*B.-0/1%+.<=.3*9%H&K;,=*3*-%.((.4I%',:(=.3*%./-%.-.;(*-%'(.(*K<*B*<%).4I'9%E&F8'%/**-%(,%I**;%6;%=0()%3.;0-<2%.-B./40/1%(*4)/,<,12%=)0<*%'.(0':20/1%0/43*.'0/1%EK'60(*%-*+./-'%:,3%4,+;<0./4*%./-%4,'(K*::040*/427
&/%.--0(0,/9%+,'(%56'0/*''*'%'(0<<%6/-*3*'(0+.(*%()*%<*B*<%,:%-010(.<0'.(0,/%3*C603*-%(,%'63B0B*%0/%.%=,3<-%-30B*/%52%*KE,++*34*9%0/-6'(30.<%./-%1*/*3.<%;3,4*''%.6(,+.(0,/9%B03(6.<0'.(0,/%./-%-.(.%./.<2(04'7
F,%),=%4./%E&F8'%.4)0*B*%()0'%0/43*.'0/1<2%53,.-%./-%4,+;<*J%'*(%,:%,5L*4(0B*'M%
e-Crime Munich 2018: a difficult balancing act
!!"#$%#&'()$*)+#&,-&$',),.+&/$"(.$0-)1,&'#2$34#5$6789:$,+$"(.$2,.0-;#$($.#&,-<.$,)+&<.,-)$,)+-$,+.$.#&;#&.$,)$=#0#'5#&$678>?$!"#$(++(0@$,.$+"-<A"+$+-$"(;#$.##)$2(+($#B1,C+&(+#2 1-&$<D$+-$($/#(&$5#1-&#$,+.$2,.0-;#&/EF$=GH
I4-&$'()/$1(',C,(&$(++(0@.E$J#$#BD#0+$D&-A&#..$,)$H*$+-$#BD()2$+"#$.#+$-1$(0+-&.$J"-$(&#$0(D(5C#$-1$0(&&/,)A$-<+$+"#$(++(0@E$+"# &(+#$(+$J",0"$+"#.#$(0+-&.$0()$0(&&/$,+$-<+E$()2$+"#$.#+$-1$DC(<.,5C#$+(&A#+.EF$!"#$K(C,0,-<.$L.#$-1$H*M$4-�(.+,)AE$G&#;#)+,-)E$()2 K,+,A(+,-)$
*)+&-2<0+,-
)
#NO&,'#$*)1-&'(+,-)$P#0<&,+/$K<),0"$J,CC$0-;#&$+"#.#$()2$-+"#&$@#/$.<5Q#0+.$1-&$,+.$(<2,#)0#$-1$D&-1#..,-)(C.$+(.@#2$J,+"$.(1#A<(&2,)A$2,A,+(C$(..#+.$()2$.#).,+,;#$2(+(?$!"#&#$J,CC$5#$&#(CNC,1#$0(.#$.+<2,#.E$.+&(+#A,0$+(C@.$()2$+#0"),0(C$5&#(@N-<+$.#..,-).$1&-'$.#0<&,+/$+#('.$
5#",)2$.-'#$-1$+"#$J-&C2R.$'-.+$(2',$5&()2.?
===7.IL.'',40.(*'74,+N*B*/(N1*3+./2
!
AKJ Associates
!"#$%&''&($)*&+(",-.)/0(&! !"#$%&'(%)*+,-%-,./0&*)-1%(,2&'(3%&-,%,45,'367,8%+)9%*)%-,(/:,%*+,%:)3*;! <).'6*67,=%-)>)*6:%5-):,33%&/*)2&*6)'%&'(%?@%3)0/*6)'3%*)%:)2506&':,%(,2&'(3! A/*3)/-:6'.8%B-)2%<0)/(=%*)%C&&C%*)%76-*/&0%<@CA%D +)9%2/:+%6'E+)/3,%()%1)/%',,(;
1&2+$&(30"."45+'"6+/$$/(7&6#+/08+8&'&08&6#! ?@%&**&:F3%>&3,(%)'%&'&01363%)B%3):6&0%2,(6&%&-,%*+,%',4*%*+-,&*G%C)0/*6)'3;! H+&*%()%7,'()-3%2,&'%>1%I?@J%&'(%I2&:+6',%0,&-'6'.J%&'(%9+&*%K/,3*6)'3%3+)/0(%
<@CA3%>,%&3F6'.%&>)/*%*+,3,%',9%5-)(/:*3;! <&'%',9%(,:,5*6)'%*,:+')0).1%+,05%1)/%:)2>&*%:1>,-%&**&:F,-3;
9&(:6)04+#-&()/.)#&8+#5#$&,#! C?#%&'(%)*+,-%L$#%6250,2,'*&*6)'3%&-,%&**-&:*67,%*&-.,*38%()%<@CA3%.,*%6'7)07,(;! H+&*%&>)/*%*-,&3/-1%2&'&.,2,'*=%:&3+%&'(%-63F%2&'&.,2,'*%313*,23;! @'(/3*-6&0=%3/5501%:+&6'=%0).63*6:3%&'(%2&'/B&:*/-6'.8%6(,'*6B16'.%&'(%3,:/-6'.%
,2>,((,(%*,:+')0).6,3G
9&(:6)04+&,/).+/08+#"()/.+,&8)/! #+63+6'.%63%3*600%*+,%5-62&-1%&**&:F%7,:*)-=%>,:&/3,%6*%9)-F3G%H+&*%9)-F3%&.&6'3*%6*;! M)9%:&'%:)25&'6,3%5-)*,:*%+)',3*%,250)1,,3%&.&6'3*%6':-,&36'.01%3)5+63*6:&*,(%
&**&:F3;
;"<).&=+&%!",,&6(&+/08+-/5,&0$+#&(:6)$5! N+,%:+&00,'.,%)B%)2'6E:+&'',0%(6.6*&063&*6)'! O36'.%5&12,'*%3,:/-6*1%*)%0)9,-%:)3*3%&'(%6':-,&3,%-,7,'/,3! #<@%"CC%&3%&%B-&2,9)-F%B)-%5&12,'*%3,:/-6*1%&'(%!"#$%:)2506&':,
>"2+6)#75+)#+5":6+!.":8?! #/>06:%<0)/(8%*+,%&'39,-%*)%3,:/-6*1%)-%*+,%',4*%5-)>0,2;! P)76'.%9)-F0)&(3%*)%@&&C8%9+)Q3%-,35)'36>0,%B)-%9+&*;! O'(,-3*&'(6'.%,'(E5)6'*=%@"?P=%',*9)-F%&'(%&5506:&*6)'%0,7,0%:)'*-)03%6'%1)/-%
<0)/(%3,-76:,G
1&2+)8&/#+)0+)0()8&0$+6&#-"0#&! "63&3*,-%-,:)7,-1%&3%&%3,-76:,! <0)/(%&'(%&/*)2&*,(%6':6(,'*%-,35)'3,! N+,%-)0,%)(%:1>,-%6'3/-&':,
@,-."5&&+/2/6&0&##+/08+&04/4&,&0$! M)9%*)%&/*)2&*,%&'(%,'.6',,-%)/*%&3%2&'1%+/2&'%(,:636)'%5)6'*3%&3%5)336>0,! <1>,-E3,:/-6*1%*-&6'6'.8%9+&*%9)-F3%&'(%9+&*%(),3'Q*;! H+&*%&>)/*%(63+)',3*%6'36(,-3;%M)9%*)%2)'6*)-=%(,*,:*%&'(%(,B,&*
e-Crime Munich 2018: Key themes
A&5+B3
&,&#
999G&FR&33):6&*,3G:)2S,7,'*S.,-2&'1
! To
!"#"$%&$'(#$)'(*+,-$./#)'$%#0&$#(($1*2,-$3'#)44%+)'2)$&,(*45$6)$7*&#$#,"#8$%'#)44%+)'#9$(#,):;%&)$%#$&%1<4=$2:)"#)&$1(:)$<:(64)1&-$>*#$,(;$2"'$&)2*:%#=$<:(/)&&%('"4&$2,((&)$/:(1$&($1"'=$&(4*#%('&?$!"#$%#$%&'()%'**')+(,#+&%+'%$"'-./$0%&'()$1
" To build the business case for cyber spend
3'2:)"&%'+4=$"##"2@):&$":)$#":+)#%'+$,(')&#$)1<4(=))&$;%#,$2(16%'"#%('&$(/$1"4;":)9$<,%&,%'+$)1"%4&$"'5$,*1"'$(<):"#(:&-$A(;$2"'$2(1<"'%)&$<:(#)2#$#,)1&)4B)&$"'5$*&)$<(&%#%B)$&(2%"4$)'+%')):%'+$#($/%+,#$6"2@?$2/,%&'()%*)'3(.+$%"04*5
To secure paymentsand personal data
# To counter common cyber frauds
C(1)$(/$#,)$6)&#$2=6):D&)2*:%#=$&(4*#%('&$#:"%'$)1<4(=))&$&($;)44$#,"#$#,)=$6)2(1)$<":#$(/$"'$(:+"'%&"#%('0& 2=6):$5)/)'2)&-$E,)&)$<:(B%5):&$;(:@$;%#,$3E$"'5$AF$#($1"@)$#,%&$"$:)"4%#=-$6"'-%"'-%&'()%*)'3(.+$%./,%3'%+"#$1
$
G%'"'2%"4$&):B%2)&$2(1<"'%)&$&#:*++4)$;%#,$');$"'5$4)+"2=$&=&#)1&9$:)#"%4):&$&#:*++4)$;%#,$HI3$!CC9$"'5$)B):=(')$%&$;(::%)5$"6(*#$');$<"=1)'#$1)#,(5&$&*2,$"&$2('#"2#4)&&$"'5$<,(')-$7"#."%$'4(+#',$%/)0%/8/#4/940:%$./40/940 /,3%0/$&%+'%#;*40;0,+5
% To comply with new regulations
I=6):D&)2*:%#=$%&$+(%'+$1"'5"#(:=-$J(4*'#":=$2(11):2%"4$2(5)&$":)$'(#$)'(*+,-$F)+*4"#(:&$;"'#$2(1<"'%)&$#($5)1('&#:"#)$#:*)$2=6):D&)2*:%#=$"&$;)44$"&$6"&%2$2(1<4%"'2)-$<'-%./,%&'(%"04*%2=6>$%-#+"%+"#$5
& To outsource what they cannot do in-house
K"'=$(:+"'%&"#%('& 2"''(#$"//(:5$%'D,(*&)$C.I&$(:$&)2*:%#=$#)"1&$6%+$)'(*+,$#($2(*'#):$2=6):$#,:)"#&$)//)2#%B)4=-$C($;,"#$2"'$#,)=$(*#&(*:2)$"'5$5()&$(*#&(*:2%'+$:)"44=$&(4B)$#,)$*'5):4=%'+$:%&@$<:(64)1?$7"/+%./,%&'(%'??0)5
End-users and security professionals need your help …
@0;
',$+
)/+0
%&'()
%$'4(
+#',$
%
;;;-"@7"&&(2%"#)&-2(1L)B)'#L+):1"'=
Each event represents a targeted opportunity to address the needs of a
specific community whose need for your
solutions and services is growing.
Our events provide sponsors with a unique platform to showcase solutions, as well as
provide advice on how best to solve delegates’
key challenges.
Boost salesSponsors can tailor
messages to the needs of an audience that
shares similar concerns and challenges, looking
for solutions now.
Target growth Meet commercial aimsWe work with sponsors
to ensure they meet their commercial aims. We offer a number of sponsorship options,
each providing specific benefits.
Showcase solutions
!"#$%&!'()*%+,
Specific, actionable and relevant information for time-constrained industry professionals
The perfect platform for solution providers to deliver tailored advice to the right audience
Choice ValueLeadsFocus
We deliver a focused selling opportunity
-,!
$!'&
.$/!0"1!.2%*3'45
1)0%5
*'6$57%2!$4'/
*58'0,
!9'8%11':%*2
';)9!$4
!!!"#$%#&&'()#*+&"(',-+.+/*-0+1,#/2
You will be surrounded by the most senior buying audience in the cyber-security market.
AKJ Associates has been building relationships with senior information risk and security professionals since 1999 and our cybersecurity community is the largest of its kind globally.
We know the senior executives who drive strategy from the top, we know the enterprise architects who often control the largest budgets and we know the IT Security Leads and Engineers who so often dictate the purchase process.
All of these job titles attend the e-Crime Congress Germany.
We understand that every vendor needs to sell more. That is the bottom line.
Getting in front of the right people at the right time always increases the lead generation and always increases profitable sales activity
The most senior cybersecurity solution buyers
100%
Risk ManagementWe attract senior risk officers with
responsibility for information risk
assessment and mitigation
Fraud, Audit, ComplianceWe provide the go-to events for fraud
prevention and compliance owners at the
world’s key corporates
Data Protection & privacyWe are a key venue for decision-makers
with budget and purchasing
authority
CybersecurityWe have a 15-year track record of producing
the events cyber-security professionals take
seriously
Why do so many blue-chip vendors work with us? Real buyers …
!"#
$#%&"
#%$#'(%)#*+,+-.
/0'1#$,%'
((-*'&#%23)
4#&,
!!!"#$%#&&'()#*+&"(',-+.+/*-0+1,#/2
Face-to-face interaction with the right buyers works! Our vendors tell us it does and they
renew year after year
Talk to customersRelationships built from a personal meetings
are stronger than those initiated by solely digital conversations
Build relationshipsMeet dozens or hundreds of selected buyers in just one or two days – the value of a high
quality event
Save time
Getting in front of the right people andexplaining your products face to face is
the most effective lead generation.
Lead sourcing
All delegates are the right delegates. They have all been researched and confirmed as senior
and with buying capacity
Increase salesDelegates take all lunches and breaks are in the
exhibition. So sponsors and exhibitors are always surrounded by qualified buyers
Get your message across
Why do so many blue-chip vendors work with us? Real benefits…
!"#
$#%&"
#%&'(%)'*+&,'
-%.#-/
'$)%0
#&%&"
#,$%1
#))20#%23$'))
!!!"#$%#&&'()#*+&"(',-+.+/*-0+1,#/2
Ninety five percent of our exhibitors and sponsors work with us on a number of occasions each year.
Our sponsor renewal rate is unrivalled in the marketplace.
This is because our sponsors generate real business at our events every year
What our sponsors say about us
!"#$%&'(#)*"#"+"')#+",-#
.,%(&/)0+"1#0)#234#5%%(#)%#6"")#
.%)"')037#/&4)%6",4#3'(#50+"4#3#
/*3'/"#$%,#("/040%'#638",4#)%#
6"")#&4#3'(#&'(",4)3'(#2*3)#
2"#(%#3'(#*%2#2"#/3'#*"7.#
)*"6#20)*#)*"0,#4"/&,0)-9
:#5,"3)#4&//"449#;,53'04"( 3'(#
,&'#20)*#)*"#&4&37#:<=#
$,0"'(70'"44#3'(#"$$0/0"'/-1#2"#
2","#+",-#*3..-#)%#*3+"#
4&..%,)"(#3'(#2077#>"#.7"34"(#)%#
3))"'(#3530'9
?*"#8"-#)%#3#4&//"44$&7#"+"')#04#
)%#638"#4&,"#)*3)#-%&#*3+"#
*05*7-#,"7"+3')#/%')"')1#3#
)3,5")"(#3&(0"'/"#3'(#)*"#
%..%,)&'0)-#)%#'")2%,89#@A/,06"#
B,3'8$&,)#.,%+0("(#C&4)#)*3)9
!"#$%&'%()
*+(,-'$'.&,/$0*#$%1&
)'&-2&'3$4
&$1,2&$)
,+5$)*#&
!!!"#$%#&&'()#*+&"(',-+.+/*-0+1,#/2
top related