Swiss Treasury Summit 2019

The annual meeting of Swiss treasurers takes place on September 11, at Lucerne Univeristy of Applied Sciences and Arts, Campus Rotkreuz Rotkreuz.

The Swiss Treasury Summit is the meeting of treasury specialists in Switzerland. This year's meeting will once again promote the profession of treasurer. The programme is dedicated to current challenges in the financial management of companies.

 

The Swiss Treasury Summit 2019 will feature exciting presentations with a great deal of practical relevance and various workshop slots.

Ivan Bütler of Compass Security will show how hackers proceed to access sensitive data. His aim is to sensitize you to relevant ICT security aspects. His talk in his "Data (in)security, the anatomy of hacker attacks" starts at 4.30 p.m.

 

Date: Wednesday, September 11, 2019

Location: Lucerne University of Applied Sciences and Arts, Campus Zug-Rotkreuz, Suurstoffi 12, 6343 Rotkreuz

Target audience: Treasury employees responsible for financing, hedging, credit risk, payment transactions, FX, banking relations, execution, reporting, regulation 

 

Further information on the Swiss Treasury Summit 2019 can be found on the HSLU website.

NEWS

Sicherheitsrisiken erkennen und reduzieren

Im «KMU Magazin» gibt Security Analyst Fabio Poloni Tipps, wie KMU sich gegen Cyberangriffe wappnen können.  Read more

Vulnerability in the Windows Task Scheduler

Sylvain Heiniger identified a vulnerability in the Windows Task Scheduler. Read more

Ransomware-Attacke: Datendiebe erpressen Schweizer Unternehmen

Die Schweizer Herstellerin von Schienenfahrzeugen Stadler Rail AG wurde Opfer einer Cyber Attacke. Das Vorgehen der Angreifer sei typisch, sagt... Read more

ARCHIVES

Compass Security Blog

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

Reversing a .NET Orcus dropper

In this blog post we will reverse engineer a sample which acts as downloader for malware (aka a “dropper”). It is not uncommon to find such a downloader during DFIR engagements so we decided to take a... mehr

ZUM BLOG