Swiss Treasury Summit 2019

The annual meeting of Swiss treasurers takes place on September 11, at Lucerne Univeristy of Applied Sciences and Arts, Campus Rotkreuz Rotkreuz.

The Swiss Treasury Summit is the meeting of treasury specialists in Switzerland. This year's meeting will once again promote the profession of treasurer. The programme is dedicated to current challenges in the financial management of companies.

 

The Swiss Treasury Summit 2019 will feature exciting presentations with a great deal of practical relevance and various workshop slots.

Ivan Bütler of Compass Security will show how hackers proceed to access sensitive data. His aim is to sensitize you to relevant ICT security aspects. His talk in his "Data (in)security, the anatomy of hacker attacks" starts at 4.30 p.m.

 

Date: Wednesday, September 11, 2019

Location: Lucerne University of Applied Sciences and Arts, Campus Zug-Rotkreuz, Suurstoffi 12, 6343 Rotkreuz

Target audience: Treasury employees responsible for financing, hedging, credit risk, payment transactions, FX, banking relations, execution, reporting, regulation 

 

Further information on the Swiss Treasury Summit 2019 can be found on the HSLU website.

NEWS

So leicht wird dein Handy gehackt

Die Blick-Reporterin weiss dank Ivan Bütler, warum man auch bei einer SMS von Mami kritisch sein soll. Read more

Rückblick Digitaltag 2019

Ivan Bütler von Compass Security hat einen aufregenden Digitaltag hinter sich. Seine Live Hacks am Züricher Hauptbahnhof waren ein Publikumsmagnet. Read more

Wie steht es um die Sicherheit der Schweizer Stromversorgung?

Im Bericht der Eidgenössischen Elektrizitätskommision kommt die Schweizer Stromversorgung diesbezüglich nicht gut weg. Studerus AG hat dazu Cyrill... Read more

ARCHIVES

Compass Security Blog

enOcean Security

In this post, we are going to take a closer look at the enOcean technology, how security is implemented, and if the security measures and options available are sufficient. mehr

Privilege escalation in Windows Domains (3/3)

In this last article about privilege escalation in Windows domains, we demonstrate how to extract credentials from running systems to compromise high-privileged accounts. mehr

ZUM BLOG