Day 2 - 21 September 2022

10:00AM

(CET)

Chair’s Welcome

Chairpersons welcome and opening remarks. 

10:10AM

(CET)

Presentation: Winning the Cyber Security Arms Race

  • What protection do you need? Reviewing the top 2022 threats and how to overcome them.  
  • What are the best tools you can have in your arsenal? 

10:40AM

(CET)

Senior Representative, Snyk

Associated Talks:

10:40AM - Day 1

View Presentation: Why Third-Party Risk Management Should be Central to Your Cybersecurity Strategy

10:15AM - Day 1

View Presentation: The Latest Social Engineering Threats

View Full Info

Presentation: Why Third-Party Risk Management Should be Central to Your Cybersecurity Strategy

  • Why is it important to assess vendor risk management? 
  • How to develop effective strategies for addressing higher risk vendors. 
  • Implementing ongoing oversight utilizing metrics and external alerts. 
. Senior Representative, Snyk, ,

11:10AM

(CET)

Panel: Trust Me! How Collaboration will Help Businesses Thrive

  • Privacy: How can organisations ensure they are meeting their responsibility to customers? How do laws and jurisdiction affect this?  
  • How can we ensure a global standard?  
  • How technology can help: discussing digital identity, encryption, authentication & AI. 

11:50AM

(CET)

Networking

12:10PM

(CET)

Presentation: Understanding how DevSecOps can Dramatically Accelerate your App Development Cycles

  • The Basics: What is meant by DecSecOps? 
  • Can we automate DevSecOps? 
  • What are the Cloud Security complications? 
  • How does using DevSecOps practices accelerates software development? 
  • Building a culture of ownership around security from frontline developers upwards. 

12:40PM

(CET)

Presentation: Security for Digital Transformation

  • Rebooting an outdated security strategy – how far should you go, and how can this help power digital transformation?  
  • Reducing risk from third parties as your organisation grows.  
  • Identifying deficits in your strategy and incorporating into your risk management program 

01:10PM

(CET)

Presentation: Eliminate Cyber Intruders – Trusting the Zero Trust Approach

  • What is the ‘Zero – Trust’ Approach? 
  • How can Zero Trust architecture address today’s security challenges of a mobile workforce and data in the cloud?  

01:20PM

(CET)

Presentation: Security Detection – Preparing for the Unknown

  • The Security detection challenges facing organizations today and how these result in blindspots that present serious cyber and operational risks.   
  • What changing trends in technology and customer processes can have both a positive and negative impact on security detection.   
  • Enabling your team to build more flexible and comprehensive security detection foundations in order to meet the challenges of unknown, future cyberthreats.  

01:30PM

(CET)

Lunch & Networking

02:20PM

(CET)

Panel: The Future of Cybersecurity – Where Should We Go From Here?

  • The future of cyber security correlates with the future of information technology. How much of an impact will security have in our business and personal lives?  
  • How will advancements in AI, Machine Learning and Automation impact the industry?  
  • Reviewing developments in the attacker ecosystem. 

03:00PM

(CET)

Presentation: Smart Cyber – How Can AI Manage Risk?

  • How does AI improve threat intelligence, prediction & protection in the Cyber ecosystem? 
  • How can you leverage AI to improve your security capabilities? 

03:20PM

(CET)

Presentation: Rethinking Cyber Security Solutions

  • Why is it important to understand the main drivers and trends in cybersecurity solutions? 
  • Understanding the vulnerabilities organizations have against modern cyberinfrastructures. 
  • How to make the most of your security solution investments. 

03:50PM

(CET)

Chair’s Closing Remarks