Day 2 - 21 September 2022
10:00AM
(CET)
Chair’s Welcome
Chairpersons welcome and opening remarks.
10:10AM
(CET)
Presentation: Winning the Cyber Security Arms Race
- What protection do you need? Reviewing the top 2022 threats and how to overcome them.
- What are the best tools you can have in your arsenal?
10:40AM
(CET)
×
Senior Representative, Snyk
10:40AM - Day 1
View Presentation: Why Third-Party Risk Management Should be Central to Your Cybersecurity Strategy
10:15AM - Day 1
View Presentation: The Latest Social Engineering Threats
Presentation: Why Third-Party Risk Management Should be Central to Your Cybersecurity Strategy
- Why is it important to assess vendor risk management?
- How to develop effective strategies for addressing higher risk vendors.
- Implementing ongoing oversight utilizing metrics and external alerts.
. Senior Representative, Snyk, ,
11:10AM
(CET)
Panel: Trust Me! How Collaboration will Help Businesses Thrive
- Privacy: How can organisations ensure they are meeting their responsibility to customers? How do laws and jurisdiction affect this?
- How can we ensure a global standard?
- How technology can help: discussing digital identity, encryption, authentication & AI.
11:50AM
(CET)
Networking
12:10PM
(CET)
Presentation: Understanding how DevSecOps can Dramatically Accelerate your App Development Cycles
- The Basics: What is meant by DecSecOps?
- Can we automate DevSecOps?
- What are the Cloud Security complications?
- How does using DevSecOps practices accelerates software development?
- Building a culture of ownership around security from frontline developers upwards.
12:40PM
(CET)
Presentation: Security for Digital Transformation
- Rebooting an outdated security strategy – how far should you go, and how can this help power digital transformation?
- Reducing risk from third parties as your organisation grows.
- Identifying deficits in your strategy and incorporating into your risk management program
01:10PM
(CET)
Presentation: Eliminate Cyber Intruders – Trusting the Zero Trust Approach
- What is the ‘Zero – Trust’ Approach?
- How can Zero Trust architecture address today’s security challenges of a mobile workforce and data in the cloud?
01:20PM
(CET)
Presentation: Security Detection – Preparing for the Unknown
- The Security detection challenges facing organizations today and how these result in blindspots that present serious cyber and operational risks.
- What changing trends in technology and customer processes can have both a positive and negative impact on security detection.
- Enabling your team to build more flexible and comprehensive security detection foundations in order to meet the challenges of unknown, future cyberthreats.
01:30PM
(CET)
Lunch & Networking
02:20PM
(CET)
Panel: The Future of Cybersecurity – Where Should We Go From Here?
- The future of cyber security correlates with the future of information technology. How much of an impact will security have in our business and personal lives?
- How will advancements in AI, Machine Learning and Automation impact the industry?
- Reviewing developments in the attacker ecosystem.
03:00PM
(CET)
Presentation: Smart Cyber – How Can AI Manage Risk?
- How does AI improve threat intelligence, prediction & protection in the Cyber ecosystem?
- How can you leverage AI to improve your security capabilities?
03:20PM
(CET)
Presentation: Rethinking Cyber Security Solutions
- Why is it important to understand the main drivers and trends in cybersecurity solutions?
- Understanding the vulnerabilities organizations have against modern cyberinfrastructures.
- How to make the most of your security solution investments.