Day 1 - 24 November 2020

08:30AM

Registration Opens

10:00AM

(CET)

Cyber Security Solutions: Chair’s Welcome & Opening Comments

10:15AM

(CET)

Nir Chervoni

Head of Data Security

Booking.com

Associated Talks:

10:15AM - Day 1

View Presentation: Security for 2030

View Full Info

Presentation: Security for 2030

  • Details to follow…
. Nir Chervoni, Head of Data Security, Booking.com

10:45AM

(CET)

Senior Representative, Bitglass

Bitglass

.

Associated Talks:

10:45AM - Day 1

View Presentation: Cloud Access Security Brokers – How to Protect your Cloud Data

View Full Info

Presentation: Cloud Access Security Brokers – How to Protect your Cloud Data

  • How CASBs can help increase confidence about your organizations’ cloud service  
  • Governing usage, securing data and protecting against threats 
. Senior Representative, Bitglass, Bitglass, .

11:15AM

(CET)

Presentation: Software as a Service – Fuelling a Competitive Security Advantage?

  • From Google to Facebook: Defining SaaS 
  • How is it shaping the way we work, play and connect? 
  • Exploring the ways SaaS is making your daily life more secure 

11:35AM

(CET)

Presentation: Zero Trust: Balancing Resilience and User Experience

  • How can Zero Trust architecture address today’s security challenges of a mobile workforce and data in the cloud? 
  • How can you exert control and reduce your attack surface? 
  • Protecting user identity, devices and applications 

11:55AM

(CET)

Presentation: The Top Cloud Security Challenges for 2020

  • How does cloud architecture vs. Traditional networks pose different problems for security teams? 
  • How can you easily assess your overall cloud security status? 
  • Top tips for ensuring regulatory compliance 

12:15PM

(CET)

Panel: Using the Cloud Securely

  • How to choose the best cloud strategy for your business 
  • Public, Private or Hybrid: How architecture impacts security 
  • Addressing the risks of the Cloud as a big data centre  
  • What impact does cloud security have on consumers? 

12:55PM

Networking Break

01:45PM

(CET)

Presentation: Open Source – Friend or Foe?

  • With security budgets as tight as ever, is it safe to take advantage of the many open source tools available? 
  • What should we consider when evaluating the benefits?  
  • Considering the development team, user community & documentation 
  • Examples of the most useful open source projects 

02:05PM

(CET)

Senior Representative, Synack

Synack

.

Associated Talks:

02:05PM - Day 1

View Presentation: Using Hackers to Beat Hackers – Innovation with Synack

View Full Info

Presentation: Using Hackers to Beat Hackers – Innovation with Synack

Talk information to follow…

. Senior Representative, Synack, Synack, .

02:25PM

(CET)

Presentation: Time to Grow Up – How Mature is your Organisation?

  • Why being aware of your security maturity is important 
  • Is security really a part of your culture or are you just paying lip service?  
  • How to optimise your security program to align with industry best practices. 

02:45PM

(CET)

Presentation: Remote Working – a Blessing or a Curse?

  • Closing the gap between desktop and mobile security can be a horrendous task for security teams How can you ensure devices are protected without invading privacy? 
  • Is isolation good for security? 
  • How can you ensure your email security is up to scratch? 

03:05PM

(CET)

Presentation: Are You Breach Ready?

  • Do you have plans in place to respond and recover from a breach? 
  • How to equip your board  
  • Ensuring you have the correct crisis support 

03:35PM

(CET)

Presentation: Is Your Data a Tough Nut to Crack?

  • Locating and prioritising your data – encrypting at rest and in transit 
  • Choosing the best key management solution 
  • The role of emerging technologies – blockchain & quantum computing 

04:05PM

(CET)

Data Masking

04:15PM

(CET)

Kubernetes & Container Security

04:25PM

(CET)

Blockchain for Data Protection

04:35PM

(CET)

Panel: The Role of Emerging Technology in Security

  • The biggest advancements in cyber security tech and what can we expect from the next 5 years? 
  • What is the impact of increased use of Artificial Intelligence, Machine Learning and Deep Learning? 
  • What role will technologies like blockchain, behavioural analytics and biometrics have in securing our future identities and combating fraud? 

05:30PM

Session Close

Networking Party | 6pm-10pm | Strandzuid, RAI

An evening of networking on Tuesday 25th November from 6pm. Access for Ultimate, Gold &Expo Plus holders in addition to speakers, sponsors, press & exhibitors. Taking place at Strandzuid, RAI. Join us for drinks & networking

Day 2 - 25 November 2020

08:30AM

Registration Opens

10:30AM

(CET)

Cyber Security Solutions Day 2: Chair’s Welcome & Opening Remarks

10:45AM

(CET)

James Austin Bynoe

Head of Information Security - eBay Classifieds Group

eBay

Associated Talks:

10:45AM - Day 2

View Presentation: Music to your ears – Creating an orchestra of security testing

View Full Info

Presentation: Music to your ears – Creating an orchestra of security testing

  • Details to follow…
. James Austin Bynoe, Head of Information Security - eBay Classifieds Group, eBay

11:05AM

(CET)

Presentation: Multiply Your Impact: Managed Services

  • Defining managed services 
  • Top 10 benefits of using managed services 
  • Best practices for selecting a provider 

11:25AM

(CET)

Presentation: Under the Microscope with Network Forensics

  • What is network forensics? 
  • Evaluating ‘catch-it-as-you-can’ and ‘stop, look and listen’ systems 
  • How real time analytics can influence better decision making 

11:55AM

(CET)

Presentation: From Developer to Deployment: How to Streamline Application Security Testing

  • How can security solutions help you integrate security into your DevOps environment? 
  • Breaking through traditional testing processes and tools 
  • Building secure high-quality software faster 

12:15PM

(CET)

Panel: Secure Scalability: DevSecOps for the Agile Business

  • How to make your security agile – updating Appsec for a DevOps world 
  • Defining application security – cloud, mobile and web 
  • Discussing common development vulnerabilities and how to secure your data against them 
  • Best practices to ensure your processes run smoothly 

12:55PM

Networking Break

01:55PM

(CET)

Presentation: Bug Bounty Programs: The Devil You Know?

  • What role can white and grey hat hackers play in developing secure systems? 
  • Benefits and challenges – getting senior level buy in and best practices when considering a hack 
  • Examples of organisations doing this successfully 

02:15PM

(CET)

Presentation: The 2020 Threat Landscape

  • A deep dive into predictions for the 2020 threat landscape 
  • Key actions you can take to protect yourself as an organisation 
  • Top resources to support your efforts 

02:55PM

(CET)

Presentation: SIEM for the Future

  • How implementing a Security Information & Event Management system can protect your organization  
  • Solving problems with your SIEM data 
  • Using SIEM for compliance & capacity management projects 

03:15PM

(CET)

Go phish! Don’t get Hacked by Email

  • Can you completely safeguard employee communication? 
  • Protection at the email perimeter, inside the network and beyond the perimeter 
  • The latest updates in phishing techniques 

03:35PM

(CET)

Panel: Detect & Protect: Navigating Network Vulnerability

  • The basics – discovery, reporting, prioritization & response 
  • How vulnerability management fits into risk and governance policies 
  • The importance of continuous vulnerability management 

04:15PM

(CET)

Cyber Security Solutions: Chair’s Closing Remarks

04:30PM

Session Close