Day 1 - 26 September 2023
09:20AM
(CET)
Bernold Nieuwesteeg
Initiater
CyberSecurityBooster

09:20AM - Day 1
View Chairperson’s Welcome
Chairperson’s Welcome
09:35AM
(CET)
Maikel Ninaber
Director, Cyber and Intelligence (C&I)
Mastercard

12:00PM - Day 2
View Panel: Latest trends within social engineering

09:35AM - Day 1
View Presentation: Protecting trust in a changing world: Expanding security from the transaction to every interaction
Presentation: Protecting trust in a changing world: Expanding security from the transaction to every interaction
- Cyber Trends and Insights: Actors and methods observed in Europe/Global, taking a deep look at the evolving cyber threat landscape and important defenses to enhance.
- Anyone can be targeted by cyber thieves, so learn how you could reduce and protect your digital footprint with ideas to safeguard your data.
- Adopting the mindset of a hacker; maintaining resilience when it comes to digital risk, financial risk, cyber risk, systemic risk and threat casting.
10:05AM
(CET)
Arseny Kapralov
Head of Security Operations
Mollie
Ramon de Boer
EMEA Application Security Executive
Github

10:05AM - Day 1
View Panel: Cloud vulnerabilities and cyber resilience
Egon van Dongen
EMEA Sales Engineering Manager
Zerto HPE

10:05AM - Day 1
View Panel: Cloud vulnerabilities and cyber resilience
Dave Barnett
Head of SASE & Email Security, EMEA
Cloudflare

-
View Cloudflare

03:00PM - Day 1
View Presentation: Zero Trust and SASE projects can only really be successful when we adopt a digital native mindset

10:05AM - Day 1
View Panel: Cloud vulnerabilities and cyber resilience
Amjad Nagori
Senior Cloud Platform Engineer
Trivium Packaging

10:05AM - Day 1
View Panel: Cloud vulnerabilities and cyber resilience
Dimitri van Zantvliet
Cybersecurity Director/CISO
Dutch Railways (NS)

-
View NS (Dutch Railways)

10:05AM - Day 1
View Panel: Cloud vulnerabilities and cyber resilience
Panel: Cloud vulnerabilities and cyber resilience
- Recognising various transformative cloud computing services, plus how they are used to achieve business innovation and success.
- Discussing best practices within cloud security, in order to be proactive rather than reactive.
- Choosing the right cloud provider which protects against misconfigurations, cyber-attacks, authentication, and access management.
10:45AM
(CET)
Mathew Payne
Principal Field Security Specialist
GitHub

10:45AM - Day 1
View Keynote Presentation: The importance of using developer-centric security tools
Keynote Presentation: The importance of using developer-centric security tools
- This talk focuses on the problem at hand; how security professionals can help their developer and operation counterparts to build secure software effortlessly.
- These highly accurate tools are focused on helping developers in terms of building secure code faster, minimizing false positives, and creating a great user experience as opposed to bombarding developers with alerts that waste their time.
11:15AM
(CET)
Ram Vaidyanathan
Cybersecurity technical specialist
ManageEngine

11:15AM - Day 1
View Presentation: How to minimize data security risk and protect your business
Presentation: How to minimize data security risk and protect your business
- Throughout the data lifecycle, your business faces risk from multiple angles such as unauthorized access, and malicious modification, corruption and exfiltration. And if you add cyberattacks such as ransomware to the mix, you have a big challenge in your hands.
- In this talk, you will hear how to use a risk-based approach to keep your most sensitive data secure. Using this approach, you will be able to detect insider threats, respond to ransomware, prevent data leaks, and more.
11:45AM
(CET)
Jafar Shayan
Senior R&D Engineer
ABB E-mobility

01:00PM - Day 2
View Presentation: Maximizing Digital Defence: Applying the Pareto Principle and Theory of Constraints in Cybersecurity
Elliott Ford Jones
Advanced Business Development Manager
Huawei Cloud Europe

11:45AM - Day 1
View Panel: Cloud cost optimization: Creating a cloud strategy and enhancing your business posture
Maddasar Azim
Managing Director EMEA and APAC
CAST AI

11:45AM - Day 1
View Panel: Cloud cost optimization: Creating a cloud strategy and enhancing your business posture
Andrii Slobodianyk
Global Partnership Director
ImmuniWeb

11:45AM - Day 1
View Panel: Cloud cost optimization: Creating a cloud strategy and enhancing your business posture

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Panel: Cloud cost optimization: Creating a cloud strategy and enhancing your business posture
12:35PM
(CET)
Bas van Erk
Director Benelux & Nordics
SoSafe

12:35PM - Day 1
View Presentation: Cybercrime Trends 2023 – The latest threats and how your organization can stay safe

-
View Sosafe
Presentation: Cybercrime Trends 2023 – The latest threats and how your organization can stay safe
- The top 5 cybercrime trends in 2023 and explaining which psychological factors play a particularly important role in cyber-attacks. The interface between humans and machines remains the number one entry point – more than 85 percent of all attacks start with the human factor.
- We will detail some innovative approaches to fighting these sophisticated and manipulative types of cybercrimes, as organizations now face an innovative dark economy where cybercrime-as-a-service is the common business model. Tactics are evolving almost by the minute and attackers do not hesitate to use psychological tactics to manipulate our minds.
12:55PM
(CET)
Patrick Sonou
Cloud Security Specialist EMEA West
Rapid7

12:55PM - Day 1
View Presentation: Adapting your risk-management program to cloud and hybrid environments
Presentation: Adapting your risk-management program to cloud and hybrid environments
- With mission-critical workloads running both on-premise and in the cloud, security teams need to seamlessly manage risk across hybrid environments:
– Consolidate your security and establish a consistent definition of risk across your organization.
– Maintain risk coverage of existing infrastructure while expanding cloud environments.
– Adapt your security program to a new way of managing risk which is more efficient in stabilising modern cloud domains.
01:15PM
(CET)
Dan Gordon
Co-Founder and CEO
MyWorkDrive.com

01:15PM - Day 1
View Presentation: Public Cloud vs Private Cloud for file sharing – Which is better?

-
View MyWorkDrive
Presentation: Public Cloud vs Private Cloud for file sharing – Which is better?
– In today’s rapidly evolving digital landscape, the choice between Public Cloud and Private Cloud for file sharing has become a critical decision for organizations of all sizes. As businesses, governments, and educational institutions increasingly rely on secure and efficient file sharing, the question arises: “Which is better, Public Cloud or Private Cloud?”
– This presentation delves deep into the nuances of these two cloud deployment models, examining their strengths, weaknesses, and the specific needs they address. Join us as we embark on a journey to uncover the pros and cons, security considerations, and key factors that can guide your organization towards the optimal choice for secure file sharing in the modern era.
01:25PM
(CET)
Raviv Raz
Cloud Security Manager
ING

01:25PM - Day 1
View Presentation: AI cybercrime: Levelling the playing field for the common criminal
Presentation: AI cybercrime: Levelling the playing field for the common criminal
This talk is meant to provoke thought among all security practitioners, soon to be faced with AI-driven cybercrime as an everyday reality.
So, you’re an aspiring cyber-criminal. You want to get rich or get incarcerated trying.
But you don’t know how to hack. In fact, you don’t even know how to program.
Well, fear not! for AI is here to be your partner in crime.
From phishing, through enticement, breach and theft of data – we will cover it all in this session.
We will learn how to ask nicely, hypnotise and social engineer ChatGPT to be our criminal mastermind.
Advising on social engineering and hacking techniques, providing code and recommending tools to exploit and bypass security controls.
01:45PM
Networking Break
02:20PM
(CET)
Arda Çirpili
Cyber Security Project Manager & Business Analyst
Rabobank

02:20PM - Day 1
View Presentation: Natural disasters: Information security, business continuity and human factor

02:30PM - Day 2
View Panel: The Future of Cybersecurity – Where Should We Go From Here?
Presentation: Natural disasters: Information security, business continuity and human factor
- How to maintain cyber security and business continuity in natural disasters.
- Being far away from the natural disaster area does not protect us in terms of business continuity. Many external services we receive may be on the natural disaster map. What are the controls we need to do while receiving service?
- While ensuring business continuity and information security, we should consider the human factor and the human margin of error.
- In which sectors business continuity in natural disasters has to be the 1st priority? Examples and failures.
02:40PM
(CET)
Charlie Whitfield
VP of EMEA Sales Engineering
Arctic Wolf

02:40PM - Day 1
View Presentation: The big business of cybercrime
Presentation: The big business of cybercrime
Join our session with Charlie Whitfield to learn about just how big the business of cybercrime really is, and what organizations need to be aware of as the online cybercriminal ecosystem continues to grow.
Find out about Arctic Wolf’s mission to end cyber risk, what the effectiveness gap is and how to close it, just who are the people and what is the tech behind Arctic Wolf’s award-winning SOC service, as well as what is the network effect and why you should care.
03:00PM
(CET)
Dave Barnett
Head of SASE & Email Security, EMEA
Cloudflare

-
View Cloudflare

03:00PM - Day 1
View Presentation: Zero Trust and SASE projects can only really be successful when we adopt a digital native mindset

10:05AM - Day 1
View Panel: Cloud vulnerabilities and cyber resilience
Presentation: Zero Trust and SASE projects can only really be successful when we adopt a digital native mindset
- Change is never simple, and technology is transforming our world around us; some businesses are benefiting, some less so. Traditional organisations are constantly realising that digital native businesses might be onto something, and adopting a digital native mindset might add real value to them.
- In this interactive session, peppered by bold claims and stunning success stories Cloudflare, we will showcase how technology enabled change has to be coupled with a change in the way we think about how people and processes need to evolve as well.
03:20PM
(CET)
Jubba Smail
Senior Security Architect
Otrium

03:20PM - Day 1
View Presentation: How we achieved success with Zero Trust in partnership with Cloudflare
Presentation: How we achieved success with Zero Trust in partnership with Cloudflare
03:40PM
Networking Break
03:50PM
(CET)
Floyd Pernisch
Cybersecurity & Privacy Leader – Investments
IKEA
Daniela Almeida Lourenço
CISO
Tinka

03:50PM - Day 1
View Panel: How to maintain a culture of security in the workplace
Davide Davolio
Western and Southern Europe Security Specialist
Uber

03:50PM - Day 1
View Panel: How to maintain a culture of security in the workplace
Ellen Schuurink
I.T. Manager
‘s Heeren Loo

03:50PM - Day 1
View Panel: How to maintain a culture of security in the workplace
Panel: How to maintain a culture of security in the workplace
- Creating information security policies which are transparent and commonly understood across the organisation, to ensure the confidentiality, integrity and availability of data, plus maintain company reputation.
- Making employees feel rewarded, empowered, and supported, so they react positively to company guidelines.
- Introducing a top-down plus a bottom-up approach.
04:30PM
(CET)
Tafi Makamure
Sr. Solution Architect
Ermetic

04:30PM - Day 1
View Presentation: Leveraging CNAPP to close the cloud security expertise gap
Presentation: Leveraging CNAPP to close the cloud security expertise gap
Cloud infrastructure is an attacker’s playground. So how do you reduce your attack surface? With a holistic platform that automates cloud infrastructure security & empowers stakeholders to drive accurate risk prioritization & remediation across complex multi-cloud environments.
Join to find out how to leverage an identity-first CNAPP approach for full asset discovery, deep risk analysis, runtime threat detection & compliance reporting. Learn how to use powerful visualization, prioritization & remediation tools to close the cloud expertise gap.
In this session, attendees will will learn how to:
– Leverage an identity-first CNAPP approach for full asset discovery, deep risk analysis, runtime threat detection & compliance reporting
– Use powerful visualization, prioritization & remediation tools to close the cloud expertise gap
– Automate cloud infrastructure security
– Reduce their cloud attack surface
– Empower stakeholders to drive accurate risk prioritization & remediation across complex multi-cloud environments
04:50PM
(CET)
Rik Chorus
Director Security & Resiliency BeNeLux
Kyndryl

04:50PM - Day 1
View Presentation: Cyber Security Principles and Zero Trust
Presentation: Cyber Security Principles and Zero Trust
- Going back to the first principles of Cyber security what is really important and how do we focus on this.
- Zero trust is good strategy which can be setup with some great tactics. We will provide some insight into the key elements of Zero Trust.
05:10PM
(CET)
Simone Volpi
IT Chapter Lead Cyber Fraud Prevention
ING

05:10PM - Day 1
View Presentation: Uncovering the deception, exploring the rise and risks of deepfake
Presentation: Uncovering the deception, exploring the rise and risks of deepfake
- This presentation will delve into the evolving risks posed by AI-generated synthetic media, examining their potential to disrupt transactions, compromise security, and erode trust.
- By shedding light on the latest advancements in deepfake technology, we will explore how these digital manipulations could undermine authentication processes, deceive investors, and amplify cyber threats.
- Join us for a captivating session that uncovers the multifaceted challenges that lie ahead and unveils strategic insights to fortify the industry’s defences against this burgeoning menace.