Day 2 - 27 September 2023

09:45AM

(CET)

Serxhio Kulla

Global Cyber Security Services Manager

Fugro

Associated Talks:

09:45AM - Day 2

View Chairperson’s Welcome

View Full Info

Chairperson’s Welcome

. Serxhio Kulla, Global Cyber Security Services Manager, Fugro

10:00AM

(CET)

Arnaud Wiehe

Managing Director Information Security

FedEx

Associated Talks:

10:00AM - Day 2

View Presentation: Securing the future: The Intersection of Future Technologies and Cybersecurity

View Full Info

Presentation: Securing the future: The Intersection of Future Technologies and Cybersecurity

  • As technology continues to evolve at an unprecedented pace, cybersecurity has become more important than ever. From artificial intelligence, robotics and cryptocurrencies to quantum computing, AGI and the metaverse, new technologies are revolutionizing the way we live and work. However, with these advancements come new security risks and challenges. 
  • In this talk, we’ll explore the intersection of future technologies and cybersecurity, and discuss how you can stay ahead of emerging threats. 
. Arnaud Wiehe, Managing Director Information Security, FedEx

10:30AM

(CET)

Stefano Bortoli

Principal Research Engineer, Intelligent Cloud Technologies Laboratory

Huawei Munich Research Center

Associated Talks:

10:30AM - Day 2

View Keynote Presentation: Huawei Cloud Security Governance and Trustworthiness for Europe

View Full Info

Keynote Presentation: Huawei Cloud Security Governance and Trustworthiness for Europe

– Huawei presence in Europe, for Europe, continuously focusing on Value Creation 

– How does Huawei Cloud handle the challenges for a global cyber-security governance? A brief introduction to 3CS system 

– Industry use cases of Huawei Cloud services and their security features 

. Stefano Bortoli, Principal Research Engineer, Intelligent Cloud Technologies Laboratory, Huawei Munich Research Center

11:00AM

(CET)

René Pluis

Global Cyber Security Remediation Manager

Philips

Associated Talks:

11:00AM - Day 2

View Presentation: Software bill of materials: Use cases in medical device manufacturing

12:10PM - Day 1

View Presentation: Cyber Security & Cloud in Healthcare

View Full Info

Presentation: Software bill of materials: Use cases in medical device manufacturing

  • Challenges with multiple solutions historically evolved. 
  • What are the desirable outcomes for an SBoM environment? 
  • In search of the ‘Silver Bullet’; who does it all? 
. René Pluis, Global Cyber Security Remediation Manager, Philips

11:20AM

(CET)

Ashish Kirtikar

President - UK & Europe

ControlCase

Associated Talks:

-

View ControlCase

11:20AM - Day 2

View Presentation: Managing multiple compliances: The efficient way

View Full Info

Presentation: Managing multiple compliances: The efficient way

. Ashish Kirtikar, President - UK & Europe, ControlCase

11:30AM

(CET)

Linda Odin

Sales Engineer

Recorded Future

Associated Talks:

11:30AM - Day 2

View Presentation: The dark web’s gateway to ransomware: Navigating the path to initial access

View Full Info

Presentation: The dark web’s gateway to ransomware: Navigating the path to initial access

  • Traditional security practices based on protecting the perimeter are no longer enough to secure today’s distributed and cloud-based applications. Remote work and digital interactions have introduced new challenges for verifying user identities and controlling access to sensitive data, leaving organisations vulnerable to cybercriminals who purchase stolen corporate data to install ransomware or steal intellectual property. 
  • In this talk hosted by Linda Odin of Recorded Future, we will explore the current ecosystem, including info stealer malware and cookie theft, and discuss methods for bypassing MFA. We will also share strategies for improving account takeover detection and prevention.
. Linda Odin, Sales Engineer, Recorded Future

11:50AM

Networking Break

12:00PM

(CET)

Alexander Chelyshev

Lead Product Security Engineer

ASML

View Full Info

Kateryna Vasiuk

Security Data Analyst

FS Group

Associated Talks:

-

View FS Group

12:00PM - Day 2

View Panel: Latest trends within social engineering

View Full Info

Mahmoud Yassin

Senior Data Manager

Booking.com

Associated Talks:

12:00PM - Day 2

View Panel: Latest trends within social engineering

View Full Info

Sunette Runhaar

Head of the Global Insider Threat Program

Uber

Associated Talks:

12:00PM - Day 2

View Panel: Latest trends within social engineering

View Full Info

Maikel Ninaber

Director, Cyber and Intelligence (C&I)

Mastercard

Associated Talks:

12:00PM - Day 2

View Panel: Latest trends within social engineering

09:35AM - Day 1

View Presentation: Protecting trust in a changing world: Expanding security from the transaction to every interaction

View Full Info

Panel: Latest trends within social engineering

  • Exploring the damaging consequences which social engineering brings to an organisation. 
  • Analysing common misconceptions people may have when it comes to engaging with threat actors. 
  • Highlighting key trends and behaviours demonstrated by attackers, to increase awareness. 
Moderator: . Alexander Chelyshev, Lead Product Security Engineer, ASML
. Kateryna Vasiuk, Security Data Analyst, FS Group
. Mahmoud Yassin, Senior Data Manager , Booking.com
. Sunette Runhaar, Head of the Global Insider Threat Program, Uber
. Maikel Ninaber, Director, Cyber and Intelligence (C&I), Mastercard

12:40PM

(CET)

Jurriën Bloemen

Solution Architect

SUSE

Associated Talks:

12:40PM - Day 2

View Presentation: How to build a “secure” house

View Full Info

Presentation: How to build a “secure” house

Whether you’re building a castle or a house, a solid and secure foundation is absolutely crucial.

The strength of your security is only as strong as your weakest link, which is why a secure supply chain is of utmost importance. Any breach in the supply chain could lead to serious consequences.

Have you ever wondered about the level of security in a shared workspace? Is the network safe? Is the USB port vulnerable to hacking? This is where confidential computing becomes essential, especially since memory on a Virtual server is shared among all tenants.

Similarly, just relying on locks and hardening your workloads is not sufficient. Continuous monitoring for new threats is vital.

If any of these concerns resonate with you, this session will explore how you can minimize the attack surface, covering everything from the operating system to applications.

We will concentrate on three crucial elements of modern cybersecurity: securing the supply chain, harnessing the potential of confidential computing, and enhancing container security. Furthermore, we will demonstrate how our technology can identify, fortify, and remediate threats effectively.

. Jurriën Bloemen, Solution Architect, SUSE

01:00PM

(CET)

Jafar Shayan

Senior R&D Engineer

ABB E-mobility

Associated Talks:

01:00PM - Day 2

View Presentation: Maximizing Digital Defence: Applying the Pareto Principle and Theory of Constraints in Cybersecurity

View Full Info

Presentation: Maximizing Digital Defence: Applying the Pareto Principle and Theory of Constraints in Cybersecurity

In today’s increasingly complex threat landscape, organizations need to optimize their digital defence strategies to protect against a wide range of cyber threats. This session proposes leveraging the Pareto Principle and the Theory of Constraints as powerful frameworks for improving organization-wide cybersecurity practices. By identifying the vital few security measures that provide the most significant impact and addressing bottlenecks in defence systems, organizations can enhance their cyber resilience. Drawing inspiration from the latest Microsoft Digital Defense Report, which emphasizes fundamental security hygiene practices, this session will explore practical techniques to protect against 98% of attacks. Furthermore, we will shed light on the influence of survivorship bias and how it can inadvertently hinder organizations from achieving optimal digital defence.  

Key Takeaways: 

– Understand the application of the Pareto Principle and the Theory of Constraints in cybersecurity. 

– Learn how to prioritize security measures based on their impact using the Pareto Principle. 

– Identify and overcome bottlenecks in organization-wide defence systems using the Theory of Constraints. 

– Recognize and mitigate the influence of survivorship bias on cybersecurity decision-making. 

– Gain practical strategies and actionable steps to enhance the organization’s digital defence. 

. Jafar Shayan, Senior R&D Engineer, ABB E-mobility

01:20PM

Networking Break

02:20PM

(CET)

Lyzia van Iterson

Information Security Manager - Customer Applications

LKQ Europe

Associated Talks:

02:20PM - Day 2

View Presentation: Tying the room together as a cyber security leader

View Full Info

Presentation: Tying the room together as a cyber security leader

  • How cyber security leaders join different parts of the organization together to enable, improve, and accelerate:  

– Digital Transformation   

– Application Rationalization  

IT Governance 

. Lyzia van Iterson, Information Security Manager - Customer Applications, LKQ Europe

02:40PM

(CET)

Jorrit van Eijk

Data Security Specialist

Varonis

Associated Talks:

02:40PM - Day 2

View Presentation: Automated Data Security: Winning the Race Against Risk

View Full Info

Presentation: Automated Data Security: Winning the Race Against Risk

Every major security incident has one thing in common: stolen data. Attackers know that while applications and infrastructure can be rebuilt and restored, data can never be “un-breached.”  

In this session with Jorrit van Eijk, data security specialist at Varonis, you’ll learn how the collision between data growth, cloud adoption, and cyber risk is playing out in the enterprise. He’ll also explain how intelligent automation is not only reducing the collision’s blast radius, but also containing the fallout.  

Attendees will learn: 

  • How the mass adoption of SaaS and IaaS has expanded the data attack surface
  • Actual methods attackers use to pull off massive cloud data heists
  • The three essential ingredients required to unlock intelligent automation
  • The data security decisions that robots can make on their own
. Jorrit van Eijk, Data Security Specialist, Varonis

03:00PM

(CET)

René Pluis

Global Cyber Security Remediation Manager

Philips

Associated Talks:

11:00AM - Day 2

View Presentation: Software bill of materials: Use cases in medical device manufacturing

12:10PM - Day 1

View Presentation: Cyber Security & Cloud in Healthcare

View Full Info

Martin Sandren

IAM Product Lead

IKEA

Associated Talks:

02:00PM - Day 2

View Fireside Chat: ITDR in the enterprise

03:00PM - Day 2

View Fireside Chat: Emerging technologies to combat ransomware

View Full Info

Sinan Buyukkardes

Head of Security Architecture & Engineering

DAZN

Associated Talks:

03:00PM - Day 2

View Fireside Chat: Emerging technologies to combat ransomware

View Full Info

Fireside Chat: Emerging technologies to combat ransomware

  • Common TTPs when defending against ransomware. 
  • Cyber security issues brought about by IOT, 5G, quantum computing, and AI. 
  • Benefits of blockchain technologies. 
  • Considerations when taking out cyber insurance to prevent attacks. 
Moderator: . René Pluis, Global Cyber Security Remediation Manager, Philips
. Martin Sandren, IAM Product Lead, IKEA
. Sinan Buyukkardes, Head of Security Architecture & Engineering, DAZN

03:30PM

End of Day