Day 2 - 27 September 2023
09:45AM
(CET)
Serxhio Kulla
Global Cyber Security Services Manager
Fugro

09:45AM - Day 2
View Chairperson’s Welcome
Chairperson’s Welcome
10:00AM
(CET)
Arnaud Wiehe
Managing Director Information Security
FedEx

10:00AM - Day 2
View Presentation: Securing the future: The Intersection of Future Technologies and Cybersecurity
Presentation: Securing the future: The Intersection of Future Technologies and Cybersecurity
- As technology continues to evolve at an unprecedented pace, cybersecurity has become more important than ever. From artificial intelligence, robotics and cryptocurrencies to quantum computing, AGI and the metaverse, new technologies are revolutionizing the way we live and work. However, with these advancements come new security risks and challenges.
- In this talk, we’ll explore the intersection of future technologies and cybersecurity, and discuss how you can stay ahead of emerging threats.
10:30AM
(CET)
Stefano Bortoli
Principal Research Engineer, Intelligent Cloud Technologies Laboratory
Huawei Munich Research Center

10:30AM - Day 2
View Keynote Presentation: Huawei Cloud Security Governance and Trustworthiness for Europe
Keynote Presentation: Huawei Cloud Security Governance and Trustworthiness for Europe
– Huawei presence in Europe, for Europe, continuously focusing on Value Creation
– How does Huawei Cloud handle the challenges for a global cyber-security governance? A brief introduction to 3CS system
– Industry use cases of Huawei Cloud services and their security features
11:00AM
(CET)
René Pluis
Global Cyber Security Remediation Manager
Philips

11:00AM - Day 2
View Presentation: Software bill of materials: Use cases in medical device manufacturing

12:10PM - Day 1
View Presentation: Cyber Security & Cloud in Healthcare
Presentation: Software bill of materials: Use cases in medical device manufacturing
- Challenges with multiple solutions historically evolved.
- What are the desirable outcomes for an SBoM environment?
- In search of the ‘Silver Bullet’; who does it all?
11:20AM
(CET)
Ashish Kirtikar
President - UK & Europe
ControlCase

-
View ControlCase

11:20AM - Day 2
View Presentation: Managing multiple compliances: The efficient way
Presentation: Managing multiple compliances: The efficient way
11:30AM
(CET)
Linda Odin
Sales Engineer
Recorded Future

11:30AM - Day 2
View Presentation: The dark web’s gateway to ransomware: Navigating the path to initial access
Presentation: The dark web’s gateway to ransomware: Navigating the path to initial access
- Traditional security practices based on protecting the perimeter are no longer enough to secure today’s distributed and cloud-based applications. Remote work and digital interactions have introduced new challenges for verifying user identities and controlling access to sensitive data, leaving organisations vulnerable to cybercriminals who purchase stolen corporate data to install ransomware or steal intellectual property.
- In this talk hosted by Linda Odin of Recorded Future, we will explore the current ecosystem, including info stealer malware and cookie theft, and discuss methods for bypassing MFA. We will also share strategies for improving account takeover detection and prevention.
11:50AM
Networking Break
12:00PM
(CET)
Alexander Chelyshev
Lead Product Security Engineer
ASML
Kateryna Vasiuk
Security Data Analyst
FS Group

-
View FS Group

12:00PM - Day 2
View Panel: Latest trends within social engineering
Mahmoud Yassin
Senior Data Manager
Booking.com

12:00PM - Day 2
View Panel: Latest trends within social engineering
Sunette Runhaar
Head of the Global Insider Threat Program
Uber

12:00PM - Day 2
View Panel: Latest trends within social engineering
Maikel Ninaber
Director, Cyber and Intelligence (C&I)
Mastercard

12:00PM - Day 2
View Panel: Latest trends within social engineering

09:35AM - Day 1
View Presentation: Protecting trust in a changing world: Expanding security from the transaction to every interaction
Panel: Latest trends within social engineering
- Exploring the damaging consequences which social engineering brings to an organisation.
- Analysing common misconceptions people may have when it comes to engaging with threat actors.
- Highlighting key trends and behaviours demonstrated by attackers, to increase awareness.
12:40PM
(CET)
Jurriën Bloemen
Solution Architect
SUSE

12:40PM - Day 2
View Presentation: How to build a “secure” house
Presentation: How to build a “secure” house
Whether you’re building a castle or a house, a solid and secure foundation is absolutely crucial.
The strength of your security is only as strong as your weakest link, which is why a secure supply chain is of utmost importance. Any breach in the supply chain could lead to serious consequences.
Have you ever wondered about the level of security in a shared workspace? Is the network safe? Is the USB port vulnerable to hacking? This is where confidential computing becomes essential, especially since memory on a Virtual server is shared among all tenants.
Similarly, just relying on locks and hardening your workloads is not sufficient. Continuous monitoring for new threats is vital.
If any of these concerns resonate with you, this session will explore how you can minimize the attack surface, covering everything from the operating system to applications.
We will concentrate on three crucial elements of modern cybersecurity: securing the supply chain, harnessing the potential of confidential computing, and enhancing container security. Furthermore, we will demonstrate how our technology can identify, fortify, and remediate threats effectively.
01:00PM
(CET)
Jafar Shayan
Senior R&D Engineer
ABB E-mobility

01:00PM - Day 2
View Presentation: Maximizing Digital Defence: Applying the Pareto Principle and Theory of Constraints in Cybersecurity
Presentation: Maximizing Digital Defence: Applying the Pareto Principle and Theory of Constraints in Cybersecurity
In today’s increasingly complex threat landscape, organizations need to optimize their digital defence strategies to protect against a wide range of cyber threats. This session proposes leveraging the Pareto Principle and the Theory of Constraints as powerful frameworks for improving organization-wide cybersecurity practices. By identifying the vital few security measures that provide the most significant impact and addressing bottlenecks in defence systems, organizations can enhance their cyber resilience. Drawing inspiration from the latest Microsoft Digital Defense Report, which emphasizes fundamental security hygiene practices, this session will explore practical techniques to protect against 98% of attacks. Furthermore, we will shed light on the influence of survivorship bias and how it can inadvertently hinder organizations from achieving optimal digital defence.
Key Takeaways:
– Understand the application of the Pareto Principle and the Theory of Constraints in cybersecurity.
– Learn how to prioritize security measures based on their impact using the Pareto Principle.
– Identify and overcome bottlenecks in organization-wide defence systems using the Theory of Constraints.
– Recognize and mitigate the influence of survivorship bias on cybersecurity decision-making.
– Gain practical strategies and actionable steps to enhance the organization’s digital defence.
01:20PM
Networking Break
02:20PM
(CET)
Lyzia van Iterson
Information Security Manager - Customer Applications
LKQ Europe

02:20PM - Day 2
View Presentation: Tying the room together as a cyber security leader
Presentation: Tying the room together as a cyber security leader
- How cyber security leaders join different parts of the organization together to enable, improve, and accelerate:
– Digital Transformation
– Application Rationalization
– IT Governance
02:40PM
(CET)
Jorrit van Eijk
Data Security Specialist
Varonis

02:40PM - Day 2
View Presentation: Automated Data Security: Winning the Race Against Risk
Presentation: Automated Data Security: Winning the Race Against Risk
Every major security incident has one thing in common: stolen data. Attackers know that while applications and infrastructure can be rebuilt and restored, data can never be “un-breached.”
In this session with Jorrit van Eijk, data security specialist at Varonis, you’ll learn how the collision between data growth, cloud adoption, and cyber risk is playing out in the enterprise. He’ll also explain how intelligent automation is not only reducing the collision’s blast radius, but also containing the fallout.
Attendees will learn:
- How the mass adoption of SaaS and IaaS has expanded the data attack surface
- Actual methods attackers use to pull off massive cloud data heists
- The three essential ingredients required to unlock intelligent automation
- The data security decisions that robots can make on their own
03:00PM
(CET)
René Pluis
Global Cyber Security Remediation Manager
Philips

11:00AM - Day 2
View Presentation: Software bill of materials: Use cases in medical device manufacturing

12:10PM - Day 1
View Presentation: Cyber Security & Cloud in Healthcare
Martin Sandren
IAM Product Lead
IKEA

02:00PM - Day 2
View Fireside Chat: ITDR in the enterprise

03:00PM - Day 2
View Fireside Chat: Emerging technologies to combat ransomware
Sinan Buyukkardes
Head of Security Architecture & Engineering
DAZN

03:00PM - Day 2
View Fireside Chat: Emerging technologies to combat ransomware
Fireside Chat: Emerging technologies to combat ransomware
- Common TTPs when defending against ransomware.
- Cyber security issues brought about by IOT, 5G, quantum computing, and AI.
- Benefits of blockchain technologies.
- Considerations when taking out cyber insurance to prevent attacks.