Day 1 - 23 November 2021

08:30AM

(CET)

Registration Opens

09:40AM

(CET)

Maurice Remmé

Founder & Strategic Advisor

DeepThink Consulting

Associated Talks:

09:40AM - Day 1

View Enterprise Security: Chairperson’s Welcome

View Full Info

Enterprise Security: Chairperson’s Welcome

Opening talk – overview of sessions and highlights.

. Maurice Remmé, Founder & Strategic Advisor, DeepThink Consulting

09:50AM

(CET)

Angelos Varthalitis

CISO

Transdev Netherlands

Associated Talks:

09:50AM - Day 1

View Security for business continuity

View Full Info

Security for business continuity

  • Understanding the difference between disaster recovery and continuity management and how they should work together 
  • How to plan for an attack 
  • Limiting the damage – how to communicate with internal and external stakeholders 
. Angelos Varthalitis, CISO, Transdev Netherlands

10:10AM

(CET)

Franck Bernard

Privacy Consultant

OneTrust

Associated Talks:

10:10AM - Day 1

View Supply Chain Attacks: The Rise of Ransomware and How to Reduce Your Risk

View Full Info

Supply Chain Attacks: The Rise of Ransomware and How to Reduce Your Risk

In recent months, supply chain attacks have made headlines and wreaked havoc across businesses. These attacks, which often use ransomware, can impact thousands of organizations by targeting a single company. In a recent case, an IT Management Software company suffered a ransomware attack which impacted as many as 1,500 small businesses that rely on the companies software. While the hackers demanded a ransom, small businesses affected suddenly lacked the critical IT functions they rely on to run their businesses.

This type of attack shows that the vendors you work with must have proper measures in place to: 1) reduce the risk of suffering from a ransomware attack, and 2) have the ability to respond should they become a victim of an attack.

In this session, we’ll explore the ransomware threat and discuss how hackers are using malicious means to upend global supply chains. Attend to learn:

    • How ransomware is leveraged in a supply chain attack
    • What types of organizations are typically targeted
    • What measures you can put in place to build a more robust supply chain
    • How to protect your own organization from falling victim to ransomware
    • How to improve supply chain resilience with business continuity best practices
. Franck Bernard, Privacy Consultant , OneTrust

10:40AM

(CET)

Mark Ruijsendaal

Senior Programme Manager, Innovation Liaison

Security Delta (HSD)

View Full Info

Ruud Verbij

Snr. Information Security Manager

Rituals

Associated Talks:

12:30PM - Day 1

View PRERECORDED PANEL: Doing more with less: Strategies for security leaders

10:40AM - Day 1

View Panel: Doing more with less: Strategies for security leaders

View Full Info

Panel: Doing more with less: Strategies for security leaders

  • Coping with reduced security budgets and staffing post-pandemic – Best practices for weathering the storm  
  • How can interaction between technologies, systems and processes improve performance on a tight budget?    
  • Discussing the merits of combined-functionality solutions 
Moderator: . Mark Ruijsendaal, Senior Programme Manager, Innovation Liaison , Security Delta (HSD)
. Ruud Verbij, Snr. Information Security Manager, Rituals

11:20AM

Networking Break

11:40AM

(CET)

Ariel Lemelson

Head of Cyber Detection & Response

Booking.com

Associated Talks:

11:40AM - Day 1

View Taking a modern approach to detection & response

View Full Info

Taking a modern approach to detection & response

  • The main elements of a modern cyber threat detection & response capability
  • A points, B points, traps and winning the race
  • Focusing your defense on what really matters
  • Efficiently scaling coverage
  • Leveraging automation
  • Correlations and context as a quality and efficiency driver
  • Common pitfalls in detection & response KPIs
. Ariel Lemelson, Head of Cyber Detection & Response, Booking.com

12:00PM

(CET)

Hanan Levin

VP EMEA

Hunters

Associated Talks:

11:40AM - Day 1

View VIRTUAL: Making Your SOC Run

12:00PM - Day 1

View Making Your SOC Run

View Full Info

Making Your SOC Run

  • The shift to the cloud and the extension of the attack surface requires new approaches for threat detection and response.  
  • Join this session to understand how Open XDR is used by Fortune 1000 companies to ingest, cross-correlate, prioritize and investigate incidents using telemetry from the entire IT and security stack. 
  • Learn how Open XDR is rapidly becoming the go-to alternative for SIEM 
. Hanan Levin, VP EMEA, Hunters

12:20PM

(CET)

Lennart Pikaart

Sales Director Benelux & Nordics

BitSight Technologies

Associated Talks:

12:20PM - Day 1

View Afternoon Keynote: The growing importance of quantifiable cyber metrics for your 360° stakeholders

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

View Full Info

Afternoon Keynote: The growing importance of quantifiable cyber metrics for your 360° stakeholders

  • Board, risk, procurement, business, investors, insurers, partners, clients, regulators/government, what do these stakeholders have in common?
  • They all want to understand your organisation’s security posture.
  • Adopting a holistic approach including Security Ratings, Continuous Monitoring and Financial Quantification is the answer that CISOs, their Boards and all stakeholders are looking for in order to stay ahead in the risk / reputation game. With BitSight – and its recent $250M investment from Moody’s – they will have access to accurate metrics that can help them understand not just their global cybersecurity program performance, but also establish cyber risk financial exposure thresholds to measure the policies effectiveness.
. Lennart Pikaart, Sales Director Benelux & Nordics, BitSight Technologies

12:50PM

Networking Break

02:20PM

(CET)

Laurent Bouchoucha

Vice President Business Development, Network Business Division

Alcatel-Lucent Enterprise

Associated Talks:

10:10AM - Day 1

View VIRTUAL: A pragmatic approach for a migration of your network to a Zero Trust architecture

02:20PM - Day 1

View A pragmatic approach for a migration of your network to a Zero Trust architecture

View Full Info

A pragmatic approach for a migration of your network to a Zero Trust architecture

With ransomware and other cyberthreats on the rise, the adoption of a zero-trust model has become a priority.

Network micro-segmentation is one of the first milestones in the zero-trust journey and has been necessary and possible for many years. But the practice has been hampered by a lack of understanding of the applications and IoTs it meant to protect, as well as too much complexity in network architectures.

This presentation will discuss the simplest possible way to segment the network and achieve a Zero Trust architecture, while ensuring business continuity and digital transformation.

  • How can you ensure you are continuously verifying users and devices?
  • Providing enhanced visibility into the Internet of Things – which devices are on your network and what are they doing?
  • Why securing digital innovation demands Zero-trust?
. Laurent Bouchoucha, Vice President Business Development, Network Business Division, Alcatel-Lucent Enterprise

02:40PM

(CET)

Ben Jenkins

Senior Solutions Engineer

ThreatLocker

Associated Talks:

02:40PM - Day 1

View Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

12:00PM - Day 1

View VIRTUAL: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

View Full Info

Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

  • An increasing number of MSPs have reported being victims of ransomware attacks. Cybercriminals are exploiting MSP products and services, including remote monitoring and management (RMM) tools. These tools are often accessed through software vulnerabilities or brute force attacks.
  • Is your MSP prepared to protect against ransomware?
  • Join Ben Jenkins, ThreatLocker Senior Solutions Engineer as we discuss what you can do to prevent cybercriminals from carrying out an attack.
. Ben Jenkins, Senior Solutions Engineer, ThreatLocker

03:10PM

(CET)

Daniela Almeida Lourenço

BISO

CarNext.com

Associated Talks:

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

03:10PM - Day 1

View Communicating information security: Translation mechanisms for awareness retention and buy-in

View Full Info

Communicating information security: Translation mechanisms for awareness retention and buy-in

  • How communication plays a role in Information Security
  • How we can leverage the human nature for the benefit of the strategy
  • How we can promote behavioural change and retention
. Daniela Almeida Lourenço, BISO, CarNext.com

03:30PM

End of Day One