Day 1 - 23 November 2021
08:30AM
(CET)
Registration Opens
09:40AM
(CET)
Maurice Remmé
Founder & Strategic Advisor
DeepThink Consulting

09:40AM - Day 1
View Enterprise Security: Chairperson’s Welcome
Enterprise Security: Chairperson’s Welcome
Opening talk – overview of sessions and highlights.
09:50AM
(CET)
Angelos Varthalitis
CISO
Transdev Netherlands

09:50AM - Day 1
View Security for business continuity
Security for business continuity
- Understanding the difference between disaster recovery and continuity management and how they should work together
- How to plan for an attack
- Limiting the damage – how to communicate with internal and external stakeholders
10:10AM
(CET)
Franck Bernard
Privacy Consultant
OneTrust

10:10AM - Day 1
View Supply Chain Attacks: The Rise of Ransomware and How to Reduce Your Risk
Supply Chain Attacks: The Rise of Ransomware and How to Reduce Your Risk
In recent months, supply chain attacks have made headlines and wreaked havoc across businesses. These attacks, which often use ransomware, can impact thousands of organizations by targeting a single company. In a recent case, an IT Management Software company suffered a ransomware attack which impacted as many as 1,500 small businesses that rely on the companies software. While the hackers demanded a ransom, small businesses affected suddenly lacked the critical IT functions they rely on to run their businesses.
This type of attack shows that the vendors you work with must have proper measures in place to: 1) reduce the risk of suffering from a ransomware attack, and 2) have the ability to respond should they become a victim of an attack.
In this session, we’ll explore the ransomware threat and discuss how hackers are using malicious means to upend global supply chains. Attend to learn:
- How ransomware is leveraged in a supply chain attack
- What types of organizations are typically targeted
- What measures you can put in place to build a more robust supply chain
- How to protect your own organization from falling victim to ransomware
- How to improve supply chain resilience with business continuity best practices
10:40AM
(CET)
Mark Ruijsendaal
Senior Programme Manager, Innovation Liaison
Security Delta (HSD)
Ruud Verbij
Snr. Information Security Manager
Rituals

12:30PM - Day 1
View PRERECORDED PANEL: Doing more with less: Strategies for security leaders

10:40AM - Day 1
View Panel: Doing more with less: Strategies for security leaders
Panel: Doing more with less: Strategies for security leaders
- Coping with reduced security budgets and staffing post-pandemic – Best practices for weathering the storm
- How can interaction between technologies, systems and processes improve performance on a tight budget?
- Discussing the merits of combined-functionality solutions
11:20AM
Networking Break
11:40AM
(CET)
Ariel Lemelson
Head of Cyber Detection & Response
Booking.com

11:40AM - Day 1
View Taking a modern approach to detection & response
Taking a modern approach to detection & response
- The main elements of a modern cyber threat detection & response capability
- A points, B points, traps and winning the race
- Focusing your defense on what really matters
- Efficiently scaling coverage
- Leveraging automation
- Correlations and context as a quality and efficiency driver
- Common pitfalls in detection & response KPIs
12:00PM
(CET)
Hanan Levin
VP EMEA
Hunters

11:40AM - Day 1
View VIRTUAL: Making Your SOC Run

12:00PM - Day 1
View Making Your SOC Run
Making Your SOC Run
- The shift to the cloud and the extension of the attack surface requires new approaches for threat detection and response.
- Join this session to understand how Open XDR is used by Fortune 1000 companies to ingest, cross-correlate, prioritize and investigate incidents using telemetry from the entire IT and security stack.
- Learn how Open XDR is rapidly becoming the go-to alternative for SIEM
12:20PM
(CET)
Lennart Pikaart
Sales Director Benelux & Nordics
BitSight Technologies

12:20PM - Day 1
View Afternoon Keynote: The growing importance of quantifiable cyber metrics for your 360° stakeholders

12:40PM - Day 2
View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2
View Panel: Strong to the core: Security for digital transformation
Afternoon Keynote: The growing importance of quantifiable cyber metrics for your 360° stakeholders
- Board, risk, procurement, business, investors, insurers, partners, clients, regulators/government, what do these stakeholders have in common?
- They all want to understand your organisation’s security posture.
- Adopting a holistic approach including Security Ratings, Continuous Monitoring and Financial Quantification is the answer that CISOs, their Boards and all stakeholders are looking for in order to stay ahead in the risk / reputation game. With BitSight – and its recent $250M investment from Moody’s – they will have access to accurate metrics that can help them understand not just their global cybersecurity program performance, but also establish cyber risk financial exposure thresholds to measure the policies effectiveness.
12:50PM
Networking Break
02:20PM
(CET)
Laurent Bouchoucha
Vice President Business Development, Network Business Division
Alcatel-Lucent Enterprise

10:10AM - Day 1
View VIRTUAL: A pragmatic approach for a migration of your network to a Zero Trust architecture

02:20PM - Day 1
View A pragmatic approach for a migration of your network to a Zero Trust architecture
A pragmatic approach for a migration of your network to a Zero Trust architecture
With ransomware and other cyberthreats on the rise, the adoption of a zero-trust model has become a priority.
Network micro-segmentation is one of the first milestones in the zero-trust journey and has been necessary and possible for many years. But the practice has been hampered by a lack of understanding of the applications and IoTs it meant to protect, as well as too much complexity in network architectures.
This presentation will discuss the simplest possible way to segment the network and achieve a Zero Trust architecture, while ensuring business continuity and digital transformation.
- How can you ensure you are continuously verifying users and devices?
- Providing enhanced visibility into the Internet of Things – which devices are on your network and what are they doing?
- Why securing digital innovation demands Zero-trust?
02:40PM
(CET)
Ben Jenkins
Senior Solutions Engineer
ThreatLocker

02:40PM - Day 1
View Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

12:40PM - Day 2
View PRERECORDED PANEL: Strong to the core: Security for digital transformation

12:00PM - Day 1
View VIRTUAL: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

01:30PM - Day 2
View Panel: Strong to the core: Security for digital transformation
Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust
- An increasing number of MSPs have reported being victims of ransomware attacks. Cybercriminals are exploiting MSP products and services, including remote monitoring and management (RMM) tools. These tools are often accessed through software vulnerabilities or brute force attacks.
- Is your MSP prepared to protect against ransomware?
- Join Ben Jenkins, ThreatLocker Senior Solutions Engineer as we discuss what you can do to prevent cybercriminals from carrying out an attack.
03:10PM
(CET)
Daniela Almeida Lourenço
BISO
CarNext.com

12:40PM - Day 2
View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2
View Panel: Strong to the core: Security for digital transformation

03:10PM - Day 1
View Communicating information security: Translation mechanisms for awareness retention and buy-in
Communicating information security: Translation mechanisms for awareness retention and buy-in
- How communication plays a role in Information Security
- How we can leverage the human nature for the benefit of the strategy
- How we can promote behavioural change and retention