Day 1 - 19 June 2019

Enterprise Security – IoT & Digital Transformation

Cyber security is key concern for all businesses in 2019, and protecting enterprises large and small from cyber attacks is big business.  During this track we will hear examples from across enterprise, including IoT, industrial control systems, energy and automotive industries as to how to implement effective enterprise cyber security plus address the challenges faced and current and potential solutions.

09:30AM

Bruce Page

European Consulting Director

Information Security Forum

Associated Talks:

09:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

View Full Info

Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

. Bruce Page, European Consulting Director, Information Security Forum
Hide Details
More Details

09:50AM

Erik Scherff

Head of Business Technology Center

Royal Schiphol Group

Associated Talks:

09:50AM - Day 2

View Cyber Synergy – the Schiphol Ecosystem

View Full Info

Cyber Synergy – the Schiphol Ecosystem

Enhancing cyber resilience in an airport ecosystem

. Erik Scherff, Head of Business Technology Center, Royal Schiphol Group
Hide Details
More Details

10:20AM

David Higgins

EMEA Technical Director

CyberArk

Associated Talks:

01:30PM - Day 2

View Keynote: Protecting the Apps, Assets and Services That Run Your Business

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

10:20AM - Day 1

View Keynote: Why Privileged Access Management (PAM) Is A Digital Transformation Essential

View Full Info

Keynote: Why Privileged Access Management (PAM) Is A Digital Transformation Essential

Organizations are facing an increasingly modern threatscape. Privileged access now not only covers infrastructure, databases and network devices, but is extended to cloud environments, Big Data, DevOps, containers and more. This transition necessitates a different approach to security, one where access to critical assets, applications, services and assets is controlled by a privileged access security platform to prevent attacks at the core of digital transformation.

. David Higgins, EMEA Technical Director , CyberArk
Hide Details
More Details

10:50AM

Bruce Page

European Consulting Director

Information Security Forum

Associated Talks:

09:30AM - Day 1

View Enterprise Security – IOT & Digital Transformation: Chair’s welcome and opening comments

View Full Info

Marty Falaro

SVP, Global Sales & Alliances

Wasabi

Associated Talks:

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Alain Luxembourg

Regional Director, Benelux

Barracuda

Associated Talks:

03:20PM - Day 1

View Account Takeover: Top Tactics Hackers use to Infiltrate your Email & why your Current Email Security solution can’t protect you

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

David Higgins

EMEA Technical Director

CyberArk

Associated Talks:

01:30PM - Day 2

View Keynote: Protecting the Apps, Assets and Services That Run Your Business

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

10:20AM - Day 1

View Keynote: Why Privileged Access Management (PAM) Is A Digital Transformation Essential

View Full Info

Tom Thorpe

VP Northern Europe

Symantec

Associated Talks:

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

02:30PM - Day 1

View Afternoon Keynote: Security Enabling Cloud Transformations

View Full Info

Menno Vlietstra

Group CIO

URENCO Group

Associated Talks:

03:50PM - Day 1

View Digitalization in the Nuclear Industry, Secure

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

View Full Info

Panel: The evolution of cloud for enterprise cybersecurity

  • Discussing the benefits vs challenges of implementing cloud based systems at enterprise scale – what do CISOs and CIOs need to consider?
  • Public, Private or Hybrid: How cloud architecture impacts enterprise security
  • Addressing the risks of the Cloud as a big data centre – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
Moderator: . Bruce Page, European Consulting Director, Information Security Forum
. Marty Falaro, SVP, Global Sales & Alliances, Wasabi
. Alain Luxembourg, Regional Director, Benelux, Barracuda
. David Higgins, EMEA Technical Director , CyberArk
. Tom Thorpe, VP Northern Europe, Symantec
. Menno Vlietstra, Group CIO, URENCO Group
Hide Details
More Details

11:30AM

Networking Break

12:00PM

Piotr Ciepiela

EMEIA IoT/OT Security & Critical Infrastructure Leader

EY

Associated Talks:

12:00PM - Day 1

View OT Security Governance: How to effectively manage the OT organization and cooperation with IT

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

OT Security Governance: How to effectively manage the OT organization and cooperation with IT

Emerging technologies (IoT, AI/ML, Intelligent Automation) and IT/OT convergence introduce both risks and opportunities that shape the future of integrated IT/OT operations. To successfully introduce and navigate the cross-divisional business function you require strong leadership, effective governance and clearly defined operating model. It has been proved in practice that Cybersecurity Programs are great platforms to initiate the collaboration and work together to achieve a common goal – protecting organizations most valuable assets from cybersecurity threats.

We will share our practical experience from defining OT Security Governance and implementing target Operating Models that promote effective integration of IT, OT and Cyber organizations. A great selection of success stories and pitfalls that will help you focus on priorities when designing and implementing your next-generation IT/OT cybersecurity operations.

. Piotr Ciepiela, EMEIA IoT/OT Security & Critical Infrastructure Leader, EY
Hide Details
More Details

12:20PM

Sebastian Barillaro

Researcher

National Institute of Standards & Technology (NIST)

View Full Info

Paul-Emmanuel Brun

Technical Manager & IoT Team Leader

Airbus

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Piotr Ciepiela

EMEIA IoT/OT Security & Critical Infrastructure Leader

EY

Associated Talks:

12:00PM - Day 1

View OT Security Governance: How to effectively manage the OT organization and cooperation with IT

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Guy Rombaut

CTO

OneFit

Associated Talks:

12:20PM - Day 1

View Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Panel: An E2E approach to tackling data security challenges of the IoT

  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information 
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc. 
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities? 
  • Importance of other aspects of IoT security; testing, education of staff and physical security for devices
Moderator: . Sebastian Barillaro, Researcher, National Institute of Standards & Technology (NIST)
. Paul-Emmanuel Brun, Technical Manager & IoT Team Leader, Airbus
. Piotr Ciepiela, EMEIA IoT/OT Security & Critical Infrastructure Leader, EY
. Guy Rombaut, CTO, OneFit
Hide Details
More Details

01:00PM

Anthony Sabella

Principal Architect

Cisco

Associated Talks:

01:00PM - Day 1

View Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”

View Full Info

Security Automation & Orchestration for IoT/Enterprise Delivered Through “Intent-Based Networking”

  •  Introduce the concept of “Intent-Based” Networking (IBN)
  • Combining cybersecurity with automation techniques to reduce complexity, lower risk, and improve OPEX
  •  Ingesting security telemetry and device exhaust, leading to quicker threat detection/containment ability
  • Completing the closed loop framework (IBN) to constantly learn, share threat information, and provide the logic to tie actionable responses to behavior (self-managing / self-healing)

 

. Anthony Sabella, Principal Architect, Cisco
Hide Details
More Details

01:30PM

Networking Break

02:30PM

Tom Thorpe

VP Northern Europe

Symantec

Associated Talks:

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

02:30PM - Day 1

View Afternoon Keynote: Security Enabling Cloud Transformations

View Full Info

Afternoon Keynote: Security Enabling Cloud Transformations

Moving to the public cloud brings inherent challenges. Multiple areas of the business are procuring cloud services independently without any oversight, strategy or governance – all with best intentions but introducing new risk to the business. Join Symantec to;
• Gain new insights into securing the cloud using an holistic approach
• Understand how to asses and respond in order to accelerate cloud transformations
• Build a checklist of “what you need to know” when you embark on a cloud security project

. Tom Thorpe, VP Northern Europe, Symantec
Hide Details
More Details

03:00PM

Matthieu Fronton

Head of DevOps Strategy

La Poste

Associated Talks:

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

03:00PM - Day 1

View Purposely misusing Hashicorp’s Vault to create an encrypted cache

View Full Info

Purposely misusing Hashicorp’s Vault to create an encrypted cache

Cache servers are primarily built for maximum performance and simplicity. The need for at-rest data encryption layer increases latency. Building it yourself increases bug reporting and attack surface.

For these reasons Redis decided not implement it in their core product, while Varnish released it in their enterprise version.

We wanted to try things the other way around : Instead of using a cache software with data encryption, We wanted to try a data encryption software as a cache solution.

So we tried to setup Hashicorp’s Vault with fancy non-recommended settings…

 

. Matthieu Fronton, Head of DevOps Strategy, La Poste
Hide Details
More Details

03:30PM

Jon Townsend

Chief Information Officer

National Trust

Associated Talks:

03:30PM - Day 1

View Transforming the National Trust

View Full Info

Transforming the National Trust

The National Trust is the UK’s largest conservation charity. This presentation will be a case study about the National Trust’s transformation journey so far and some of the challenges they have overcome on this journey.

. Jon Townsend, Chief Information Officer, National Trust
Hide Details
More Details

04:00PM

Hampton Paulk

Director of Curriculum, Development

PluralSight

Associated Talks:

04:00PM - Day 1

View How to Keep Up with the Changing Security Landscape

View Full Info

How to Keep Up with the Changing Security Landscape

Security is a moving target, it is hard to know where the next attack could come from. How do you plan for the unknown and how well can you respond when the need arises? Join me as I review some simple concepts that could make a big difference in your organization, no matter the size.

. Hampton Paulk, Director of Curriculum, Development, PluralSight
Hide Details
More Details

04:30PM

Session Close

Networking Party – 6pm – The Beach Bar, Strandzuid @ RAI

An evening of networking on Wednesday 19 June from 6pm. Access for Ultimate, Gold & Expo Plus holders in addition to speakers, sponsors, press and exhibitors. Taking place at The Beach Bar, this lakeside spot is surrounded by trees and located just a few minutes walk from the expo venue.  Join us for drinks and networking opportunities.