Day 1 - 20 September 2022
09:30AM
(CET)
Victoria van Roosmalen
CISO & DPO
Coosto

05:30PM - Day 1
View End of Day 1

10:00AM - Day 2
View Chair’s Welcome

09:30AM - Day 1
View Chair’s Welcome

04:00PM - Day 2
View End of Day 2
Chair’s Welcome
Chairpersons welcome and opening remarks.
09:45AM
(CET)
Wouter Slegers
CEO
TrustCB

09:45AM - Day 1
View Presentation: Assessing Cyber Security and Risk in a Modern Landscape
Presentation: Assessing Cyber Security and Risk in a Modern Landscape
- What are the main cyber risks which we are faced with today?
- Exploring the importance of Cybersecurity from a UX view.
- Reviewing the upcoming tech of Confidential Computing and how it can enhance your enterprise protection.
10:15AM
(CET)
Ashish Rajan
Principal Cloud Security Advocate
Snyk

10:15AM - Day 1
View Presentation: Insights Into Cloud Native Threats and Security Trends

10:30AM - Day 2
View Presentation: De-Bunking the Cloud Security Industry
Presentation: Insights Into Cloud Native Threats and Security Trends
Snyk surveyed hundreds of cloud engineering and security professionals and conducted in-depth interviews to gain a better understanding of the changing nature of cloud threats and how security teams are evolving their approaches to address them. The findings are included in the Snyk State of Cloud Security 2022 Report.
In this session, Ashish from Snyk will walk through key takeaways from the report, including the impact that cloud-native architectures are having on security and the role that control plane compromise attacks play in today’s cloud breaches.
You’ll walk away with an understanding of five fundamentals that successful cloud security teams focus on: knowing your environment, prevention and secure design, empowering developers, the policy as code, and measuring what matters. Ashish will include simple recommendations for getting started on each fundamental.
10:45AM
(CET)
Anh Tran
Senior Data Scientist
DevoTeam
Patrick Brog
Sales Engineer
Lookout

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Toby Wilmington
Manager - Sales Engineering
Recorded Future

03:40PM - Day 1
View Presentation: The 2022 Malware and Vulnerability Threat Landscape

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Pieter Jansen
SVP Cyber Innovation
Darktrace

11:40AM - Day 1
View Presentation: Preventing Cloud based attacks using self-learning AI

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Andrii Slobodianyk
Global Partnership Director
ImmuniWeb

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Panel: Cloud Vulnerabilities and Cyber Resilience
- Reviewing Cloud Vulnerabilities in 2022.
- Despite the increasing adoption of cloud, data security is still a key concern: what can we do?
- Reviewing key strategies for your enterprise.
- Exploring the importance of combining cybersecurity, business continuity and enterprise resilience.
- How to elevate the role of cloud security?
- Maintaining functionality effectively and safely.
11:25AM
(CET)
Networking Break
11:40AM
(CET)
Pieter Jansen
SVP Cyber Innovation
Darktrace

11:40AM - Day 1
View Presentation: Preventing Cloud based attacks using self-learning AI

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Presentation: Preventing Cloud based attacks using self-learning AI
Content To Follow Soon…
12:10PM
(CET)
Rene Pluis
Global Cyber Security Remediation Manager
Philips

12:10PM - Day 1
View Presentation: Cyber Security & Cloud in Healthcare
Presentation: Cyber Security & Cloud in Healthcare
Content To Follow Soon…
12:30PM
(CET)
Tafirenyika (Tafi) Makamure
Senior Solution Engineer
Ermetic

12:30PM - Day 1
View Presentation: Security Through Maturity: The missing puzzle piece in your cloud security strategy
Presentation: Security Through Maturity: The missing puzzle piece in your cloud security strategy
Outlining best practices and compliance standards is a good place to start when building a cloud infrastructure security strategy. But this alone won’t provide an assessment of the maturity of your current cloud security practices or a roadmap for continuous improvement.
We’ve created a lightweight and easy to understand framework that defines the key steps for building your strategy. We will walk you through designing a cloud security strategy for your enterprise with clear and practical milestones and show you how to gain a clear picture of where your organization currently stands on its path to a secure cloud environment.
12:50PM
(CET)
Fabian Sander
Chief Evangelist
immune GmbH

12:50PM - Day 1
View Presentation: Zero Trust Hardware, What is it and How Do I get it?
Presentation: Zero Trust Hardware, What is it and How Do I get it?
- Can I trust my IT-Hardware Vendors?
- What is the risk in the IT-Supply Chain and how can it be mitigated?
- How can I protect my Hardware against the next generation of ransomware?
01:00PM
(CET)
Nils Karn
Chief Executive Officer
Mitigant

01:00PM - Day 1
View Presentation: The Shared Responsibility Model of the Public Cloud, What does it Mean for the Security of your Infrastructure?
Presentation: The Shared Responsibility Model of the Public Cloud, What does it Mean for the Security of your Infrastructure?
- What is Continuous Cloud Compliance?
- How to discover anomalies in your infrastructure?
- Resilience through Verification.
01:10PM
(CET)
Lunch & Networking Break
01:50PM
(CET)
Prashant Agarwal
Sr. TPM
Booking.com

01:50PM - Day 1
View Presentation: IT Security Landscape – Past Present and Future
Presentation: IT Security Landscape – Past Present and Future
– Global Trends in IT Security
– Challenges in IT Security
– Key Questions to be answered
– Best Practices in IT Security space
02:20PM
(CET)
Vinicius Negrisolo
Head of Sales - BENELUX
senhasegura

02:20PM - Day 1
View Presentation: Trends in the PAM Market According to Gartner
Presentation: Trends in the PAM Market According to Gartner
Privileged Credentials are considered the “keys of the kingdom”, and their multiplication in the infrastructure makes them one of the favorite attack vectors in companies of all sizes and industries. According to the 2022 Verizon Data breach Investigation report, almost half of data breaches explored privileged credentials.
In fact, Gartner has elected Privileged Access Management (PAM) as the number one security project for two years in a row. In this context, protecting privileged credentials is more than addressing cybersecurity risks, it is ensuring business continuity.
During this session we will explore:
- What is Privileged Access Management.
- PAM market trends according to Gartner.
- Best practices to implement a PAM program in an organization.
- How the senhasegura PAM platform is evaluated by Gartner.
02:30PM
(CET)
Patrick Sonou
Enterprise Cloud Security Specialist EMEA
Rapid7

02:30PM - Day 1
View Presentation : Driving Your Cloud Security Forward – Be Ready for the Future
Presentation : Driving Your Cloud Security Forward – Be Ready for the Future
In this session, Driving your Cloud Security Forward to be ready for the future, Patrick Sonou will cover the following topics based on customer experiences :
- Why initial security design is critical for the future.
- Need to balance Innovation and Security in the Cloud.
- Manage your Cloud security at Scale with Automation.
- How to achieve security by design by to security as a code.
02:50PM
(CET)
Raviv Raz
Cyber & AI Innovation Tech Lead
ING

02:50PM - Day 1
View Presentation: Will AI Disrupt the Future of Cyber Security?
Presentation: Will AI Disrupt the Future of Cyber Security?
Artificial Intelligence is gradually taking a prominent part in Cybersecurity and holds promise to disrupt security operations and make them more efficient.
But recent developments in offensive AI also pose a near-future threat to conventional security measures, arming malicious hackers with a powerful technology previously unavailable to the masses.
- This Talk will Explore…
- Innovative Advancements on both sides of the force.
- From Application Security through Red Team operations – will AI help save the security staffing shortage or lead to a dark future?
03:10PM
(CET)
Paul Visch
Regional Manager - BENELUX
Lookout

03:10PM - Day 1
View Presentation: Modernize IT Security – A Secure Environment for your Hybrid Workforce
Presentation: Modernize IT Security – A Secure Environment for your Hybrid Workforce
As apps and data move to the cloud to support a hybrid work style, IT is struggling to protect data and provide a secure, productive work environment. By simplifying your IT security you can secure your workforce and devices, provide secure access to private apps, and protect your data across SaaS & cloud apps deployed in a multi-cloud environment.
Join this session to learn more about:
- Developments in the current cyber threat landscape
- How to secure your data across your apps and endpoints
- Future-proof your organization’s security strategy
03:30PM
(CET)
Networking Break
03:40PM
(CET)
Toby Wilmington
Manager - Sales Engineering
Recorded Future

03:40PM - Day 1
View Presentation: The 2022 Malware and Vulnerability Threat Landscape

10:45AM - Day 1
View Panel: Cloud Vulnerabilities and Cyber Resilience
Presentation: The 2022 Malware and Vulnerability Threat Landscape
The session will examine trends in Malware use, distribution, development and high-risk vulnerabilities disclosed by major hardware and software vendors in the first half of 2022. It will also include practical advice on ways security teams can reduce their business risk against these attacks.
Specific topics include:
- -An overview of the threat landscape of malware and vulnerabilities
- -Top referenced malware variants associated with cyberattacks
- -Top vulnerabilities associated with cyberattacks.
- -Tips on how to strengthen your security posture and advisement for threat hunting teams and security operations center teams
- -Outlook for the rest of 2022 based on H1 2022 observations
04:10PM
(CET)
Federico Casano
Senior Cyber Security Consultant
ABN AMRO Bank N.V

04:10PM - Day 1
View Presentation: Journey Towards Schrems II Compliance
Presentation: Journey Towards Schrems II Compliance
The presentation will aim at discussing the broad challenges caused by recent Schrems II privacy decision.
- After an introduction on what Schrems II entails, and parties affected by the new privacy rules, faced challenges will be described. Highlighting why Schrems II is not merely a Legal and Privacy issue, but a CISO issue as well.
- The subject will be further developed by introducing ABN AMRO Bank N.V. reactions, featuring the company Cloud Provider investigations, as use case. The focus will be on the steps companies could take, in cooperation with the major cloud providers, in a journey towards Schrems II compliance.
- Moreover, as core part of the presentation, solutions in the following domains will be shared and extensively explained: technology, legal, procurement, organisation.
To conclude with lessons learned and open questions.
04:40PM
(CET)
Robin Verstraelen
Enterprise Solutions Engineer
wiz

04:40PM - Day 1
View VIRTUAL PRESENTATION: Identifying Risk in Cloud Environments

04:40PM - Day 1
View Presentation: Anatomy Of Cloud Breaches And How To Prevent Them
Presentation: Anatomy Of Cloud Breaches And How To Prevent Them
Security at the speed of cloud is hard. Cloud-native environments often have dozens of different technologies in use, hundreds of infrastructure changes every day, and thousands of security alerts.
In this session…
- You’ll learn what attackers are doing to compromise cloud environments and how you can prioritize your risk reduction efforts to stay ahead of them.
05:00PM
(CET)
Kenny Williams
Solution Engineer
Malwarebytes

05:00PM - Day 1
View Presentation: Ransomware Ready – Be a Hero, Pay Zero
Presentation: Ransomware Ready – Be a Hero, Pay Zero
Don’t become another statistic! Being affected by Ransomware is no longer seen as a question of if but when. See how Malwarebytes technology can not only prevent but also remediate Ransomware attacks in record time.
Learn how Malwarebytes can help your organization be prepared and enable IT Staff to act swiftly and with confidence in the advent of an attack.
Not only can Malwarebytes help prevent and clean up damage caused, but also offer threat hunting capabilities to help better understand the nature of an attack.
05:10PM
(CET)
Luigi Scarpinati
Cyber Security Expert
MLOZ-IT

05:10PM - Day 1
View Presentation: Offensive clouds – How peirates sail through the stormy sky
Presentation: Offensive clouds – How peirates sail through the stormy sky
Session Content To Follow Soon…
05:30PM
(CET)
Victoria van Roosmalen
CISO & DPO
Coosto

05:30PM - Day 1
View End of Day 1

10:00AM - Day 2
View Chair’s Welcome

09:30AM - Day 1
View Chair’s Welcome

04:00PM - Day 2
View End of Day 2
End of Day 1
View Day 2 Content Here:
Accelerating Digital Transformation