Day 1 - 20 September 2022

09:30AM

(CET)

Victoria van Roosmalen

CISO & DPO

Coosto

Associated Talks:

05:30PM - Day 1

View End of Day 1

10:00AM - Day 2

View Chair’s Welcome

09:30AM - Day 1

View Chair’s Welcome

04:00PM - Day 2

View End of Day 2

View Full Info

Chair’s Welcome

Chairpersons welcome and opening remarks. 

. Victoria van Roosmalen, CISO & DPO, Coosto

09:45AM

(CET)

Wouter Slegers

CEO

TrustCB

Associated Talks:

09:45AM - Day 1

View Presentation: Assessing Cyber Security and Risk in a Modern Landscape

View Full Info

Presentation: Assessing Cyber Security and Risk in a Modern Landscape

  • What are the main cyber risks which we are faced with today? 
  • Exploring the importance of Cybersecurity from a UX view. 
  • Reviewing the upcoming tech of Confidential Computing and how it can enhance your enterprise protection. 
. Wouter Slegers, CEO, TrustCB

10:15AM

(CET)

Ashish Rajan

Principal Cloud Security Advocate

Snyk

Associated Talks:

10:15AM - Day 1

View Presentation: Insights Into Cloud Native Threats and Security Trends

10:30AM - Day 2

View Presentation: De-Bunking the Cloud Security Industry

View Full Info

Presentation: Insights Into Cloud Native Threats and Security Trends

Snyk surveyed hundreds of cloud engineering and security professionals and conducted in-depth interviews to gain a better understanding of the changing nature of cloud threats and how security teams are evolving their approaches to address them. The findings are included in the Snyk State of Cloud Security 2022 Report.

 

In this session, Ashish from Snyk will walk through key takeaways from the report, including the impact that cloud-native architectures are having on security and the role that control plane compromise attacks play in today’s cloud breaches.

You’ll walk away with an understanding of five fundamentals that successful cloud security teams focus on: knowing your environment, prevention and secure design, empowering developers, the policy as code, and measuring what matters. Ashish will include simple recommendations for getting started on each fundamental.

 

. Ashish Rajan, Principal Cloud Security Advocate, Snyk

10:45AM

(CET)

Anh Tran

Senior Data Scientist

DevoTeam

View Full Info

Patrick Brog

Sales Engineer

Lookout

Associated Talks:

10:45AM - Day 1

View Panel: Cloud Vulnerabilities and Cyber Resilience

View Full Info

Toby Wilmington

Manager - Sales Engineering

Recorded Future

Associated Talks:

03:40PM - Day 1

View Presentation: The 2022 Malware and Vulnerability Threat Landscape

10:45AM - Day 1

View Panel: Cloud Vulnerabilities and Cyber Resilience

View Full Info

Pieter Jansen

SVP Cyber Innovation

Darktrace

Associated Talks:

11:40AM - Day 1

View Presentation: Preventing Cloud based attacks using self-learning AI

10:45AM - Day 1

View Panel: Cloud Vulnerabilities and Cyber Resilience

View Full Info

Andrii Slobodianyk

Global Partnership Director

ImmuniWeb

Associated Talks:

10:45AM - Day 1

View Panel: Cloud Vulnerabilities and Cyber Resilience

View Full Info

Panel: Cloud Vulnerabilities and Cyber Resilience

  • Reviewing Cloud Vulnerabilities in 2022.   
  • Despite the increasing adoption of cloud, data security is still a key concern: what can we do? 
  • Reviewing key strategies for your enterprise. 
  • Exploring the importance of combining cybersecurity, business continuity and enterprise resilience. 
  • How to elevate the role of cloud security?  
  • Maintaining functionality effectively and safely. 
Moderator: . Anh Tran, Senior Data Scientist, DevoTeam
. Patrick Brog, Sales Engineer, Lookout
. Toby Wilmington, Manager - Sales Engineering, Recorded Future
. Pieter Jansen, SVP Cyber Innovation , Darktrace
. Andrii Slobodianyk, Global Partnership Director, ImmuniWeb

11:25AM

(CET)

Networking Break

11:40AM

(CET)

Pieter Jansen

SVP Cyber Innovation

Darktrace

Associated Talks:

11:40AM - Day 1

View Presentation: Preventing Cloud based attacks using self-learning AI

10:45AM - Day 1

View Panel: Cloud Vulnerabilities and Cyber Resilience

View Full Info

Presentation: Preventing Cloud based attacks using self-learning AI

Content To Follow Soon…

. Pieter Jansen, SVP Cyber Innovation , Darktrace

12:10PM

(CET)

Rene Pluis

Global Cyber Security Remediation Manager

Philips

Associated Talks:

12:10PM - Day 1

View Presentation: Cyber Security & Cloud in Healthcare

View Full Info

Presentation: Cyber Security & Cloud in Healthcare

Content To Follow Soon…

. Rene Pluis, Global Cyber Security Remediation Manager, Philips

12:30PM

(CET)

Tafirenyika (Tafi) Makamure

Senior Solution Engineer

Ermetic

Associated Talks:

12:30PM - Day 1

View Presentation: Security Through Maturity: The missing puzzle piece in your cloud security strategy

View Full Info

Presentation: Security Through Maturity: The missing puzzle piece in your cloud security strategy

Outlining best practices and compliance standards is a good place to start when building a cloud infrastructure security strategy. But this alone won’t provide an assessment of the maturity of your current cloud security practices or a roadmap for continuous improvement.

We’ve created a lightweight and easy to understand framework that defines the key steps for building your strategy. We will walk you through designing a cloud security strategy for your enterprise with clear and practical milestones and show you how to gain a clear picture of where your organization currently stands on its path to a secure cloud environment.

. Tafirenyika (Tafi) Makamure, Senior Solution Engineer, Ermetic

12:50PM

(CET)

Fabian Sander

Chief Evangelist

immune GmbH

Associated Talks:

12:50PM - Day 1

View Presentation: Zero Trust Hardware, What is it and How Do I get it?

View Full Info

Presentation: Zero Trust Hardware, What is it and How Do I get it?

  • Can I trust my IT-Hardware Vendors?
  •  What is the risk in the IT-Supply Chain and how can it be mitigated?
  • How can I protect my Hardware against the next generation of ransomware?
. Fabian Sander, Chief Evangelist, immune GmbH

01:00PM

(CET)

Nils Karn

Chief Executive Officer

Mitigant

Associated Talks:

01:00PM - Day 1

View Presentation: The Shared Responsibility Model of the Public Cloud, What does it Mean for the Security of your Infrastructure?

View Full Info

Presentation: The Shared Responsibility Model of the Public Cloud, What does it Mean for the Security of your Infrastructure?

  • What is Continuous Cloud Compliance?
  •  How to discover anomalies in your infrastructure?
  •  Resilience through Verification.

  

. Nils Karn, Chief Executive Officer, Mitigant

01:10PM

(CET)

Lunch & Networking Break

01:50PM

(CET)

Prashant Agarwal

Sr. TPM

Booking.com

Associated Talks:

01:50PM - Day 1

View Presentation: IT Security Landscape – Past Present and Future

View Full Info

Presentation: IT Security Landscape – Past Present and Future

– Global Trends in IT Security

– Challenges in IT Security

– Key Questions to be answered

– Best Practices in IT Security space

. Prashant Agarwal, Sr. TPM, Booking.com

02:20PM

(CET)

Vinicius Negrisolo

Head of Sales - BENELUX

senhasegura

Associated Talks:

02:20PM - Day 1

View Presentation: Trends in the PAM Market According to Gartner

View Full Info

Presentation: Trends in the PAM Market According to Gartner

Privileged Credentials are considered the “keys of the kingdom”, and their multiplication in the infrastructure makes them one of the favorite attack vectors in companies of all sizes and industries. According to the 2022 Verizon Data breach Investigation report, almost half of data breaches explored privileged credentials.

In fact, Gartner has elected Privileged Access Management (PAM) as the number one security project for two years in a row. In this context, protecting privileged credentials is more than addressing cybersecurity risks, it is ensuring business continuity.

During this session we will explore:

  • What is Privileged Access Management.
  • PAM market trends according to Gartner.
  • Best practices to implement a PAM program in an organization.
  • How the senhasegura PAM platform is evaluated by Gartner.
. Vinicius Negrisolo, Head of Sales - BENELUX , senhasegura

02:30PM

(CET)

Patrick Sonou

Enterprise Cloud Security Specialist EMEA

Rapid7

Associated Talks:

02:30PM - Day 1

View Presentation : Driving Your Cloud Security Forward – Be Ready for the Future

View Full Info

Presentation : Driving Your Cloud Security Forward – Be Ready for the Future

In this session, Driving your Cloud Security Forward to be ready for the future, Patrick Sonou will cover the following topics based on customer experiences :

  • Why initial security design is critical for the future.
  • Need to balance Innovation and Security in the Cloud.
  • Manage your Cloud security at Scale with Automation.
  • How to achieve security by design by to security as a code.
. Patrick Sonou, Enterprise Cloud Security Specialist EMEA, Rapid7

02:50PM

(CET)

Raviv Raz

Cyber & AI Innovation Tech Lead

ING

Associated Talks:

02:50PM - Day 1

View Presentation: Will AI Disrupt the Future of Cyber Security?

View Full Info

Presentation: Will AI Disrupt the Future of Cyber Security?

Artificial Intelligence is gradually taking a prominent part in Cybersecurity and holds promise to disrupt security operations and make them more efficient.

But recent developments in offensive AI also pose a near-future threat to conventional security measures, arming malicious hackers with a powerful technology previously unavailable to the masses.  

  • This Talk will Explore… 
    • Innovative Advancements on both sides of the force. 
    • From Application Security through Red Team operations – will AI help save the security staffing shortage or lead to a dark future? 
. Raviv Raz, Cyber & AI Innovation Tech Lead, ING

03:10PM

(CET)

Paul Visch

Regional Manager - BENELUX

Lookout

Associated Talks:

03:10PM - Day 1

View Presentation: Modernize IT Security – A Secure Environment for your Hybrid Workforce

View Full Info

Presentation: Modernize IT Security – A Secure Environment for your Hybrid Workforce

As apps and data move to the cloud to support a hybrid work style, IT is struggling to protect data and provide a secure, productive work environment. By simplifying your IT security you can secure your workforce and devices, provide secure access to private apps, and protect your data across SaaS & cloud apps deployed in a multi-cloud environment.

Join this session to learn more about:

  • Developments in the current cyber threat landscape
  • How to secure your data across your apps and endpoints
  • Future-proof your organization’s security strategy
. Paul Visch, Regional Manager - BENELUX, Lookout

03:30PM

(CET)

Networking Break

03:40PM

(CET)

Toby Wilmington

Manager - Sales Engineering

Recorded Future

Associated Talks:

03:40PM - Day 1

View Presentation: The 2022 Malware and Vulnerability Threat Landscape

10:45AM - Day 1

View Panel: Cloud Vulnerabilities and Cyber Resilience

View Full Info

Presentation: The 2022 Malware and Vulnerability Threat Landscape

The session will examine trends in Malware use, distribution, development and high-risk vulnerabilities disclosed by major hardware and software vendors in the first half of 2022. It will also include practical advice on ways security teams can reduce their business risk against these attacks.

Specific topics include:

  • -An overview of the threat landscape of malware and vulnerabilities
  • -Top referenced malware variants associated with cyberattacks
  • -Top vulnerabilities associated with cyberattacks.
  • -Tips on how to strengthen your security posture and advisement for threat hunting teams and security operations center teams
  • -Outlook for the rest of 2022 based on H1 2022 observations
. Toby Wilmington, Manager - Sales Engineering, Recorded Future

04:10PM

(CET)

Federico Casano

Senior Cyber Security Consultant

ABN AMRO Bank N.V

Associated Talks:

04:10PM - Day 1

View Presentation: Journey Towards Schrems II Compliance

View Full Info

Presentation: Journey Towards Schrems II Compliance

The presentation will aim at discussing the broad challenges caused by recent Schrems II privacy decision.

  • After an introduction on what Schrems II entails, and parties affected by the new privacy rules, faced challenges will be described. Highlighting why Schrems II is not merely a Legal and Privacy issue, but a CISO issue as well.
  • The subject will be further developed by introducing ABN AMRO Bank N.V. reactions, featuring the company Cloud Provider investigations, as use case. The focus will be on the steps companies could take, in cooperation with the major cloud providers, in a journey towards Schrems II compliance.
  • Moreover, as core part of the presentation, solutions in the following domains will be shared and extensively explained: technology, legal, procurement, organisation.
    To conclude with lessons learned and open questions.
. Federico Casano, Senior Cyber Security Consultant, ABN AMRO Bank N.V

04:40PM

(CET)

Robin Verstraelen

Enterprise Solutions Engineer

wiz

Associated Talks:

04:40PM - Day 1

View VIRTUAL PRESENTATION: Identifying Risk in Cloud Environments

04:40PM - Day 1

View Presentation: Anatomy Of Cloud Breaches And How To Prevent Them

View Full Info

Presentation: Anatomy Of Cloud Breaches And How To Prevent Them

Security at the speed of cloud is hard. Cloud-native environments often have dozens of different technologies in use, hundreds of infrastructure changes every day, and thousands of security alerts.

In this session…

  • You’ll learn what attackers are doing to compromise cloud environments and how you can prioritize your risk reduction efforts to stay ahead of them.
. Robin Verstraelen, Enterprise Solutions Engineer, wiz

05:00PM

(CET)

Kenny Williams

Solution Engineer

Malwarebytes

Associated Talks:

05:00PM - Day 1

View Presentation: Ransomware Ready – Be a Hero, Pay Zero

View Full Info

Presentation: Ransomware Ready – Be a Hero, Pay Zero

Don’t become another statistic! Being affected by Ransomware is no longer seen as a question of if but when. See how Malwarebytes technology can not only prevent but also remediate Ransomware attacks in record time.

Learn how Malwarebytes can help your organization be prepared and enable IT Staff to act swiftly and with confidence in the advent of an attack.

Not only can Malwarebytes help prevent and clean up damage caused, but also offer threat hunting capabilities to help better understand the nature of an attack.

 

. Kenny Williams, Solution Engineer, Malwarebytes

05:10PM

(CET)

Luigi Scarpinati

Cyber Security Expert

MLOZ-IT

Associated Talks:

05:10PM - Day 1

View Presentation: Offensive clouds – How peirates sail through the stormy sky

View Full Info

Presentation: Offensive clouds – How peirates sail through the stormy sky

Session Content To Follow Soon…

. Luigi Scarpinati, Cyber Security Expert , MLOZ-IT

05:30PM

(CET)

Victoria van Roosmalen

CISO & DPO

Coosto

Associated Talks:

05:30PM - Day 1

View End of Day 1

10:00AM - Day 2

View Chair’s Welcome

09:30AM - Day 1

View Chair’s Welcome

04:00PM - Day 2

View End of Day 2

View Full Info

End of Day 1

View Day 2 Content Here:

Accelerating Digital Transformation

Day 2- Accelerating Digital Transformation – Cyber Security & Cloud Expo Europe (cybersecuritycloudexpo.com)

. Victoria van Roosmalen, CISO & DPO, Coosto