Day 2 - 24 November 2021

08:30AM

(CET)

Registration Opens

09:30AM

(CET)

Serge Wallagh

ICT Manager

University of Applied Sciences Utrecht

Associated Talks:

09:30AM - Day 2

View Securing the future: Chairperson’s Welcome

View Full Info

Securing the future: Chairperson’s Welcome

Opening talk – overview of sessions and highlights.

. Serge Wallagh, ICT Manager, University of Applied Sciences Utrecht

09:50AM

(CET)

Dragana Radisic

Global Head of Internal Control & Policy

ekaterra - Tea Division of Unilever

Associated Talks:

09:50AM - Day 2

View Cybersecurity: Managing risk in the information age

View Full Info

Cybersecurity: Managing risk in the information age

  • Identifying and communicating the detection of a security breach – Optimal strategies for responding to a cyber attack and how to prevent further damage
  • Assessing the vulnerabilities of an organization’s critical business systems, networks, and data, and their potential vulnerabilities
  • Ensuring your organization remains compliant through an understanding of cyber law and the requirements that govern a business or sector
  • Designing and implementing a risk mitigation strategy for an organization
. Dragana Radisic, Global Head of Internal Control & Policy, ekaterra - Tea Division of Unilever

10:10AM

(CET)

Jorge Ferrer Raventos

GRC Consultant

OneTrust

Associated Talks:

10:10AM - Day 2

View Secure Work Anywhere: Supporting the New Normal from Corporate Policies to Security

View Full Info

Secure Work Anywhere: Supporting the New Normal from Corporate Policies to Security

The global pandemic and impacts stemming from COVID-19 shook up operations across the globe. Both, security and cultural impacts stemming from the pandemic continue to emerge for businesses. As organizations have navigated their way through return to office scenarios, there are a number of new employee expectations and employer considerations to think through. Rather than only focusing on the point-in-time circumstances of “secure work-from-home” operations, many organizations are considering a proactive “secure-work-anywhere” policy. In this webinar, we’ll highlight what aspects of secure work anywhere have been successfully in place prior to regional waves of quarantine, supporting productivity through employee mental and physical health considerations, privacy considerations for employees’ personal environments, empowering your plan with innovative solutions and technology.

Key takeaways:

    • What disciplines and business structure have already been operating “secure work anywhere”?
    • How can the extent of your internal governance policies can help or inhibit your employees ability to execute their job effectively?
    • Considerations to balance security-based monitoring and employee privacy rights within personal environments
    • Technology and innovative strategies to put your “secure-work-anywhere” plans in motion.
. Jorge Ferrer Raventos, GRC Consultant , OneTrust

10:40AM

(CET)

Sasa Rasovic

Head of Cloud Security

EPAM

View Full Info

Matt Walmsley

Senior Director, EMEA

Lookout

Associated Talks:

12:00PM - Day 2

View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security

10:40AM - Day 2

View Panel: Trust no one? Establishing Zero Trust security

View Full Info

Ben Jenkins

Senior Solutions Engineer

ThreatLocker

Associated Talks:

02:40PM - Day 1

View Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

12:00PM - Day 2

View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security

12:00PM - Day 1

View VIRTUAL: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

10:40AM - Day 2

View Panel: Trust no one? Establishing Zero Trust security

View Full Info

Victoria van Roosmalen

CISO & DPO

Coosto

Associated Talks:

12:00PM - Day 2

View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security

10:40AM - Day 2

View Panel: Trust no one? Establishing Zero Trust security

View Full Info

Joris den Bruinen

Director

Security Delta (HSD)

Associated Talks:

12:00PM - Day 2

View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security

10:40AM - Day 2

View Panel: Trust no one? Establishing Zero Trust security

View Full Info

Panel: Trust no one? Establishing Zero Trust security

  • How have changes to the enterprise perimeter impacted cybersecurity today? 
  • Discussing the role of the human impact in Zero Trust 
  • Best practices for limiting the lateral movement of bad actors through your network 
  • Justifying costs and overcoming obstacles to Zero Trust digital transformation 
Moderator: . Sasa Rasovic, Head of Cloud Security , EPAM
. Matt Walmsley, Senior Director, EMEA, Lookout
. Ben Jenkins, Senior Solutions Engineer, ThreatLocker
. Victoria van Roosmalen, CISO & DPO, Coosto
. Joris den Bruinen, Director, Security Delta (HSD)

11:20AM

Networking Break

11:40AM

(CET)

Tony Smith

Director - Strategic Account Development

F-Secure

Associated Talks:

11:40AM - Day 2

View VIRTUAL: Heads in the cloud: Securing The New Frontier

11:40AM - Day 2

View Heads in the cloud: Securing The New Frontier

View Full Info

Heads in the cloud: Securing The New Frontier

  • During 2021, we have hosted numerous roundtable talks with CISOs and CIOs to discover what challenges the new frontiers of cloud service adoption is presenting to them for cyber security.  
  • The feedback is really interesting – CISOs’ shifting priorities, accelerated digital transformation, business culture re-think and its impact on cyber security.  
  • In this session, we will share the views of fellow professionals like you, on how you can prime your organization for success in a disrupted and uncertain world.  
  • If you are a CIO or CISO whose priorities are evolving (sometimes daily), join us for a fascinating look at the challenges of securing today’s operating environments. 
. Tony Smith, Director - Strategic Account Development, F-Secure

12:00PM

(CET)

Bárbara Vieira

Principal Security Engineer

TomTom

Associated Talks:

12:00PM - Day 2

View A holistic approach to AppSec: Scaling up SSDLC

View Full Info

A holistic approach to AppSec: Scaling up SSDLC

  • Nowadays enterprises that are going through a digital transformation are more and more concerned with improving their security practices. This is because (1) product security became of utmost importance with wide adoption of micro-services and APIs-based architectures; (2) with the migration to the public cloud, the attack surface of the applications has largely increased, leading to an increased number of vulnerabilities.
  • Nevertheless, due to a number of factors, the AppSec team, services and budget have not changed significantly over the last years. So it’s important to understand how to scale up the AppSec services such that the AppSec team can keep up with the fast-paced software development inherent to the DevOps way of working.
  • This talk gives an introduction to this topic, by describing the main elements that are part of the AppSec ecosystem and of a scalable Secure Software Development Lifecycle (SSDLC) process.
. Bárbara Vieira, Principal Security Engineer, TomTom

12:20PM

(CET)

Peter Feijen

Systems Engineer

Transmit Security

Associated Talks:

12:20PM - Day 2

View Why digital business should care about passwordless authentication?

View Full Info

Why digital business should care about passwordless authentication?

Nearly 65% of your customers & partners put at risk their account and your reputation using the same password in other applications and services.
Around 90% of users would rather leave a website than going into a account/password recovery process.

Transmit Security has found the right balance between business, revenue and security with BindID, the industry-first Passwordless and APPless authentication service

In a few words, BindID allows you to:
– The ability to delete passwords from the user Experience, Browsers & User Store
– Simplify the login, registration and check-out experience
– Improve security without any friction
– Protect against fraud and phishing
– Eliminate the painful process of “I lost my password”

. Peter Feijen, Systems Engineer, Transmit Security

12:40PM

Networking Break

01:30PM

(CET)

Noura el Ouajdi

Sr. Manager, Strategic Ecosystems & Alliances

TNO

View Full Info

Lennart Pikaart

Sales Director Benelux & Nordics

BitSight Technologies

Associated Talks:

12:20PM - Day 1

View Afternoon Keynote: The growing importance of quantifiable cyber metrics for your 360° stakeholders

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

View Full Info

Ben Jenkins

Senior Solutions Engineer

ThreatLocker

Associated Talks:

02:40PM - Day 1

View Keynote: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

12:00PM - Day 2

View PRERECORDED PANEL: Trust no one? Establishing Zero Trust security

12:00PM - Day 1

View VIRTUAL: Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

10:40AM - Day 2

View Panel: Trust no one? Establishing Zero Trust security

View Full Info

Brian Bruinhard

Sr. Information Risk Officer

ING

Associated Talks:

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

View Full Info

Daniela Almeida Lourenço

BISO

CarNext.com

Associated Talks:

12:40PM - Day 2

View PRERECORDED PANEL: Strong to the core: Security for digital transformation

01:30PM - Day 2

View Panel: Strong to the core: Security for digital transformation

03:10PM - Day 1

View Communicating information security: Translation mechanisms for awareness retention and buy-in

View Full Info

Panel: Strong to the core: Security for digital transformation

  • Rebooting an outdated security strategy – how far should you go, and how can this help power digital transformation? 
  • Reducing risk from third parties as your organisation grows 
  • Identifying deficits in your strategy and incorporating into your risk management program 
Moderator: . Noura el Ouajdi, Sr. Manager, Strategic Ecosystems & Alliances , TNO
. Lennart Pikaart, Sales Director Benelux & Nordics, BitSight Technologies
. Ben Jenkins, Senior Solutions Engineer, ThreatLocker
. Brian Bruinhard, Sr. Information Risk Officer, ING
. Daniela Almeida Lourenço, BISO, CarNext.com

02:10PM

(CET)

Dave Mareels

CEO & Co-Founder

SOC.OS

Associated Talks:

02:10PM - Day 2

View To SIEM, or not to SIEM?

View Full Info

To SIEM, or not to SIEM?

  • The problem with SIEM – too resource intensive, and often left gathering dust. SOC.OS original research shows that even though most use and manage SIEM platform (84%) and SOAR platforms (73%) internally, 84% are not confident that they have full visibility of their security alerts.
  • What to consider when investing in your tech stack? And how to make sure that you’re using it to its full potential.
  • Demo of the SOC.OS automated alert triage, correlation and investigation platform.

 

. Dave Mareels, CEO & Co-Founder, SOC.OS

02:20PM

(CET)

Kelly Pereira

Investigations Manager

Motion Picture Association

Associated Talks:

02:20PM - Day 2

View OSINT for all!

View Full Info

OSINT for all!

  • Publicly available information that was once only the foray of law enforcement investigators, has now been recognised for it’s value by a wide range of industries and professions. Thanks in part thanks to the evolution of the internet and increasing accessibility to content and data – plus a multitude of widely publicised success stories fuelling people’s appetites to participate, everyone wants a piece of OSINT investigations!
  • Should the practice of interrogating OSINT be regulated and more intensively controlled? Should training be more widely available and licences and accreditation become compulsory for anyone involved in the practice, to ensure that ethics are considered and the responsibilities involved more widely recognised? We are now seeing various members of the public working to identify offenders – in both organised and unorganised manners.
  • Where do we see OSINT going in the future, and is growing interest and participation likely to streamline and improve processes, or simply cause more problems and complications?
. Kelly Pereira, Investigations Manager, Motion Picture Association

02:40PM

(CET)

Rens van Dongen

CISO

NEP The Netherlands

Associated Talks:

02:40PM - Day 2

View Creating effective governance in information security

View Full Info

Creating effective governance in information security

  • Throwing policies at the problem solves compliance, not security
  • What we can learn from governments’ pandemic communication
  • Policies should be the beginning of driving behavior change, not the end solution
. Rens van Dongen, CISO, NEP The Netherlands

03:00PM

(CET)

Emma Meines

Senior Supervisor, Operational and IT risk (SSM)

De Nederlandsche Bank

Associated Talks:

03:00PM - Day 2

View Crisis management: Remaining vigilant – forewarned is forearmed

View Full Info

Crisis management: Remaining vigilant – forewarned is forearmed

  • The cyber arena contains of heterogeneous groups of threat actors.
  • Based on the organization’s activities, a company needs generic and specific capabilities to maintain resilient.
. Emma Meines, Senior Supervisor, Operational and IT risk (SSM), De Nederlandsche Bank

03:20PM

End of Conference