Programme

}

08:30 – 09:00

Registration & Coffee 

}

09:00 – 09:10

Main Hall

Introduction from Event Chair

}

9:10 – 9:40

Main Hall

Keynote: AI – Friend or Foe? 

 

Click here to view more information

AI will continue to have a huge impact on how cyber security teams work in the future. It equally has the possibility to be used to increase the volume and scope of threats that we face. 

This keynote will discuss these concerns – How can we ensure AI adoption is a competitive differentiator for our companies, prioritising the most valuable use case and identifying the biggest challenges in its deployment and from malicious actors? 

}

9:40 - 10:45

Main Hall

Knowledge Pools

During the Knowledge Pools session the delegates can choose between 3 topics over 3 tables to discuss, question and learn from each other’s experiences. The discussion will last 30 minutes after which one participant per table will feed back the learnings, action point and follow up actions needed to the full delegation.

 

Third Party Cyber Security

As the attack surface has expanded dramatically in the last few years, so have the number and severity of security breaches originating from third parties, with nearly three-quarters of organisations experiencing a cyberattack originating through their software supply chain.
In this KP we will be looking at overcoming lack of resources combined with a exponentially growing third party population.

AI and its role in Cyber Security

AI has dramatically transformed the way we work. It is helping protecting and business and individuals, detecting and mitigating threats and security measures. However, exploited by threat actors it is creating more sophisticated cyber-attacks.
In this KP you will discuss benefits and threats, ethical and privacy considerations, biased AI decision making and privacy issues.

Raviv Raz, Cloud Security Manager, ING

}

10:45 - 11:00

Reception Area

Coffee Break & Networking

Main Hall

Interactive Discussions 

One-to-One Meetings

All delegates with meetings scheduled in their personal timetable will participate in 25-minute one-to-one meetings during this session.
}

11:00 - 11:25

Main Hall

Engage Huddle 1: Levelling the odds in the fight against cyber criminals

Kevin Kersley, Enterprise Account Director, Bugcrowd

Click here to view more information

After billions of dollars in investment in countless tools and services, the threat and impact of breaches has only grown. As security teams are asked to reduce risk across a continuously expanding attack surface without inhibiting speed to market, they face a well organised, well funded and highly motivated adversary. Can a global network of ethical hackers help us to level the odds?

}

11:30 - 11:55

Main Hall

Engage Huddle 2: Addressing Ransomcloud attacks

Click here to view more information

There is no doubt that you have services or data in the cloud. A great idea as it provides a lot of extra security that you do not have to worry about. Crime Inc. has also noticed the shift and has found that there is a great benefit in attacking the cloud. Ransomcloud is a relatively new attack although it has all the same signs and approaches as standard ransomware. The difference is that it now attacks your data in the cloud, regardless of where it is set up. Are you addressing this risk? Are you focusing on prevention only or have you prepared for correction and recovery as well? This is an open discussion of what we can do to address this extremely disruptive attack.

    }

    12:00 - 12:25

    Main Hall

    Engage Huddle 3: Shift Left – DevSecOps done well

    Click here to view more information

    In this huddle we will be discussing the importance of fostering a collaborative cultureamong development, security, and operations teams. The challenges and best practicesfor integrating security tools seamlessly into the development workflow, and strategiesfor demonstrating the business value of investing in DevSecOps.

    }

    12:30 - 12:55

    Main Hall

    Engage Huddle 4: Security@SaaS

    Click here to view more information

    This huddle will discuss:

    • SaaS Security Governance
    • Secure Architecture Design
    • Vendor Risk Management
    }

    12:55 - 13:50

    Restaurant

    Networking Lunch 

    }

    13:50 - 14:25

    Main Hall

    Panel: Security through Diversity

    Sabika Ishaq, CISO, Grant Thornton

    George Schizas, CISO EMEA, NEP Group

    Click here to view more information

    While the case for diversity and inclusion in the workplace is now widely accepted, organisations still struggle to achieve diversity and parity and even more with inclusion. In this panel session the audience will share experiences on how having articulated diversity goals will benefit both talent acquisition as well as their ability to innovate and disrupt.

    In this session we will discuss why articulated diversity goals are important, the impact on innovation and disruption, building the right environment and its impact on hiring and retention of talent.

    }

    14:25 - 14:50

    Main Hall

    Keynote Presentation and Q&A Session: Aligning security with business objectives

    Amir Vashkover, Head of Data Security, Philips

    Click here to view more information

    With more and more attackers targeting individuals in organizations just updating the InfoSec Tech Stack will not make an impact if behaviors don’t change. In this panel session the audience will share their experience with increasing and embedding security awareness throughout the organization, partners and clients.

    Reserved for European Commission

    }

    14:50 - 15:15

    Main Hall

    Keynote: Which tools will help you build a security culture?

    Ite van Aardenne, CISO, InterGamma

    Click here to view more information

    In many organizations, security is still perceived as a nuisance. How can we move away from this perception towards a well-functioning security culture? Are we just talking about security awareness? Or should facture in other dimensions or tools to help us get there?

    }

    15:15 - 15:30

    Reception Area

    Coffee Break & Networking 

    Main Hall

    Interactive Discussions 

    One-to-One Meetings

    All delegates with meetings scheduled in their personal timetable will participate in 25-minute one-to-one meetings during this session.
    }

    15:30 - 15:55

    Main Hall

    Engage Huddle 5: Reserved for Solution Partner

    Click here to view more information
    }

    16:00 - 16:25

    Main Hall

    Engage Huddle 6: Managing your risk appetite in cyber security

    Amir Vashkover, Head of Data Security, Philips

    Click here to view more information

    New business opportunities will bring risk. A common challenge in cyber security is looking at how we can keep the business secure whilst working towards new opportunities. This roundtable session will look into risk management in cyber security:

    • How to quantify and identify risk
    • How do we set our risk acceptance level/appetite?
    • At what level should we mitigate risk?
    }

    16:30 - 16:55

    Main Hall

    Engage Huddle 7: Recovering from a breach.

    Click here to view more information
    • Who do you inform first?
    • Should your DR plan include communication processes?
    • What methods can be used to minimise reputational damage?
    }

    17:00 - 17:30

    Main Hall

    Reserved for Chair: Observations from the day, Closing Remarks & End of Dialogue

    }

    17:30 - 18:00

    Reception area

    Networking Drinks