Programme
08:30 – 09:00
Registration & Coffee
09:00 – 09:10
Main Hall
Introduction from Event Chair
9:10 – 9:40
Main Hall
Keynote: AI – Friend or Foe?
Click here to view more information
AI will continue to have a huge impact on how cyber security teams work in the future. It equally has the possibility to be used to increase the volume and scope of threats that we face.
This keynote will discuss these concerns – How can we ensure AI adoption is a competitive differentiator for our companies, prioritising the most valuable use case and identifying the biggest challenges in its deployment and from malicious actors?
9:40 - 10:45
Main Hall
Knowledge Pools
During the Knowledge Pools session the delegates can choose between 3 topics over 3 tables to discuss, question and learn from each other’s experiences. The discussion will last 30 minutes after which one participant per table will feed back the learnings, action point and follow up actions needed to the full delegation.
Third Party Cyber Security
As the attack surface has expanded dramatically in the last few years, so have the number and severity of security breaches originating from third parties, with nearly three-quarters of organisations experiencing a cyberattack originating through their software supply chain.
In this KP we will be looking at overcoming lack of resources combined with a exponentially growing third party population.
AI and its role in Cyber Security
AI has dramatically transformed the way we work. It is helping protecting and business and individuals, detecting and mitigating threats and security measures. However, exploited by threat actors it is creating more sophisticated cyber-attacks.
In this KP you will discuss benefits and threats, ethical and privacy considerations, biased AI decision making and privacy issues.
Raviv Raz, Cloud Security Manager, ING
10:45 - 11:00
Reception Area
Coffee Break & Networking
Main Hall
Interactive Discussions
One-to-One Meetings
All delegates with meetings scheduled in their personal timetable will participate in 25-minute one-to-one meetings during this session.
11:00 - 11:25
Main Hall
Engage Huddle 1: Levelling the odds in the fight against cyber criminals
Kevin Kersley, Enterprise Account Director, Bugcrowd
Click here to view more information
After billions of dollars in investment in countless tools and services, the threat and impact of breaches has only grown. As security teams are asked to reduce risk across a continuously expanding attack surface without inhibiting speed to market, they face a well organised, well funded and highly motivated adversary. Can a global network of ethical hackers help us to level the odds?
11:30 - 11:55
Main Hall
Engage Huddle 2: Addressing Ransomcloud attacks
Click here to view more information
There is no doubt that you have services or data in the cloud. A great idea as it provides a lot of extra security that you do not have to worry about. Crime Inc. has also noticed the shift and has found that there is a great benefit in attacking the cloud. Ransomcloud is a relatively new attack although it has all the same signs and approaches as standard ransomware. The difference is that it now attacks your data in the cloud, regardless of where it is set up. Are you addressing this risk? Are you focusing on prevention only or have you prepared for correction and recovery as well? This is an open discussion of what we can do to address this extremely disruptive attack.
12:00 - 12:25
Main Hall
Engage Huddle 3: Shift Left – DevSecOps done well
Click here to view more information
In this huddle we will be discussing the importance of fostering a collaborative cultureamong development, security, and operations teams. The challenges and best practicesfor integrating security tools seamlessly into the development workflow, and strategiesfor demonstrating the business value of investing in DevSecOps.
12:30 - 12:55
Main Hall
Engage Huddle 4: Security@SaaS
Click here to view more information
This huddle will discuss:
- SaaS Security Governance
- Secure Architecture Design
- Vendor Risk Management
12:55 - 13:50
Restaurant
Networking Lunch
13:50 - 14:25
Main Hall
Panel: Security through Diversity
Sabika Ishaq, CISO, Grant Thornton
George Schizas, CISO EMEA, NEP Group
Click here to view more information
While the case for diversity and inclusion in the workplace is now widely accepted, organisations still struggle to achieve diversity and parity and even more with inclusion. In this panel session the audience will share experiences on how having articulated diversity goals will benefit both talent acquisition as well as their ability to innovate and disrupt.
In this session we will discuss why articulated diversity goals are important, the impact on innovation and disruption, building the right environment and its impact on hiring and retention of talent.
14:25 - 14:50
Main Hall
Keynote Presentation and Q&A Session: Aligning security with business objectives
Amir Vashkover, Head of Data Security, Philips
Click here to view more information
With more and more attackers targeting individuals in organizations just updating the InfoSec Tech Stack will not make an impact if behaviors don’t change. In this panel session the audience will share their experience with increasing and embedding security awareness throughout the organization, partners and clients.
Reserved for European Commission
14:50 - 15:15
Main Hall
Keynote: Which tools will help you build a security culture?
Ite van Aardenne, CISO, InterGamma
Click here to view more information
In many organizations, security is still perceived as a nuisance. How can we move away from this perception towards a well-functioning security culture? Are we just talking about security awareness? Or should facture in other dimensions or tools to help us get there?
15:15 - 15:30
Reception Area
Coffee Break & Networking
Main Hall
Interactive Discussions
One-to-One Meetings
All delegates with meetings scheduled in their personal timetable will participate in 25-minute one-to-one meetings during this session.
15:30 - 15:55
Main Hall
Engage Huddle 5: Reserved for Solution Partner
Click here to view more information
16:00 - 16:25
Main Hall
Engage Huddle 6: Managing your risk appetite in cyber security
Amir Vashkover, Head of Data Security, Philips
Click here to view more information
New business opportunities will bring risk. A common challenge in cyber security is looking at how we can keep the business secure whilst working towards new opportunities. This roundtable session will look into risk management in cyber security:
- How to quantify and identify risk
- How do we set our risk acceptance level/appetite?
- At what level should we mitigate risk?
16:30 - 16:55
Main Hall
Engage Huddle 7: Recovering from a breach.
Click here to view more information
- Who do you inform first?
- Should your DR plan include communication processes?
- What methods can be used to minimise reputational damage?