Agenda
08:00 - 09:00 |
Registration and Networking Break |
09:00 - 09:05 |
Chairman's Welcome |
09:05 - 09:20 |
► Perception vs Reality in cybersecurity Ignacio González Ubierna, Deputy Director, NCC-ES de INCIBE |
09:20 - 09:40 |
► Strengthening Threat Detection and Simplifying Investigations with Corelight Eric Le Doucen, Regional Manager, CoreLight & José Luis Pozo, Presales Technician, Dotforce Spain on behalf of Corelight
|
09:40 - 10:00 |
► Securing Smart Connected Cities Fernando de Pablo Martín, Director General, Madrid Digital Office & José Ángel Álvarez Pérez, Head of Madrid Cybersecurity Center, CCMAD
|
10:00 - 10:40 |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
10:40 - 11:10 |
Networking Break |
11:10 - 11:40 |
► Technology Panel Discussion Laura Parra, Global Director of IT Strategic Projects, Cellnex Telecom (Moderator);
|
11:40 - 12:00 |
► Empower your Security Team with Exposure Management and Threat Hunting Capabilities Fernando Meléndez, Senior Enterprise AE, Censys Security professionals have to deal with an increasingly complex security landscape, between an uptick in ransomware attacks, a shifting geopolitical landscape, and migration to the cloud, there is a lot the security teams have to consider. All these growing challenges overburden security professionals and make organisations more vulnerable to attacks. During the presentation, we will be answering the following questions:
|
12:00 - 12:40 |
► Education Seminar Session 2 Delegates will be able to choose from the following education seminars:
|
12:40 - 13:40 |
Lunch and Networking Break |
13:40 - 14:00 |
► Moving forward cybersecurity regulations: NIS2 and DORA Ramon De La Iglesia Vidal, Global Head of Governance, Risk and Compliance (GRC), Santander Consumer Finance
|
14:00 - 14:20 |
► Prepare for Tomorrow's Threats, Today: A change in approach Samuel Marin, Sales Director, SentinelOne
|
14:20 - 14:40 |
► Empowering Internal Assurance through tech Iván E. Yemez, Senior Implementation Consultant, OneTrust How can we meet the needs of our stakeholders? It's a question that every assurance function grapples with whenever a new regulation is announced. In a dynamic and demanding environment, it can be challenging to address everything promptly and effectively, particularly with limited resources. The role of emerging technologies becomes paramount in the process of identifying, assessing, documenting, mitigating, and reporting an organisation's risks.
|
14:40 - 15:00 |
► The New Old OT Scenario and Cybersecurity Risks Javier Sánchez Salas, CISO, ENGIE España
|
15:00 - 15:30 |
Networking Break |
15:30 - 16:10 |
► CISO Panel Discussion Jesús Mérida Sanabria, CISO, Iberia (Moderator);
|
16:10 - 16:30 |
► Bypassing Multi-Factor Authentication (MFA) via Phishing Techniques Raj Sandhu, Ethical Hacker, Contracted to World Health Organisation;
|
16:30 |
Conference Close |
Education seminars
Hack the brain: Social engineering innovation in 2023
Shirley Hora, Security Awareness Expert, SoSafe
We know cybercriminals for their great technical skills, but did you know that they are also capable of hacking our brains? They are not only experts in computer systems, but also in how the human mind works. They use current events, such as pandemics or economic crises, to convince us to make hasty and impulsive decisions.
In this session we will explore:
- How cybercriminals have professionalised their methods
- The use of artificial intelligence to design more sophisticated mass attacks
- The most effective tactics of cybercriminals
- How they use new channels to approach their victims
- Recommendations and best practices to protect ourselves
Hacktivist Operations Funding
Juan Odriozola, Country Manager Spain & Portugal, KELA
Join our session as we delve into the significant rise of hacktivist activity, fueled by geopolitical tensions surrounding the Russia-Ukraine conflict.
During this session, we will explore:
- The diverse methods these groups employ to source income
- Assess the success of their monetization efforts
- Examine the impact on the threat landscape
How to minimize data security risk and protect your business
Luis Pedroche Montes, Business Development Manager- ALSO- IREO, on Behalf of ManageEngine
Throughout the data lifecycle, your business faces risk from multiple angles such as unauthorised access, and malicious modification, corruption and exfiltration. And if you add cyberattacks such as ransomware to the mix, you have a big challenge in your hands.
In this talk, you will hear how to use a risk-based approach to keep your most sensitive data secure. Using this approach, you will be able to detect insider threats, respond to ransomware, prevent data leaks, and more.
- Performing a data risk assessment to classify and prioritise data
- Disrupting data leaks with the most effective technologies
- Analysing file security to manage at-risk data
- Stopping data exfiltration into the cloud
- Mitigating the after-effects of cyber attacks with the best response measures
Perception vs Reality: A Data-Driven Look at Open Source Risk Management
Fernando Faelli, Regional Director (Iberia), Sonatype
The evolution of attacks on the software supply chain with a current perspective of the Open Source risk management strategy.
- The way we develop software has changed in recent years
- Evolution of attacks on the software supply chain
- Differences between perception and reality of the risk associated with open source components