Agenda

08:00 - 08:50

Registration & Networking

08:50 - 09:00

Chairman's Welcome

09:00 - 09:20

► Balancing Regulation/Compliance and Security

Paul Van den Berg, Strategic Relations & Partnerships, NCSC-NL

Globally, stakeholders expect transparency on cyber risks, and regulators are forcing organizations to act. Are CISOs and boards ready to engage in meaningful conversations?

  • The importance of acknowledging the “material” and increasing risk
  • Addressing the communication gap between board and senior stakeholders
  • Breaking down conservative attitudes
  • How to engage in meaningful conversations
09:20 - 09:40

► The 2022 Malware and Vulnerability Threat landscape

Julian Kanitz, Lead Sales Engineer DACH, Recorded Future 

The presentation examines trends in Malware use, distribution, development and high-risk vulnerabilities disclosed by major hardware and software vendors in 2022.

It will cover:

  • An overview of the threat landscape of malware and vulnerabilities
  • Top referenced malware variants associated with cyberattacks
  • Top vulnerabilities associated with cyberattacks
  • Tips on how to to strengthen your security posture and advisement for threat hunting teams and security operations center teams
  • Outlook for 2023 based on 2022 observations
09:40 - 10:00

► Mapping Web 3 Threats

Dr. Lydia Kostopoulos, Senior Vice President of Emerging Tech Insights, KnowBe4

  • Contextualizes the 4th industrial revolution and the technologies that are a part of it
  • Unpacks the components of Web 3 including the metaverse, internet of things, digital twins and decentralized technology
  • Categorizes and explains the threats in the expanding cyber terrain
10:00 - 10:20

► Fireside chat: A CISO’s Perspective on….

Conference Chairman & Dimitri van Zantvliet, Chief Information Security Officer, Nederlandse Spoorwegen

  • How the macroeconomic downturn will affect CISOs, budgets and security
  • Dealing with the risks of state-sponsored cyberattacks and spillovers
  • Protecting critical national infrastructure
  • The cyber talent shortage – real or illusion?

 

10:20 - 11:00

 Education Seminar Session 1

Delegates will be able to choose from the following education seminars:

  • Using Security Testing to Drive Change for the Better, Paul Mote, Senior Director, Solutions Architects, Synack
  • Erasing Surface, Identity, Complexity and Unknowns, Christian Borst, EMEA CTO, Vectra AI
11:00 - 11:30

Networking Break 

11:30 - 11:50

► The value of strategy in information security

Arash Rahmani, Head of Information Security, Nationale-Nederlanden C&C

  • Why security culture matters for third-party risk management
  • The strategic role of a CISO
  • The EU impact on third-party risk management

 

11:50 - 12:10

► Fast and Furious Attacks: Using AI to Surgically Respond

Rick Verhagen, Cybersecurity Enterprise Account Executive, Darktrace 

Fast-moving cyber-attacks like ransomware can strike at any time, and security teams are often unable to react quickly enough. Join Rick Verhagen, Cybersecurity, Senior Account Executive at Darktrace, to learn how Autonomous Response uses Self-Learning AI’s understanding of ‘self’ to take targeted action to stop in-progress attacks, without disrupting your business.  

  • Learn how Autonomous Response knows exactly the right action to take, at the right time, to contain an in-person attack  
  • How AI takes precise action to neutralize threats on the behalf of security teams  
  • Use of real-world threat finds to illustrate the workings of Autonomous Response technology 

 

12:10 - 12:30

► How to address the skills shortages in a proactive manner to respond to adversaries

Robert Elferink, Sr. Manager, Sales Engineering Benelux & Nordics, CrowdStrike

  • Tooling and techniques to address skills shortages
  • Automation and services to keep you ahead of attackers
  • How technology can help you become proactive and stop breaches
12:30 - 12:50

 Hunters: The SOC of the Future

Hanan Levin, VP Sales EMEA, Hunters

Join Hunters to explore the key trends and paradigm shifts in data, detection and investigation, within the ever changing world of SOCs.

  • Find out how you can increase data retention whilst reducing your costs, through using built-in-detection and automation in your SOC platform
12:50 - 13:30

► Education Seminar Session 2

Delegates will be able to choose from the following education seminars:

  • The next class of browser-based attacks, Tom McVey, Solution Architect, Menlo Security
  • File Upload Protection: A Critical Gap in Web App Security, Rachid Mekdoud, Sales Engineer, OPSWAT
13:30 - 14:30

Lunch Break 

14:30 - 14:50

► How to make your company more Cyber Resilient

Patrick Van den Branden​, Group IT Security Officer, Euroports Group

  • A pro-active and reactive approach
  • A step-by-step process
  • Working on 3 axes: Technical, Governance and Human
  • The Cybersecurity Culture

 

14:50 - 15:10

► Is Network Evidence Really Needed for Security Operations? 

 Matthew Ellison, Director of Sales Engineering EMEA, Corelight

  • Do you consider network evidence a crucial part of your SOC strategy?
  • How do you really know which alerts are the most serious?
  • What's the best way to shift from responding to alerts to hunting for threats?
  • Understand how to stay ahead of ever-changing attacks by using a data-first approach for detection and response.
15:10 - 15:30

► Defining ‘ethical’ hackers

Guus van Delft, Bug Bounty & Crowdsourced Security Account Executive, Intigriti

  • Learn about the true meaning of ethics in hacking
  • Walk through the thin line between criminal and lawful
  • Discover what your company can do to reduce the grey zone to an absolute minimum
15:30 - 16:10

 Education Seminar Session 3

Delegates will be able to choose from the following education seminars:

  • Key Considerations for Choosing the Right Cloud Email Security Platform, David Lomax, Systems Engineer, Abnormal Security 
  • The Future of Security Operations: Threat Intelligence, Automation, and Data-Stitching, Rasham Rastegarpour, Sales Engineer, ReliaQuest
16:10 - 16:30

Networking Break

16:30 - 16:50

► Cyber Resilience Assessments and Benchmarking

Raymond Kleijmeer, Senior Officer Cyber Resilience, De Nederlandsche Bank

Raymond will share practical experiences on:

  • How to perform a self-assessment with Carnegie Mellon University’s Cyber Resilience Assessment methodology
  • Use the outcomes to make improvements
  • Develop relevant benchmarking to enable peer comparisons
16:50 - 17:10

► The Metaverse Opportunity 

David Palmer, Business Lead for Blockchain Technology, Vodafone

  • What are the key enablers for Virtual and Real Worlds to Co-exist
  • The key challenges 
  • Security, Identity, Jurisdiction, Copyright and Ownership
17:10 - 17:30

► Panel: Future Challenges 

Marc Berns, CISO, Allianz Benelux; Arash Rahmani, Head of Information Security, Nationale-Nederlanden C&C; Frans Szabó, IT Lead, Rabobank 

Stepping back from the day-to-day necessities, what challenges in firms’ digital environments cause greatest problems for the information security programme how does the information security function mitigate and alleviate the burden on their IT and Business colleagues to solve them? This panel will look at the challenges posed by: 

  • Asset inventories (devices, applications, identity, network, data) 
  • Overall technology landscape complexity
  • ‘Digital’ transformations of the business / products 
  • Testing and measuring the effectiveness of the cybersecurity control environment 
  • Incident response and problem management 
  • Ensuring the same coverage/visibility over cloud environments as on-prem 
  • Managing supply chain risk in a world less tolerant to long delays around supplier assurance (post covid) 
  • Web 3.0 and the next generation of the internet: securing new technologies and services which are inherently decentralised? 
17:30

Conference Close 

Education seminars


Erasing Surface, Identity, Complexity and Unknowns


Christian Borst, EMEA CTO, Vectra AI

Threat intelligence has been a critical component to knowing threat types, methods, and profiles. As enterprises shift to cloud, security and risk leaders are facing an onslaught of unknowns. Unknown compromises, attack progressions and prioritization challenges require more reliable, accurate, and timely insights into advanced attacks. In this session learn how security operations need to shift their focus to be more proactive in identifying and stopping sophisticated ATP’s.

 

During our presentation we will cover:

  • What is threat intelligence and how it benefits your organisation and SOC team
  • How to analyse the data to understand the threat landscape, anticipate attackers' next moves and take prompt action to stop attacks
  • The importance of ongoing intelligence to prevent emerging risks and threats

Key Considerations for Choosing the Right Cloud Email Security Platform


David Lomax, Systems Engineer, Abnormal Security 

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.

Unfortunately, email threats are only growing in number. Business email compromise accounts for 35% of all losses to cybercrime, and the Verizon Data Breach Investigations Report holds that phishing remains the top entry point for breaches—a position it has held for years.

Does that mean email is doomed, and we should give up? Quite the opposite. But the shift to cloud email requires one major thing: a shift to cloud email security.

Attend the Abnormal Security session for answers to your most pressing questions, including:

  • What are modern email threats, and how are they different from legacy attacks?
  • Which email threats are most concerning, and how can we defend against them in the cloud environment?
  • Which technical capabilities are required when protecting cloud email?
  • How can cloud email security platforms detect the most dangerous attacks?

 


The next class of browser-based attacks


Tom McVey, Solution Architect, Menlo Security

There are two distinct characteristics that all threat actors tend to share. First, they focus on avoiding detection by any means. Second, while some go after specific targets, many opt to aim their tactics at the vectors that will reap the greatest rewards. After all, a big pond with many fish increases everyone’s chances of success.

Between July and December 2021, there was a 224% increase in highly evasive adaptive threats (HEAT) attacks – a class of cyber threats targeting web browsers as the attack vector. While malware once had to be downloaded to pose a real risk, now, it’s a dynamically-generated threat toolkit built in the web where employees are productive.

In this session you will: 

  • Discover the anatomy of recent browser-based attacks
  • Learn why network security today is broken
  • Experience a live demo that enables you to discover the technology approach proven to eliminate these threats

Using Security Testing to Drive Change for the Better


Paul Mote, Senior Director, Solutions Architects, Synack

Security Testing is more than a list of open vulns. It's a practice that leverages live offensive security techniques to find where true risk lies. Most organisations have very different levels of effectiveness when it comes to proactive risk identification and mitigation. Some companies might be great at fixing problems but are only average at shipping secure code the first time or with every update.

 

In this session you will learn:

  • How to keep pace with digital transformation through continuous security testing
  • How to effectively fit security testing into your strategy
  • How great organisations have used security testing to make lasting, positive change - one security test at a time

File Upload Protection: A Critical Gap in Web App Security


Rachid Mekdoud, Sales Engineer, OPSWAT

Digital transformation is a must for today’s organizations, resulting in a migration from paper-based to digital documents.

Millions of documents are now being shared among collaborators weekly and monthly— uploaded to either a web portal, customer portal (insurance or mortgage applications) or support portal (attaching files to your support ticket).

At the same time, an enormous amount of effort is invested into building high-availability, fault-tolerant systems and securing them.

However, file upload remains a major attack vector and far too often is not covered by traditional web application defences.

In this seminar, Rachid Mekdoud, Sales Engineer at OPSWAT will cover three types of risks to web applications and how to apply a Zero Trust model to both users and the files they upload and the devices from which these uploaded files originate.

Risks from:

  • Threat actors who submit malicious files to gain access to the organization’s IT infrastructure.
  • User who submits sensitive data in violation of an application’s terms of service.
  • Inadvertent hosting and distributing malicious files uploaded by a threat actor.

The Future of Security Operations: Threat Intelligence, Automation, and Data-Stitching


Rasham Rastegarpour, Sales Engineer, ReliaQuest

Enterprises are working to get the ROI out of their existing tools as well as accelerate their ability to detect, investigate, and respond.  In attempting to accomplish these two goals, enterprises are considering a single data lake that stores their security data.  There are several challenges with this approach from additional costs of data egress from cloud providers to the simple fact that the enterprise data will never be in one place.  At ReliaQuest, we take a different approach using data-stitching and distributed investigations.  In this talk, we will discuss the pros and cons of centralizing security data and how an approach of data stitching solves those challenges. 

  • Security Operations Today
  • Security’s “Big Data” Problem
  • Data Lakes vs Data Stitching
  • Security Operations Platform
  • Data Stitching in Action