Agenda
08:00 - 08:50 |
Registration and Networking Break |
08:50 - 09:00 |
Chairman’s welcome |
09:00 - 09:20 |
► Collaboration is Key: Balancing regulation/compliance and security Claudia van den Beld, Advisor International Cooperation, National Cyber Security Centre of the Netherlands
|
09:20 - 09:40 |
► Human Machine Teaming: The Indispensable Human Element of Cybersecurity Sjoerd de Jong, Senior Sales Engineer, SentinelOne Artificial Intelligence is a pervasive part of our lives today and cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. With machine learning becoming one of the most important tools of defense, leaders must balance the overwhelming speed and accuracy advantage of AI with the need for measured and intuitive interactions with a real-world human element.
|
09:40 - 10:00 |
► Keeping your data incidents from becoming data breaches with Data Security Posture Management Filip Verloy, Field CTO EMEA & APJ Rx, Rubrik
|
10:00 - 10:20 |
► NIS2: Beyond compliance, a catalyst for transformation Arash Rahmani, CISO a.i., Nederlandse Zorgautoriteit
|
10:20 - 11:00 |
► Education Seminar Session 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 11:50 |
► Implementing Robust Measures to Secure the Supply Chain Siegfried Moyo, Head of Cybersecurity EU, APAC, & LATAM, Americold Logistics
|
11:50 - 12:10 |
► Living in a world of fakes In this talk, we'll be looking at:
|
12:10 - 12:30 |
► Nowhere to hide – Key Insights into Adversary Tradecraft 2023 John Spencer, Sales Engineering, Crowdstrike Get a frontline snapshot of the current threat landscape, threat actors and their victims.
|
12:30 - 12:50 |
► NDR and NIS2: How to turn your compliance obligation into an opportunity Jürgen Verniest, Sales Director Benelux & Nordics, Gatewatcher In this presentation, we will tackle:
|
12:50 - 13:30 |
► Education Seminar Session 2 Delegates will be able to choose from the following education seminars:
|
13:30 - 14:30 |
Lunch Break |
14:30 - 14:50 |
► How to build a highly automated third-party security risk management (TPSRM) programme Elli Tsiala, Product Owner of Supply Chain Security, ABN AMRO Bank
|
14:50 - 15:10 |
► Using Zero Trust to Improve Cyber-resilience in the age of AI Trevor Dearing, Global Director of Critical Infrastructure Solutions, Illumio As we transform our business models to deliver more agile services the increasing threat of AI generated attacks on critical infrastructure can potentially disrupt services causing an impact on society. Complying with any changes potentially coming with implementations of NIS2 could be complex and add cost. Taking a Zero Trust approach can simplify compliance and reduces costs. In this session we will address the following topics:
|
15:10 - 15:30 |
► Network evidence for defensible disclosure Nico Roosenboom, Systems Engineer, Corelight
|
15:30 - 16:10 |
► Education Seminar Session 3 Delegates will be able to choose from the following education seminars:
|
16:10 - 16:30 |
Networking Break |
16:30 - 17:00 |
► CISO Panel Discussion
|
17:00 - 17:30 |
► Bypassing Multi-Factor Authentication (MFA) via Phishing Techniques
|
17:30 |
Conference Close |
Education seminars
The Cyber Arms Race: Staying Ahead
Martijn Hoogesteger, Head of Cybersecurity, S-RM
- Cyber criminals have had free reign for years, but organisations are better defended, driving them to develop new methods
- Understand the current lay of the cyber-criminal landscape
- Learn about new techniques being used by ransomware groups
- Hear S-RM's insights on the future of cyber threats
Generative AI: Amplifying attackers and defenders
Lewis Brand, Senior Sales Engineer, Recorded Future
Generative AI empowers scalable consumption and production for both attackers and defenders, ushering in a wave of surprising use cases. This presentation shifts the focus from potential malicious uses to practical takeaways. Join us to explore how generative AI can be harnessed for positive impact, providing you with actionable insights and strategies to navigate transformative possibilities. Main topics to be discussed:
- Real world examples and use cases
- A practical lens for defenders
- Think about things differently
- Recorded Future AI in action
The Future of the Human Risk Reduction
Petri Kuivala, Strategic Advisor, Hoxhunt
Cyber Security comes together in a holy marriage of People, Processes and Technology. CISO´s needs to engage people as their force multipliers as they will not survive alone in the constantly evolving world.
Join this interactive session to learn more about;
- The CISO veteran & start-up coach thoughts about the People role in Future with the Cyber Security context
- Be ready with your phone having www.menti.com open to donate your ideas back in to the conversation. “Hold on your chair as Texas is going bye bye….the Matrix”.
Hack the brain – Social Engineering Innovation in 2023
Bas van Erk, Director Benelux & Nordics, SoSafe
The human factor remains a gateway for cybercriminals as phishing and ransomware attacks continue to increase. Cases like those of Uber and Rockstar Games have also shown how cybercriminals are evolving at a rapid pace, exploiting human psychology and our emotions - and hacking our brains. But how do attackers use behavioral science specifically against us? What can we do to protect those around us?
- Emotional Manipulation Tactics: Insight into how cybercriminals exploit emotions, emphasizing the need for psychological awareness in cybersecurity
- Behavioral Science in Attacks: Understanding how attackers use behavioral science for effective phishing and ransomware, highlighting the importance of this knowledge in defense strategies
- Strengthening Defenses: Practical strategies for enhancing resilience against social engineering, focusing on team education and recognition of sophisticated threats
The Future of Security Operations
Rasham Rastegarpour, ReliaQuest
Security operations are changing rapidly and require a more holistic approach to security. Streamlining threat detection, investigation, and response is a good start in managing risk, but also important are utilising threat intelligence and digital risk protection, reviewing suspect employee-submitted emails via the abuse mailbox, and measuring your program to communicate better with your stakeholders and service providers. Additionally, security operations will become more streamlined, with the automation of routine tasks and incident-response procedures becoming the norm. This session will help organisations achieve efficient and effective detection and response to security incidents.
Five benefits for delegates attending the session:
- How a security operations platform helps proactively detect and mitigate cybersecurity risks and support future changes in your business
- The benefits of complete visibility across cloud, on-premises, and endpoint environments to mitigate security risks and enable rapid remediation
- How automation at key junctures can streamline security operations, speed resolution, and reduce the risk of human error
- The need for a more collaborative approach between providers and enterprises that avoids a “black box” method and provides measurable improvements in security operations
- How integration with existing security toolsets enables organisations to extract more value out of existing investments while streamlining security response
Defending with an Attacker's Mindset
Boudewijn van Lith, Senior Manager Technical Sales, Proofpoint
The organisation chart is the new zero-day — and today, it’s publicly available on social media.
• It’s easier to find someone who will click a link than to find an exploit for an operating system. The attacker simply needs to know who has access to the data they want, then get creative.
• Most security teams don’t have the same perspective that the threat actors do — they think of their attack surface in terms of VLAN and IP address, instead of the department or job title.
• Effective defence comes when you can anticipate your attackers’ moves. By combining threat landscape insights with data on which of your users are targeted with which threats, organisations can build more effective security awareness training programs, and users can better defend themselves from the threats they are most likely to see.