Agenda
08:00 - 08:50 |
Registration & Breakfast Networking |
08:50 - 09:00 |
Chair's Welcome |
09:00 - 09:20 |
►Organisational Resilience from Policy to Practice: Lessons from TomTom and experience Jukka Silomaa, Head of GRC, TomTom
|
09:20 - 09:40 |
►Future-Proofing Europe: The Next Era of Cybersecurity? Thomas Zaatman, Director of Strategic Accounts, Tanium
|
09:40 - 10:00 |
►Iocs Are Not Alone: Maximising Outcomes From Threat Intelligence for Preventing Ransomware Incidents Anton Ushakov, Head of Threat Intelligence and Digital Risk Protection, Group-IB
|
10:00 - 10:20 |
►Can The AI (R)evolution help security leaders to manage complexity?
|
10:20 - 11:00 |
►Education Seminar 1 Delegates will be able to choose from the following education seminars:
|
11:00 - 11:30 |
Networking Break |
11:30 - 12:00 |
►Building Anti-Fragile Security into Third-Party Risk Management and Supply Chain Strategies Elli Tsiala, Supply Chain Security Lead, ABN AMRO Bank
|
12:00 - 12:20 |
►How DevSecOps Builds Strong Defenses for Cybersecurity Martin Dimovski, Senior DevOps/DevSecOps Engineer, ABN AMRO Bank
|
12:20 - 13:00 |
►Education Seminar 2 Delegates will be able to choose from the following education seminars:
|
13:00 - 14:00 |
Lunch & Networking Break |
14:00 - 14:20 |
►Evolving Cybersecurity Landscape: Key Threats and Future Priorities Alan Lucas, CISO, Homefashion Group
|
14:20 - 14:40 |
►Inside an Info Stealer Attack: Journey from Infection to Exfiltration Burak Uyduran, Marketing Manager, SOCRadar
|
14:40 - 15:00 |
►It Started with a Cookie: Zero Trust and the Rise of Session Hijacking Mandeep Sandhu, Systems Engineering and Investigations Manager, EMEA, SpyCloud Learn how to go beyond traditional credential monitoring and implement continuous Zero Trust using enriched cybercrime telemetry Attendees will learn:
|
15:00 - 15:20 |
►The ART of cyber resilience testing Lennert Branderhorst, Policy officer, De Nederlandsche Bank (DNB)
|
15:20 - 15:40 |
Networking Break |
15:40 - 16:10 |
►CISO panel discussion: How do we effectively manage our cybersecurity budgets?
|
16:10 - 16:30 |
► LIVE DEMONSTRATION: Weaponising AI for Cyber Attacks & Offensive Operations Manit Sahib, Ethical Hacker, The Global Fund
|
16:30 |
Chairs Closing Remarks |
Education seminars
Generative AI: Amplifying Attackers and Defenders
Lewis Brand, Senior Sales Engineer, Recorded Future
Generative AI empowers scalable consumption and production for both attackers and defenders, ushering in a wave of surprising use cases. This presentation shifts the focus from potential malicious uses to practical takeaways. Join us to explore how generative AI can be harnessed for positive impact, providing you with actionable insights and strategies to navigate transformative possibilities.
Attendees will learn:
- Real world examples and use cases
- A practical lens for defenders
- Think about things differently
- Recorded Future AI in action
NDR as the go-to tool to reduce the fragility in your security architecture
Jürgen Verniest, Sales Director Benelux & Nordics, Gatewatcher
In a world where uncertainty reigns, antifragility has become a key concept for building systems that not only resist but adapt to disruptions. In cybersecurity, unexpected and high-impact incidents such as zero-day exploits or advanced state-sponsored attacks, highlight how traditional security architectures often fall short. These rare but devastating threats expose vulnerabilities that static models like Zero Trust can struggle to address if improperly deployed. For Chief Information Security Officers (CISOs), who are increasingly under siege, the priority is clear: moving beyond rigid frameworks to create dynamic, antifragile ecosystems that can evolve and grow stronger in the face of an ever-changing threat landscape. This is where Network Detection and Response (NDR) solutions become indispensable. It helps CISO's to transform the limitations of Zero Trust into strengths by delivering unmatched visibility, adaptability, and rapid response capabilities. NDR technology brings antifragility to cybersecurity, helping organizations anticipate threats and grow stronger after crises, turning their networks into proactive defenders rather than passive targets.
Attendees will learn:
- As number of attacks rise drastically and the attacks become increasingly sophisticated, CISO's have to deal with the concept of Shadow Risk.
- CISO's have to trust 100% new technologies (sometimes without regulation) while building a zero trust security architecture.
- CISO's have to take the right steps to provide the setting for full visibility and fast and adequate response to their SOC team
How Non-Human Identities Create Operational and Cyber Risk for Organisations
Fred Noordam, Regional Sales Manager, Silverfort
Al Scott, Senior Sales Engineer EMEA, Silverfort
Non-Human Identities (NHIs) pose one of the most significant cyber threats to an organisation as they can pose severe operational risks. In many cases, NHIs have elevated privileges, lack proper oversight, are not documented, and are often not linked to specific individuals. This makes them attractive targets for attackers, who may exploit them to gain unauthorised access, move laterally within systems, and carry out malicious activities without being detected. In our session, Silverfort will examine how organisations can reduce operational risk by understanding and implementing security controls around their Non-Human Identities.
Attendees will learn:
- Understand why Non-Human Identities should be a top priority for your board
- Learn about how to measure and detect the level of risk Non-Human Identities pose for your organisation
- Grow your knowledge of how to mitigate the risk of Non-Human Identities, before, during and after a cyber breach
The AI Arms Race: Good AI vs. Bad AI
Frank Benus, Sales Engineer, Abnormal Security
The rapid rise of generative AI, prompted by the release of ChatGPT in late 2022, has security leaders concerned. By using this new technology, threat actors can now create highly effective attacks at scale, and few things are more vulnerable than your inboxes.
Attendees will learn:
- How cybercriminals are using generative AI to create their attacks
- Which types of attacks are likely to grow in volume and sophistication
- Why you need tools that utilize "good" AI to protect your organizations against this "bad" AI