Agenda

08:00 - 08:50

Login & Networking

08:50 - 09:00

Conference Welcome

09:00 - 09:20

Ransomware: a challenge to business continuity,  not just an IT contingency

Maite Avelino, Head of Cybersecurity, Spanish Ministry of Defence 

  • Truly identify your critical business processes and where are they housed
  • "Modern and comfortable" ways to make backups that do not work against ransomware
  • Network segmentation and NACs are critical
  • The importance of a good Communication Plan to avoid "ramonguares"
09:20 - 09:40

► The Rise of Infostealers in Spain 

Danny Panton, Cybercrime Intelligence Analyst, Latin America, Recorded Future

  • The most common variants leveraged in Spain.
  • The common dark web and underground market sources where these malware stealer variants are most utilized in order to obtain private data and logs.
  • The most common Spanish Internet Service Providers attacked by infostealers.
09:40 - 10:00

► The rise of Ransomware nowadays

Carlos Payés, Sales Engineer & Raúl Benito, Regional Sales Manager Iberia, SentinelOne

  • Are companies prepared for these post-COVID attacks?
  • What is the state of the art in EDR/XDR solutions?
  • Ransomware As A Service
  • Partner types and expertise
  • Global positioning
10:00 - 10:20

►The CEO's Perspective on Cybersecurity

Fernando Vegas, former CIO & CRO, OHL Group

  • Comparative view of the evolution of cybersecurity costs and damage caused by incidents
  • Comparing previous data with the global vision of the World Economic Forum
  • Overview of the most relevant risks
  • Strategic perspective: Technical containment, Organization and Assurance
10:20 - 10:50

 Education Seminar Session 1

Delegates will be able to choose from the following education seminars:

  • How to break the chain of Ransomware - Vijay Kishnani, Lead Cyber Security Engineer, CybelAngel
  • Leveraging IAM for Effective and Efficient Threat Mitigation - Lonnie Benavides, Head of Infrastructure and Application Security, OneLogin
10:50 - 11:20

Networking & Refreshments

11:20 - 11:40

►A key strategic approach in a period of change

María Luz Garin, Information Security Manager, Eroski 

  • The promises of cloud service providers
  • Shared responsibility matrix - Incorporating the risks and threats of migrating to the cloud
  • Testing and analysing migration risks
11:40 - 12:00

► Ransomware in Focus: How AI Surgically Contains the Threat 

José Badía López, Country Manager, España & Portugal, Darktrace

  • In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom, or shut down critical systems and services.
  • In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.  But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? 
  • Join this presentation to learn how Self-Learning AI is helping thousands of organizations fight back against ransomware. We’ll discuss: The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’; Real-world examples of ransomware detected by Self- Learning AI; How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life 
12:00 - 12:20

► Exploring Microsegmentation: Get Visibility, Stop Ransomware and Protect Critical Applications

Julen Cordon, SE for Iberoamerica, Guardicore

  • How to build a solid foundation to stop the spread of ransomware, achieve workload protection and compliance?
  • Understand why visibility, isolation, and segmentation of network applications and their components are crucial factors.
  • Zero Trust as a security requirement
  • Today's landscape: the use of dynamic cloud, hybrid environments and legacy systems and the need for speed to enforce policies, scale your operations and reduce the attack surface.
12:20 - 12:40

► Forensic analysis of data evidence has become vital

Angel Bahamontes, President and Director, ANTPJI & Chair of Computer Crimes

  • How to browse safely and prevent hacking. Legally and technically
  • How to act in the face of computer crime: Technical and legal response
  • Creation of a Technological Incident Response Cabinet
12:40 - 13:10

 Education Seminar Session 2

Delegates will be able to choose from the following education seminars:

  • Cisco SecureX + Kenna Security: Radical Simplification in the New Era of Cybersecurity - Stephen Roostan, VP, EMEA, Kenna Security
  • Critical Infrastructure Protection by OPSWAT - Alessandro Porro, Vice President, Global Channels, OPSWAT
13:10 - 14:00

Lunch & Networking

14:00 - 14:20

► Re-identification test: risks and data protection

Jesús Alonso Murillo, CISO, Campofrio Food Group

  • Re-identification test
  • Risk assessment details
  • Re-identification examples
  • Conclusions

 

14:20 - 14:40

► Customer Testimonial: ODDO-BHF: Collaborative Penetration Testing With Synack

Gaël Barrez, Sales Director, Synack, Willem Peerbolt, ODDO-BHF Group CISO & Matthew West, Solutions Architect, Synack

  • Why ODDO, BHF shifted from classic pen testing to crowdsourced.
  • How Synack’s remote security testing platform is helping to augment ODDO-BHF’s internal teams.
  • What results and benefits the company is getting.
  • The interview will be followed by a demo of our platform.
14:40 - 15:00

​​​​​​► Ensuring cyber readiness across your infrastructure defence teams has just entered a new era.

Rupert Collier, VP of International Sales, RangeForce

  • A combination learning approach using self-paced education, together with regular team exercises, is the best way to develop muscle memory for real cyber emergencies.
  • Cyber defenders can continue to benefit from continuous professional development entirely through a browser, but still in a hands-on, practical fashion.
  • CISOs and SOC leaders can accurately monitor and assess skill levels within their teams, in order to identify any possible coverage gaps that could represent a threat to the business.
  • Actionable insights and metrics about performance and skill levels of team members can help identify the cybersecurity superstars, both already in your organisation and amongst those that may want to join.
  • All of this is available at a fraction of the cost of traditional learning, with much better success metrics and without a single boring classroom in sight!
15:00 - 15:20

► Applications of eDiscovery in Cyber Investigations

Alejandro Rivas-Vásquez, Partner, Digital Forensics, KPMG

  • What is eDiscovery?
  • How can eDiscovery improve our Digital Forensic Readiness?
  • How can we use eDiscovery during a data breach investigation?
15:20 - 15:50

Networking & Refreshments

15:50 - 16:30

►The need for tactical-operational talent in CyberIntelligence

Enrique Ávila, Director, Center for Analysis and Forecasting of the Civil Guard and Director of the the National Centre for Cybersecurity Excellence at the Autonomous University of Madrid

  • Current scenario
  • Tactical-operational knowledge
  • Formation and training platform
  • Digital twins
  • Conclusions
16:30 - 16:35

Closing Remarks

16:35 - 17:00

Networking & Refreshments

17:00

Conference Close

Education seminars


Leveraging IAM for Effective and Efficient Threat Mitigation


Lonnie Benavides, Head of Infrastructure and Application Security, OneLogin.

There’s no question that the current cybersecurity landscape is constantly shifting and evolving as new threats and security solutions emerge. Increased cyber attacks and distributed workforces have created new challenges that require innovative solutions.

Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, what are the fundamental controls organizations need to maintain business continuity and secure their remote and hybrid workforce?

Hear from Lonnie Benavides – Head of Infrastructure and Application Security, Onelogin – for a discussion on practical information and advice regarding the utilization of identity and access management solutions to effectively mitigate modern cyber threats to your business.

Key Takeaways:

  • Understanding the key fundamentals of a strong cloud security posture
  • Why passwords alone are not enough
  • Best practices for building a cybersecurity strategy at scale

Cisco SecureX + Kenna Security: Radical Simplification in the New Era of Cybersecurity


Stephen Roostan, VP, EMEA, Kenna Security 

Cybersecurity is a complex challenge. What’s needed is a way to radically simplify security operations to be simple, automated, and democratized. So, no matter the complexity of your IT environment, and how many threats may be targeting your organization, protecting it shouldn’t be difficult.

Cisco recognizes this need and is defining a path forward. By integrating Kenna Security’s acclaimed risk-based vulnerability management platform, Cisco’s SecureX will help organizations solve a notoriously difficult piece of the security puzzle to accelerate response time for cyber readiness.

In this session, Stephen Roostan, Vice President for EMEA at Kenna Security, now part of Cisco, details why Cisco’s acquisition of Kenna is a pivotal move for customers and the industry as a whole.

  • Real-world threat intel, machine learning, and predictive analytics help teams identify and prioritize their riskiest vulnerabilities
  • Remediation teams will know what to patch and when, saving time, money, and resources
  • Integrating enterprise security management solutions into one centralized location breaks down silos and extends detection and response capabilities
  • Automated workflows help lower organizational risk profiles, improve collaboration between Security and IT, and shrink their attack surfaces
  • Kenna Risk Scores help stakeholders clearly assess the relative risk of a specific vulnerability, asset class, workgroup, or organization as a whole
  • To speed decision making with prioritization of vulnerability data based on threat intelligence and asset business value
  • Adding Kenna Security to SecureX extends the broadest XDR capabilities in the industry

How to break the chain of Ransomware


Vijay Kishnani, Lead Cyber Security Engineer, CybelAngel

Increasingly frequent ransomware attacks have proven to be a threat to global supply chains, from oil to food to healthcare. Faced with danger, companies must take a proactive role to fight these attacks.

During this session we will cover:

  • Some recent attacks - what can we learn from prevention tactics and post-attack responses
  • How attackers target their victims, locate infiltration points, infect systems and blackmail companies
  • Good practices to prevent ransomware attacks

Critical Infrastructure Protection by OPSWAT


Alessandro Porro, Vice President, Global Channels, OPSWAT

How can file transfers be secured across the entire enterprise, especially between uncontrolled devices? Alessandro Porro, Vice President of Channel Sales at OPSWAT will show how to secure files transfer into, across, and out of secure environments to avoid malware and/or data breach.

  • Breach Prevention with Multiscanning
  • Cybersecurity Compliance
  • Digital Perimeter Control with Automated Device Blocking
  • Secure File Transfer with Automated Media Blocking