Programme

Programme 2020

Cyber Security Summit

Opening of the programme

Erik R. van Zuuren | Chairman of the Summit

CyberResilience - How High Can you Build Your Walls?

Philipp Amann | Head of strategy | Europol

Interactive session

Erik R. van Zuuren | Chairman of the Summit

Morning break with 1-to-1 meetings

Erik R. van Zuuren | Chairman of the Summit

SSL Decryption, Privacy and Security, a Balancing Act

Luc van Deuren | Solution Architect | Zscaler

Play the Ransomware Game

The supervisor of this session will soon be announced

Roundtable to Discuss the Improved Cooperation between Law Enforcement and Private Sector

Philipp Amann, Head of Strategy, European Cybercrime Centre (EC3)

Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

Lunch break with 1-to-1 meetings

Erik R. van Zuuren | Chairman of the Summit

Cyber-resilience, Use of IoT-devices and The Cyber Act

Claudio Bolla | Group Information Security Director | INEOS Group & Yves Schellekens | Business Group Leader Digital | Agoria

Afternoon break with 1-to-1 meetings

Erik R. van Zuuren | Chairman of the Summit

Applying the Lessons of a Major Cyber Incident

Andy Powell | CISO | Maersk Cyber Security

Experiences and Lessons Learned from Swift’s Customer Security Programme to Effectively Combat Cyber Threats

Brett Lancaster | Managing Director | Global Head of Customer Security and CSP Director | SWIFT

Closing & Networking Reception at the Network Area

Erik R. van Zuuren | Chairman of the Summit

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the summit

Opening of the programme

Erik R. van Zuuren | Chairman of the Summit

logo Trustcore.eu
Philipp Amann

Philipp Amann

Head of Strategy at Europol

CyberResilience - How High Can you Build Your Walls?

Philipp Amann | Head of strategy | Europol

This keynote will cover the latest threats and trends in cyberspace and how to respond to these threats with a view to creating a safer and more secure cyberspace. The borderless nature of cybercrime requires a response at scale that involves cross-border cooperation and the pooling of scarce resources. Effective cooperation not only can lead to successful investigations, but also be key to deterrence and prevention. Law enforcement is a key partner in ensuring cyber resilience.

logo Europol
Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the summit

Interactive session

Erik R. van Zuuren | Chairman of the Summit

Now that Europe has been working from home in recent months, cybercriminals are making their move. They promise information about measures or protection against the coronavirus or make rogue copies of legitimate sources of information about its distribution. The attacks are mainly targeting government agencies, healthcare companies, educational institutes and research organizations and the leisure sector. Peaks are also visible in the countries most affected by the virus, including Italy, France and Spain. In this interactive session, we share our experiences.

logo Trustcore.eu

Morning break with 1-to-1 meetings

Luc van Deuren

Luc van Deuren

Solutions Architect at Zscaler

SSL Decryption, Privacy and Security, a Balancing Act

Luc van Deuren | Solution Architect | Zscaler

SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.

logo Zscaler

Play the Ransomware Game

The supervisor of this session will soon be announced

How do you respond when your company is victim of a ransomware incident? Play this Ransomware Game and you will find out. In this game, you play the role of an employee of a large, complicated organization dealing with a high-stakes ransomware incident. Attendees will break into groups representing key stakeholders of an IR team and go through the steps of a rapid, no-holds-barred response process. Along the way, attendees will need to think on their feet and make high-stakes decisions about response that can impact the outcome of the exercise.

Come prepared for a fast-paced, 50 minutes session of post-breach investigation and response, with a few twists and surprises along the way!

logo isaca
Philipp Amann

Philipp Amann

Head of Strategy at Europol

Roundtable to Discuss the Improved Cooperation between Law Enforcement and Private Sector

Philipp Amann, Head of Strategy, European Cybercrime Centre (EC3)

During this limited-audience CISO- / CIO-roundtable we target to discuss under “Chatam House rule” recent and known events of eg malware infection and less known events like eg industrial espionage that effectively happened and discuss the effects the events had, how they were recovered from and how in such cases collaboration between police forces and private industry could result into a better overall resilience to such events and how collaboration can help in having a more substantial impact in allowing to go after the bad actors and supporting investigations.

logo Europol EC3
Ronald Pool

Ronald Pool

Cyber Security Specialist Benelux & Nordics at CrowdStrike

Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

In this session, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.

logo CrowdStrike

Lunch break with 1-to-1 meetings

Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

Yves Schellekens

Yves Schellekens

Business Group Leader Digital at Agoria

Cyber-resilience, Use of IoT-devices and The Cyber Act

Claudio Bolla | Group Information Security Director | INEOS Group & Yves Schellekens | Business Group Leader Digital | Agoria

This roundtable intents to discuss what impacts/opportunities the CyberAct has on the Belgian Industry (both users of and suppliers of), especially in context of the growing use of internet connected IoT devices. Indeed, in a world where both the exposure grows due to increase use of IoT-devices as well as the threats (for example recent ransomware-incidents) it becomes more and more vital that any solutions used by, bought by, supplied by… are “certified” providing parties using such devices better reassurance that what they put out there in the field is sufficiently secure. What is the state of play? What will be the impact and/or opportunities for Industry really be?  Come and join the discussions.

logo Ineos
logo Agoria

Afternoon break with 1-to-1 meetings

Andy Powell

Andy Powell

Chief Information Security Officer at MAERSK

Applying the Lessons of a Major Cyber Incident

Andy Powell | CISO | Maersk Cyber Security

On 27 June 2017, A.P. Moller Maersk’s screens went black. … The cyber-attack that hit the container business was initiated by a previously unseen type of malware that destroyed all of Maersk’s Windows computer capability, stopping most operations around the world. In this inspiring session, Maersk CISO, Andy Powell, takes us back to the moment the most devastating cyberattack since the invention of the internet took place. Powell will also share the painful lessons learned which have now enshrined in five principles, relating to organisational resilience, boardroom accountability, and security being a benefit, growth driver, and everyone’s responsibility.

logo Maersk
Brett Lancaster

Brett Lancaster

Managing Director, Global Head of Customer Security and CSP Director at Zscaler

Experiences and Lessons Learned from Swift’s Customer Security Programme to Effectively Combat Cyber Threats

Brett Lancaster | Managing Director | Global Head of Customer Security and CSP Director | SWIFT

In the world of constantly evolving cyber-threats, SWIFT has years of experience in building and fostering a secure eco-system between financial institutions. As such it has learned that he security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is playing an important role in reinforcing and safeguarding the security of the wider ecosystem and as such has built a Customer Security Programme to assist its partners to keep their systems secure/safe. In this keynote SWIFT will share it experiences and key recommendation with the audience so that it can bring inspiration also outside of the financial sector.

logo SWIFT

Closing & Networking Reception at the Network Area

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the summit

Opening of the programme

Erik R. van Zuuren | Chairman of the Summit

logo Trustcore.eu
Philipp Amann

Philipp Amann

Head of Strategy at Europol

CyberResilience - How High Can you Build Your Walls?

Philipp Amann | Head of strategy | Europol

This keynote will cover the latest threats and trends in cyberspace and how to respond to these threats with a view to creating a safer and more secure cyberspace. The borderless nature of cybercrime requires a response at scale that involves cross-border cooperation and the pooling of scarce resources. Effective cooperation not only can lead to successful investigations, but also be key to deterrence and prevention. Law enforcement is a key partner in ensuring cyber resilience.

logo Europol
Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the summit

Interactive session

Erik R. van Zuuren | Chairman of the Summit

Now that Europe has been working from home in recent months, cybercriminals are making their move. They promise information about measures or protection against the coronavirus or make rogue copies of legitimate sources of information about its distribution. The attacks are mainly targeting government agencies, healthcare companies, educational institutes and research organizations and the leisure sector. Peaks are also visible in the countries most affected by the virus, including Italy, France and Spain. In this interactive session, we share our experiences.

logo Trustcore.eu
Andy Powell

Andy Powell

Chief Information Security Officer at MAERSK

Applying the Lessons of a Major Cyber Incident

Andy Powell | CISO | Maersk Cyber Security

On 27 June 2017, A.P. Moller Maersk’s screens went black. … The cyber-attack that hit the container business was initiated by a previously unseen type of malware that destroyed all of Maersk’s Windows computer capability, stopping most operations around the world. In this inspiring session, Maersk CISO, Andy Powell, takes us back to the moment the most devastating cyberattack since the invention of the internet took place. Powell will also share the painful lessons learned which have now enshrined in five principles, relating to organisational resilience, boardroom accountability, and security being a benefit, growth driver, and everyone’s responsibility.

logo Maersk
Brett Lancaster

Brett Lancaster

Managing Director, Global Head of Customer Security and CSP Director at Zscaler

Experiences and Lessons Learned from Swift’s Customer Security Programme to Effectively Combat Cyber Threats

Brett Lancaster | Managing Director | Global Head of Customer Security and CSP Director | SWIFT

In the world of constantly evolving cyber-threats, SWIFT has years of experience in building and fostering a secure eco-system between financial institutions. As such it has learned that he security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is playing an important role in reinforcing and safeguarding the security of the wider ecosystem and as such has built a Customer Security Programme to assist its partners to keep their systems secure/safe. In this keynote SWIFT will share it experiences and key recommendation with the audience so that it can bring inspiration also outside of the financial sector.

logo SWIFT
Luc van Deuren

Luc van Deuren

Solutions Architect at Zscaler

SSL Decryption, Privacy and Security, a Balancing Act

Luc van Deuren | Solution Architect | Zscaler

SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.

logo Zscaler
Ronald Pool

Ronald Pool

Cyber Security Specialist Benelux & Nordics at CrowdStrike

Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

In this session, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.

logo CrowdStrike
Philipp Amann

Philipp Amann

Head of Strategy at Europol

Roundtable to Discuss the Improved Cooperation between Law Enforcement and Private Sector

Philipp Amann, Head of Strategy, European Cybercrime Centre (EC3)

During this limited-audience CISO- / CIO-roundtable we target to discuss under “Chatam House rule” recent and known events of eg malware infection and less known events like eg industrial espionage that effectively happened and discuss the effects the events had, how they were recovered from and how in such cases collaboration between police forces and private industry could result into a better overall resilience to such events and how collaboration can help in having a more substantial impact in allowing to go after the bad actors and supporting investigations.

logo Europol EC3
Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

Yves Schellekens

Yves Schellekens

Business Group Leader Digital at Agoria

Cyber-resilience, Use of IoT-devices and The Cyber Act

Claudio Bolla | Group Information Security Director | INEOS Group & Yves Schellekens | Business Group Leader Digital | Agoria

This roundtable intends to discuss what impacts/opportunities the CyberAct has on the Belgian Industry (both users of and suppliers of), especially in context of the growing use of internet connected IoT devices. Indeed, in a world where both the exposure grows due to increase use of IoT-devices as well as the threats (for example recent ransomware-incidents) it becomes more and more vital that any solutions used by, bought by, supplied by… are “certified” providing parties using such devices better reassurance that what they put out there in the field is sufficiently secure. What is the state of play? What will be the impact and/or opportunities for Industry really be?  Come and join the discussions.

logo Ineos
logo Agoria

Play the Ransomware Game

The supervisor of this session will soon be announced

How do you respond when your company is victim of a ransomware incident? Play this Ransomware Game and you will find out. In this game, you play the role of an employee of a large, complicated organization dealing with a high-stakes ransomware incident. Attendees will break into groups representing key stakeholders of an IR team and go through the steps of a rapid, no-holds-barred response process. Along the way, attendees will need to think on their feet and make high-stakes decisions about response that can impact the outcome of the exercise.

Come prepared for a fast-paced, 50 minutes session of post-breach investigation and response, with a few twists and surprises along the way!

logo isaca

Who will be speaking

VIEW OUR CONFIRMED EXPERTS

Curious as to who will speak and what experience they bring? Quickly view our complete experts overview!

Stay informed!

Don't miss a single conference update and sign up for our newsletter!