Programme

The programme contains 20-minute videotalks & LIVE sessions. Register for the event and you will receive an invitation from us to compile your programme and watch the content and sign up for one or more LIVE sessions. Please note that the number of places in the LIVE sessions is limited!

The programme is divided into three different powerful tracks in order to provide you with the most relevant information: Leadership, Governance, Risk & Compliance and Technical.

Andy Powell

Andy Powell

Chief Information Security Officer at MAERSK

LIVE VIDEOTALK: APPLYING THE LESSONS OF A MAJOR CYBER INCIDENT

ANDY POWELL | CISO | MAERSK CYBER SECURITY

logo Maersk

LIVE ROUND TABLE BY FOX IT

TBA

Fox-it 1
Philipp Amann

Philipp Amann

Head of Strategy at Europol

LIVE VIDEOTALK: CyberResilience - How High Can you Build Your Walls?

PHILIPP AMANN, HEAD OF STRATEGY, EUROPEAN CYBERCRIME CENTRE (EC3)

Philipp Amann

Philipp Amann

Head of Strategy at Europol

LIVE ROUNDTABLE TO DISCUSS THE IMPROVED COOPERATION BETWEEN LAW ENFORCEMENT AND PRIVATE SECTOR

PHILIPP AMANN, HEAD OF STRATEGY, EUROPEAN CYBERCRIME CENTRE (EC3)

Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

Yves Schellekens

Yves Schellekens

Business Group Leader Digital at Agoria

LIVE ROUNDTABLE CYBER-RESILIENCE, USE OF IOT-DEVICES AND THE CYBER ACT

THIS SESSION WILL BE MODERATED BY CLAUDIO BOLLA AND YVES SCHELLEKENS

logo Agoria
Frank Versmessen

Frank Versmessen

Head of Controls, Attestation & Assurance, Global Security at SWIFT

LIVE VIDEOTALK: EXPERIENCES AND LESSONS LEARNED FROM SWIFT’S CUSTOMER SECURITY PROGRAMME TO EFFECTIVELY COMBAT CYBER THREATS

frank Versmessen | Head of Controls, Attestation & Assurance, Global Security | SWIFT

logo SWIFT
Jonathan Ehret

Jonathan Ehret

VP Strategy & Risk at RiskRecon

VIDEOTALK: THE NEIGHBORHOOD WATCH: USING CONTINUOUS MONITORING TO INCREASE VISIBILITY AND EFFECTIVENESS OF TPRM PROGRAMS

JONATHAN EHRET | VP STRATEGY & RISK | RISKRECON

Marc Lueck

Marc Lueck

CISO EMEA at Zscaler

Videotalk: The DEATH OF THE FIREWALL

MARC LUECK | CISO EMEA | ZSCALER

logo Zscaler
Kris Bijnens

Kris Bijnens

Security Engineer at Varonis

Videotalk: Discover & Protect your Data in Cloud & On-Premise

Kris Bijnens | Security Engineer | Varonis

logo Varonis
Christo Butcher

Christo Butcher

Global Lead Threat Intelligence at FOX-IT

VIDEOTALK: DETECTION ENGINEERING: ALERT TIREDNESS TO THE PAST TIME

CHRISTO BUTCHER | GLOBAL LEAD THREAT INTELLIGENCE | FOX-IT

Ronald Pool

Ronald Pool

Cyber Security Specialist Benelux & Nordics at CrowdStrike

Videotalk: Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

logo CrowdStrike
Ronald Beiboer

Ronald Beiboer

Product Manager MDR at Fox-IT

VIDEOTALK: MDR in the real world – pitfalls & best practices

Ronald Beiboer | Product Manager MDR | FOX-IT

Jonathan Ehret

Jonathan Ehret

VP Strategy & Risk at RiskRecon

VIDEOTALK: THE NEIGHBORHOOD WATCH: USING CONTINUOUS MONITORING TO INCREASE VISIBILITY AND EFFECTIVENESS OF TPRM PROGRAMS

JONATHAN EHRET | VP STRATEGY & RISK | RISKRECON

Visibility into our vendors’ security controls and the effectiveness with which they are operating have been and continue to be some of the major challenges in the world of third party risk. This discussion will cover those struggles, the inherent limitations of the security questionnaire as well as how continuous monitoring tools can be utilised to shed light on the effectiveness of a vendor’s security controls.

Marc Lueck

Marc Lueck

CISO EMEA at Zscaler

Videotalk: THE DEATH OF THE FIREWALL

MARC LUECK | CISO EMEA | ZSCALER

Marc Lueck, CISO EMEA at Zscaler, discusses why the firewall no longer has a valid place in today’s internet connected world, and how the technology has held us back from delivering a better level of security for years. Not just doom and gloom, he also introduces the means to escape the firewall trap, by bringing traffic to controls, rather than controls to the traffic.

logo Zscaler
Kris Bijnens

Kris Bijnens

Security Engineer at Varonis

DISCOVER & PROTECT YOUR DATA IN CLOUD & ON-PREMISE

KRIS BIJNENS | SECURITY ENGINEER | VARONIS

In this session, Kris Bijnens will explain why it is important to audit your data. Once you have the right visibility, you can start remediation projects to lower the risks, detect threats and audit policies to be compliant whit different regulations.

logo Varonis
Christo Butcher

Christo Butcher

Global Lead Threat Intelligence at FOX-IT

VIDEOTALK: DETECTION ENGINEERING: ALERT TIREDNESS TO THE PAST TIME

CHRISTO BUTCHER | GLOBAL LEAD THREAT INTELLIGENCE | FOX-IT

By using the latest attack techniques, hackers are able to penetrate almost everywhere. Detection has therefore become a standard part of defence in addition to prevention so that the damage can be limited as soon as it becomes clear that attackers are in your network. Detection is not easy, however, because many organizations suffer from alert fatigue due to the fact that they can no longer see the forest due to a deluge of reports for the trees, but are still being hacked.

In this session, you will see how Detection Engineering can be the key to effective and efficient detection: on the one hand, see the attacks, and stop a ransomware attack before you are taken hostage; on the other hand only receive relevant alerts, so that no alert fatigue occurs.

Threat Intelligence is an important building block for Detection Engineering. But then it must be properly set up: high-quality insight into the threat landscape applicable to your specific situation so that you can make security choices based on relevant risks. This session also discusses this on the basis of concrete examples from the targeted ransomware domain.

Ronald Pool

Ronald Pool

Cyber Security Specialist Benelux & Nordics at CrowdStrike

Videotalk: Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

In this videotalk, you will gain insight into the contemporary methods by which hackers penetrate your environment, move around freely and then run off with your data, probably without you noticing. You will gain insight into the methods available to detect and combat this, often with tools that you already have in-house.

Threat Landscape: Join us to observe new attack techniques based on our renowned Threat Landscape, to defeat ransomware, spear-phishing attacks and malware-free intrusions.
Ransomware: Pay or Cure: Having the ambition to not pay ransomware is great, but is it feasible? Can you handle the infection alone or do you need specialised help? And what are the hidden costs even if you do pay?
Time to Respond: Learn why security hygiene matters and how partnering can help solve the skills shortage in your security team. We will present new tips & tricks to improve your organization’s Time to Respond.

Note: This is a technical session, which actually discusses the hacking methods and tools and thus requires some technical affinity.

logo CrowdStrike
Ronald Beiboer

Ronald Beiboer

Product Manager MDR at Fox-IT

VIDEOTALK: MDR in the real world – pitfalls & best practices

Ronald Beiboer | Product Manager MDR | FOX-IT

Managed Detection and Response. It’s what everybody is talking about and it should make sure we sleep without worries at night. However, getting MDR right is no easy task. By providing MDR solutions in all kinds of corporate environments, we have encountered (and solved) tons of challenges, time and time again. What are the do’s and don’ts? Which pitfalls should be avoided and which best practices will help you hit the ground running?

Andy Powell

Andy Powell

Chief Information Security Officer at MAERSK

LIVE VIDEOTALK: APPLYING THE LESSONS OF A MAJOR CYBER INCIDENT

ANDY POWELL | CISO | MAERSK CYBER SECURITY

On 27 June 2017, A.P. Moller Maersk’s screens went black. … The cyber-attack that hit the container business was initiated by a previously unseen type of malware that destroyed all of Maersk’s Windows computer capability, stopping most operations around the world. In this inspiring session, Maersk CISO, Andy Powell, takes us back to the moment the most devastating cyberattack since the invention of the internet took place. Powell will also share the painful lessons learned which have now enshrined in five principles, relating to organisational resilience, boardroom accountability, and security being a benefit, growth driver, and everyone’s responsibility. During this webinar, you can ask your question via chat.

logo Maersk
Icoon-Heliview-TALKS

LIVE ROUND TABLE by FOX IT

TBA

More information will follow soon!

Fox-it 1
Philipp Amann

Philipp Amann

Head of Strategy at Europol

LIVE VIDEOTALK: cyberResilience - How High Can you Build Your Walls?

PHILIPP AMANN, HEAD OF STRATEGY, EUROPEAN CYBERCRIME CENTRE (EC3)

This keynote will cover the latest threats and trends in cyberspace and how to respond to these threats with a view to creating a safer and more secure cyberspace. The borderless nature of cybercrime requires a response at a scale that involves cross-border cooperation and the pooling of scarce resources. Effective cooperation not only can lead to successful investigations but also be key to deterrence and prevention. Law enforcement is a key partner in ensuring cyber resilience.

EUROPOL-ec3
Philipp Amann

Philipp Amann

Head of Strategy at Europol

LIVE ROUNDTABLE TO DISCUSS THE IMPROVED COOPERATION BETWEEN LAW ENFORCEMENT AND PRIVATE SECTOR

PHILIPP AMANN, HEAD OF STRATEGY, EUROPEAN CYBERCRIME CENTRE (EC3)

During this limited-audience CISO- / CIO-roundtable we target to discuss under “Chatam House rule” recent and known events of eg malware infection and less known events like eg industrial espionage that effectively happened and discuss the effects the events had, how they were recovered from and how in such cases collaboration between police forces and private industry could result into a better overall resilience to such events and how collaboration can help in having a more substantial impact in allowing to go after the bad actors and supporting investigations.

EUROPOL-ec3
Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

Yves Schellekens

Yves Schellekens

Business Group Leader Digital at Agoria

LIVE ROUNDTABLE CYBER-RESILIENCE, USE OF IOT-DEVICES AND THE CYBER ACT

THIS SESSION WILL BE MODERATED BY CLAUDIO BOLLA AND YVES SCHELLEKENS

This roundtable intends to discuss what impacts/opportunities the CyberAct has on the Belgian Industry (both users of and suppliers of), especially in the context of the growing use of internet-connected IoT devices. Indeed, in a world where both the exposure grows due to increasing use of IoT devices as well as the threats (for example recent ransomware incidents), it becomes more and more vital that any solutions used by, bought by, supplied by… are “certified” providing parties using such devices better reassurance that what they put out there in the field is sufficiently secure. What is the state of play? What will be the impact and/or opportunities for Industry really be? Come and join the discussions.

isaca
logo Agoria
Frank Versmessen

Frank Versmessen

Head of Controls, Attestation & Assurance, Global Security at SWIFT

LIVE VIDEOTALK: EXPERIENCES AND LESSONS LEARNED FROM SWIFT’S CUSTOMER SECURITY PROGRAMME TO EFFECTIVELY COMBAT CYBER THREATS

frank Versmessen | Head of Controls, Attestation & Assurance, Global Security | SWIFT

In the world of constantly evolving cyber-threats, SWIFT has years of experience in building and fostering a secure ecosystem between financial institutions. As such it has learned that the security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is playing an important role in reinforcing and safeguarding the security of the wider ecosystem and as such has built a Customer Security Programme to assist its partners to keep their systems secure/safe. In this webinar, SWIFT will share its experiences and key recommendation with the audience so that it can bring inspiration also outside of the financial sector. During this webinar, you can ask your question via chat.

logo SWIFT

Stay informed!

Don't miss a single conference update and sign up for our newsletter!