Programme

Programme 2021

Cyber Security Summit

We warmly invite you to the Cyber Security Summit.

Jonathan Ehret

Jonathan Ehret

VP Strategy & Risk at RiskRecon

VIDEOTALK: THE NEIGHBORHOOD WATCH: USING CONTINUOUS MONITORING TO INCREASE VISIBILITY AND EFFECTIVENESS OF TPRM PROGRAMS

JONATHAN EHRET | VP STRATEGY & RISK | RISKRECON

Visibility into our vendors’ security controls and the effectiveness with which they are operating have been and continue to be some of the major challenges in the world of third party risk. This discussion will cover those struggles, the inherent limitations of the security questionnaire as well as how continuous monitoring tools can be utilised to shed light on the effectiveness of a vendor’s security controls.

logo Riskrecon
Luc van Deuren

Luc van Deuren

Solutions Architect at Zscaler

Videotalk: SSL Decryption, Privacy and Security, a Balancing Act

Luc van Deuren | Solution Architect | Zscaler

SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.

logo Zscaler
Ronald Pool

Ronald Pool

Cyber Security Specialist Benelux & Nordics at CrowdStrike

Videotalk: Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

In this videotalk, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.

logo CrowdStrike

Stay informed!

Don't miss a single conference update and sign up for our newsletter!