Cyber Security Summit
We warmly invite you to the Cyber Security Summit. The doors open at 10:00 am. After receipt and registration we will kick off the day at 10:30 am with the official opening!
Welcome to our Summit
Opening of the programme
Erik R. van Zuuren | Chairman of the Summit
CyberResilience - How High Can you Build Your Walls?
Philipp Amann | Head of strategy | Europol
This keynote will cover the latest threats and trends in cyberspace and how to respond to these threats with a view to creating a safer and more secure cyberspace. The borderless nature of cybercrime requires a response at scale that involves cross-border cooperation and the pooling of scarce resources. Effective cooperation not only can lead to successful investigations, but also be key to deterrence and prevention. Law enforcement is a key partner in ensuring cyber resilience.
Applying the Lessons of a Major Cyber Incident
Andy Powell | CISO | Maersk Cyber Security
On 27 June 2017, A.P. Moller Maersk’s screens went black. … The cyber-attack that hit the container business was initiated by a previously unseen type of malware that destroyed all of Maersk’s Windows computer capability, stopping most operations around the world. In this inspiring session, Maersk CISO, Andy Powell, takes us back to the moment the most devastating cyberattack since the invention of the internet took place. Powell will also share the painful lessons learned which have now enshrined in five principles, relating to organisational resilience, boardroom accountability, and security being a benefit, growth driver, and everyone’s responsibility.
Morning break with 1-to-1 meetings
SSL Decryption, Privacy and Security, a Balancing Act
Luc van Deuren | Solution Architect | Zscaler
SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.
Roundtable to Discuss the Improved Cooperation between Law Enforcement and Private Sector
Philipp Amann | Head of Strategy | European Cybercrime Centre (EC3)
During this limited-audience CISO- / CIO-roundtable we target to discuss under “Chatam House rule” recent and known events of eg malware infection and less known events like eg industrial espionage that effectively happened and discuss the effects the events had, how they were recovered from and how in such cases collaboration between police forces and private industry could result into a better overall resilience to such events and how collaboration can help in having a more substantial impact in allowing to go after the bad actors and supporting investigations.
Limited Audience: only 6 places available
Hacking Exposed: The speed of modern day hacking tactics & techniques
Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike
In this session, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.
Lunch break with 1-to-1 meetings
Cyber-resilience, Use of IoT-devices and The Cyber Act
Moderated by Claudio Bolla and Yves Schellekens
This roundtable intends to discuss what impacts/opportunities the CyberAct has on the Belgian Industry (both users of and suppliers of), especially in context of the growing use of internet connected IoT devices. Indeed, in a world where both the exposure grows due to increase use of IoT-devices as well as the threats (for example recent ransomware-incidents) it becomes more and more vital that any solutions used by, bought by, supplied by… are “certified” providing parties using such devices better reassurance that what they put out there in the field is sufficiently secure. What is the state of play? What will be the impact and/or opportunities for Industry really be? Come and join the discussions.
Experiences and Lessons Learned from Swift’s Customer Security Programme to Effectively Combat Cyber Threats
Brett Lancaster | Managing Director | Global Head of Customer Security and CSP Director | SWIFT
In the world of constantly evolving cyber-threats, SWIFT has years of experience in building and fostering a secure eco-system between financial institutions. As such it has learned that he security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is playing an important role in reinforcing and safeguarding the security of the wider ecosystem and as such has built a Customer Security Programme to assist its partners to keep their systems secure/safe. In this keynote SWIFT will share it experiences and key recommendation with the audience so that it can bring inspiration also outside of the financial sector.