Programme

Programme 2020

Cyber Security Summit

We warmly invite you to the Cyber Security Summit. The doors open at 10:00 am. After receipt and registration we will kick off the day at 10:30 am with the official opening!

Registration Participants

Welcome to our Summit

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the summit

Opening of the programme

Erik R. van Zuuren | Chairman of the Summit

logo Trustcore.eu
Philipp Amann

Philipp Amann

Head of Strategy at Europol

CyberResilience - How High Can you Build Your Walls?

Philipp Amann | Head of strategy | Europol

This keynote will cover the latest threats and trends in cyberspace and how to respond to these threats with a view to creating a safer and more secure cyberspace. The borderless nature of cybercrime requires a response at scale that involves cross-border cooperation and the pooling of scarce resources. Effective cooperation not only can lead to successful investigations, but also be key to deterrence and prevention. Law enforcement is a key partner in ensuring cyber resilience.

logo Europol
Andy Powell

Andy Powell

Chief Information Security Officer at MAERSK

Applying the Lessons of a Major Cyber Incident

Andy Powell | CISO | Maersk Cyber Security

On 27 June 2017, A.P. Moller Maersk’s screens went black. … The cyber-attack that hit the container business was initiated by a previously unseen type of malware that destroyed all of Maersk’s Windows computer capability, stopping most operations around the world. In this inspiring session, Maersk CISO, Andy Powell, takes us back to the moment the most devastating cyberattack since the invention of the internet took place. Powell will also share the painful lessons learned which have now enshrined in five principles, relating to organisational resilience, boardroom accountability, and security being a benefit, growth driver, and everyone’s responsibility.

logo Maersk

Morning break with 1-to-1 meetings

Luc van Deuren

Luc van Deuren

Solutions Architect at Zscaler

SSL Decryption, Privacy and Security, a Balancing Act

Luc van Deuren | Solution Architect | Zscaler

SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.

logo Zscaler
Philipp Amann

Philipp Amann

Head of Strategy at Europol

Roundtable to Discuss the Improved Cooperation between Law Enforcement and Private Sector

Philipp Amann | Head of Strategy | European Cybercrime Centre (EC3)

During this limited-audience CISO- / CIO-roundtable we target to discuss under “Chatam House rule” recent and known events of eg malware infection and less known events like eg industrial espionage that effectively happened and discuss the effects the events had, how they were recovered from and how in such cases collaboration between police forces and private industry could result into a better overall resilience to such events and how collaboration can help in having a more substantial impact in allowing to go after the bad actors and supporting investigations.

Limited Audience: only 6 places available

logo Europol EC3
Ronald Pool

Ronald Pool

Cyber Security Specialist Benelux & Nordics at CrowdStrike

Hacking Exposed: The speed of modern day hacking tactics & techniques

Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike

In this session, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.

logo CrowdStrike

Lunch break with 1-to-1 meetings

Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

Yves Schellekens

Yves Schellekens

Business Group Leader Digital at Agoria

Cyber-resilience, Use of IoT-devices and The Cyber Act

Moderated by Claudio Bolla and Yves Schellekens

This roundtable intends to discuss what impacts/opportunities the CyberAct has on the Belgian Industry (both users of and suppliers of), especially in context of the growing use of internet connected IoT devices. Indeed, in a world where both the exposure grows due to increase use of IoT-devices as well as the threats (for example recent ransomware-incidents) it becomes more and more vital that any solutions used by, bought by, supplied by… are “certified” providing parties using such devices better reassurance that what they put out there in the field is sufficiently secure. What is the state of play? What will be the impact and/or opportunities for Industry really be?  Come and join the discussions.

logo Ineos
logo Agoria
Brett Lancaster

Brett Lancaster

Managing Director, Global Head of Customer Security and CSP Director at Zscaler

Experiences and Lessons Learned from Swift’s Customer Security Programme to Effectively Combat Cyber Threats

Brett Lancaster | Managing Director | Global Head of Customer Security and CSP Director | SWIFT

In the world of constantly evolving cyber-threats, SWIFT has years of experience in building and fostering a secure eco-system between financial institutions. As such it has learned that he security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is playing an important role in reinforcing and safeguarding the security of the wider ecosystem and as such has built a Customer Security Programme to assist its partners to keep their systems secure/safe. In this keynote SWIFT will share it experiences and key recommendation with the audience so that it can bring inspiration also outside of the financial sector.

logo SWIFT

Closing by the Chairman

Erik R. van Zuuren | Chairman of the Summit

We will announce the online video content soon

Stay informed!

Don't miss a single conference update and sign up for our newsletter!