Programme 2021
Cyber Security Summit
We warmly invite you to the Cyber Security Summit.
Jonathan Ehret
VP Strategy & Risk at RiskRecon
VIDEOTALK: THE NEIGHBORHOOD WATCH: USING CONTINUOUS MONITORING TO INCREASE VISIBILITY AND EFFECTIVENESS OF TPRM PROGRAMS
JONATHAN EHRET | VP STRATEGY & RISK | RISKRECON
Visibility into our vendors’ security controls and the effectiveness with which they are operating have been and continue to be some of the major challenges in the world of third party risk. This discussion will cover those struggles, the inherent limitations of the security questionnaire as well as how continuous monitoring tools can be utilised to shed light on the effectiveness of a vendor’s security controls.
Luc van Deuren
Solutions Architect at Zscaler
Videotalk: SSL Decryption, Privacy and Security, a Balancing Act
Luc van Deuren | Solution Architect | Zscaler
SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.
Ronald Pool
Cyber Security Specialist Benelux & Nordics at CrowdStrike
Videotalk: Hacking Exposed: The speed of modern day hacking tactics & techniques
Ronald Pool | Cyber Security Specialist Benelux & Nordics | CrowdStrike
In this videotalk, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.