Programme

Bluepoint Brussels

5 October

Registration at Bluepoint Brussels

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the conference

Opening and welcome by chairman Erik R. van Zuuren

Koen Maris

Koen Maris

Cyber Security Leader at PWC Luxembourg

Roundtable A: How do You Improve Cyber Crisis Management

Koen Maris | Cyber Security Leader | PWC Luxembourg

Effective crisis preparation goes beyond cyber incident response to address the entire crisis management lifecycle of readiness, response, and recovery. Compliance with laws and regulations is no longer sufficient, but for most managers, including the Chief Information Security Officer (CISO) and IT managers, it is still the basis of action. More is needed today! In this interactive discussion attendees share how they improve their cyber crisis management. This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Roundtable B: How Do you Give access to third parties in a secure way?

In our connected world, it is imperative to securely and seamlessly collaborate with B2B business partners to be competitive. Many organisations partner with third parties. But how do you provide access to these third parties in a secure way? This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Jacoba Sieders

Jacoba Sieders

Digital identity Expert

Roundtable C: Self-sovereign Identity, Will it Work?

Jacoba Sieders | Digital Identity Expert

In this session, we’ll discuss the challenges you face when using or implementing identity, authentication and authorization solutions using self-sovereign identity. This session is moderated by Jacob Seiders, who knows the EU legislation and is aware of the discussions that took place. She also assessed the EU subsidy applications for it. This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Kristof Haeck

Kristof Haeck

Managing Partner at Evolane

Roundtable D: Successfully Stopping Ransomware in the Kill Chain

Kristof Haeck | Managing Partner at Evolane

During this session, Evolane and Akamai will join their expertise to explain the ransomware kill chain and how organisations can defend their companies against ransomware. We want to inform you on what actions can be done at each step in the chain, to limit the risks. Last but not least, we want to let you discover the impact of ransomware on your business and brand reputation, and help you define what mitigation actions have the biggest risk reduction.

This interactive session is open to approximate 15 participants, in which you will be inspired and challenged to think about your current way of working, and hopefully realize the strengths and shortcomings of your current security strategy. The tools, budget and time you’re spending on prevention of ransomware attacks will be mapped and we will evaluate as a group how successful your strategical choices and actions are.

The main purpose is to have an educational conversation that creates awareness and inspires to have more attention for step 2 in the kill chain.

Morning Break: fresh coffee and tea and time to have in-person meetings with our partners

Break-out session A: Turning the Tables on Cyber-Attackers with a Continuous AI Loop Approach

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organisation.

Sander Kerkhoffs

Sander Kerkhoffs

Vice President North- & Central-Europe

Break-out session B: Why You Must Bolster Your Defence-in-Depth Strategy with Data Security

Sander Kerkhoffs | Vice President Northern- & Central Europe

Organisations are facing sophisticated and well-funded adversaries with targeted penetration strategies, including supply chain attacks. Despite multi-layered security investments, these threat actors are successfully breaching defences and going after organization’s data. That’s why data security is your last – and most important – line of defence. Join this session and learn:

  • How data security can ensure business continuity in the event of a ransomware attack.
  • How data observability can use massive amounts of data in backup systems to detect and analyse patterns that look like a cyberattack.
  • Why the ability to restore systems after an attack is just as important as prevention.
Evan Anderson

Evan Anderson

Co-Founder & Principal Technologist at Randori

Break-out session C: Automating the Attacker’s Perspective - An Inside Look Into how Hackers Prioritize Targets at Scale

Evan Anderson | Co-founder and principal technologist | Randori, an IBM company

Join us for an exciting session that dives into the fast-paced world of offensive security. Attackers and defenders often come to different conclusions around risk – even when looking at the same information. In this session, we will switch teams for a day as we pull back the curtain behind the system that keeps one of the world’s most advanced attack platforms on target 24/7/365. Through examples, Evan will show how Randori, IBM X-Force Red, (and real attackers) are leveraging AI and decades of experience to discover, classify and prioritize millions of targets daily across some of the world’s largest organisations.

Robert Elferink

Robert Elferink

Sr. Manager Sales Engineering Benelux & Nordics

Break-out session D: You No Longer Have a Malware Problem. You Have an Adversary Problem

Robert Elferink | Technical Leadership expert | Crowdstrike

The global threat landscape has changed over the past years and we are no longer protected by standard anti-virus. Adversaries have developed, have almost unlimited funds to develop highly sophisticated tools to get to our data. We need to know who they are, what their strategy and tactics are in order to beat them in time. Time has become crucial! Join this session and learn to adapt fast!

Mark van Tiggel

Mark van Tiggel

Director security at Telenet

Keynote: Workforce Security Strategy @ Telenet

Mark van Tiggel | Director Security | Telenet

Every organisation had to adapt their business over the last couple of years. Those that leaned into the Zero Trust security model and broad cloud adoption were rewarded with a more secure and agile workforce.

  • How did these companies quickly adapt to the new normal of working from home quickly and securely?
  • How did these companies meet the demands of the modern digital workforce? What is their long term strategy for securing their users?
  • How to bring cloud agility to a hybrid stack of both on-premise and cloud apps?
  • And what role do IAM technologies like adaptive MFA, SSO, Provisioning, lifecycle management and workflows play in all this?

During this presentation, Mark will explain how digital identity supports Telenet’s Workforce Security Strategy.

This presentation is sponsored by Okta

Lunch break: enjoy a delicious meal with in-person one-to-one meetings

Henk Marsman

Henk Marsman

Identity & Access Management Expert

Keynote: Ethics in Security Design

Henk Marsman | Identity & Access Management Expert

In this session Henk will explore the role of ethics in design of digital solutions, including security solutions. There is a lot of attention for ethics in digital and specifically for algorithms and data (use). Several approaches exist to include value in design or use ‘ethics as a guide, and not as a judge’, to make digital solutions better. Can we make use of these approaches for security solutions, should we, and how would that look like?

Simon Wood

Simon Wood

Group CEO at Ubisecure

Keynote: Best Practices for Creating Secure and Effective Customer Journeys Using CIAM

Simon Wood | Group CEO | Ubisecure

CIAM, or Customer Identity & Access Management, enables organisations to capture, manage, and secure customer and partner identity data. It also covers how organisations control user access to applications and services, a critical function of a Zero Trust architecture. With end-customers, B2B partners, and supply chains increasingly under attack, yet never as demanding, CIAM helps organisations achieve many core pillars of security and user experience. From adopting a Zero Trust approach to increasing customer conversions, Ubisecure CEO Simon Wood illustrates how to map the many CIAM capabilities to the delivery of true business value. Simon will cover use cases and customer case studies.

Afternoon Break: Including refreshments. Get in contact with our partners and peers.

Katryna Dow

Katryna Dow

Founder and CEO of Meeco

Keynote: Bias in identity

Katryna Dow | Founder and CEO | MEECO

With the evolution towards Web3, the merging of our physical and digital identities is more impactful, collaborative and experiential than any technology we’ve known. However, along with the opportunities, it is already presenting new security, identity and privacy threats. Without the means for individuals to be an active part of the digital value chain, the likelihood of embedded bias increases.  The bias may be exhibited in the form of exclusion, with certain groups being denied entrance, credit, services, not being able to use the technology or simply discovering that the technology does not work the same for everyone. As Extended and Artificial Intelligence continues to be imbedded in our lives, the risks from bias increase. How do you as a security leader embed Privacy and Security by Design in your technologies and identify the pitfalls ahead of time?

Saskia van Uffelen

Saskia van Uffelen

Digital champion of Belgium

Keynote: Dare for Tomorrow

Saskia van Uffelen | Digital Champion of Belgium

In this session Saskia van Uffelen, Digital Champion for Belgium since 2012 and author of the book ‘Dare for Tomorrow’, shares her insights into the changing society and the pressure from the environment that this puts on the management of companies and organisations. We live in a digital age in which everyone and everything is connected, where the competition no longer comes from the sector, and customers, users and citizens are in the driver’s seat. Data is gold and sharing is the new having. The digital age requires a new approach and a new model. Which choices do you make as a CISO? What can you do to become a Security LEADER?

Closing & Network drinks

Join us for sparkling drinks with bitter garnish and meet your peers.

Frank Benus

Frank Benus

PRINCIPAL PLATFORM SPECIALIST at OKTA

Video Presentation: The Customer Identity & Access Management Buyer’s Guide

Frank Benus | Principal Platform Specialist | Okta

Selecting a (customer) identity and access management solution can be daunting. Do you build your own or buy out of the box? What are the most common security threats to take in account? And what are the key features to consider to be able to encounter the most common threats? Focusing on a finite set of attributes will help you zero in on a decision.
To help you make the right choice, this recorded presentation will cover the – what we call – (Customer) Identity and Access Management Buyer’s Guide. Please find out:

  • Why we should care about security and usability equally
  • Why complex passwords are useless
  • How to get from A to B and be ready for the rest of the alphabet
  • Ducks 😉
Nick Stokmans

Nick Stokmans

Cybersecurity Specialist at CISCO - DUO

Video Presentation: Trusted Access in a Hybrid World

Nick Stokmans | Cybersecurity Specialist | Cisco Duo

How we secure access in a hybrid world in a way that frustrates attackers, but not the users.

  • How can you secure all users and devices accessing your applications in a multi-cloud world?
  • How do we constantly verify?
  • How can users gain access at anytime from anywhere from any device
Keith Uber

Keith Uber

Identity & Access Management expert and VP at Ubisecure

Video presentation: CIAM 201: The Path to Zero Trust by Securing Customer and Partner Identities

Keith Ubert | IDENTITY & ACCESS MANAGEMENT EXPERT AND VP | UBISECURE

Zero Trust requires you to verify anything and everything trying to connect to your network, application and services. Taking CIAM to the next level offers the benefits of Zero Trust Identity & Access Management architecture that focuses on the identity of the user, without disruption to the user experience. In this presentation, learn how CIAM will allow you to: centralise access policies for workforce, contractor, partner and customer user identities; improve productivity by enabling more devices, locations and users, and; achieve the correct balance between security and user experience.

Robert Elferink

Robert Elferink

Sr. Manager Sales Engineering Benelux & Nordics

Presentation: Defending Against Modern Identity Attacks

Robert Elferink | Technical Leadership expert | Crowdstrike

When 80 percent of the breaches involve credentials, it is clear that any identity can be compromised to launch large scale, persistent attacks on enterprises. With digital transformation and new market realities like remote workforces, there is an increased focus on Zero Trust security to protect enterprises from cyber threats. Enterprises looking to invest in a Zero Trust solution, ask these key questions: How do I reduce security complexity, improve user experience, save money, and reduce the time to identify and remediate breaches?

Erwin Friethoff

Erwin Friethoff

Senior Cloud Security Solution Architect

Yogesh Padharia

Yogesh Padharia

CIS & Cloud Security Competency Leader, Northern Europe, IBM Security Services

Roundtable: What Does it Take to Move from a Zero Trust Strategy to Active Implementation?

Erwin Friethoff | Senior Cloud Security Solution Architect | Yogesh Padharia | CIS & Cloud Security Competency Leader, Northern Europe | IBM

Organisations have acknowledged Zero Trust as a means to successfully prevent cyberattacks. The challenge is moving from your Zero Trust strategy to active implementation. Join our roundtable discussion and be inspired on how to tackle your implementation and get the most from Zero Trust security.

Frank Benus

Frank Benus

PRINCIPAL PLATFORM SPECIALIST at OKTA

Roundtable: How Digital Identity Supports a Secure Remote Digital Workforce

Frank Benus | Principal Platform Specialist | Okta

Over the last years, every organisation needed to speed up their pace of digital transformation. Employees needed to be able to work remotely and companies needed to serve their customers & business partners in a fully digital way. Employees, customers & business partners need to access their apps & services in a secure & trusted way.
Those that leaned into the Zero Trust security model and broad cloud adoption were rewarded with a more secure and agile workforce.

  • How did these companies quickly adapt to the new normal of working from home quickly and securely?
  • How did these companies meet the demands of the modern digital workforce? What is their long term strategy for securing their users?
  • And what role do technologies like adaptive MFA, SSO, Provisioning, lifecycle management and workflows play in all this?
    It’s time to address these key questions sooner than later so please make sure to join this online roundtable on how digital identity supports a secure remote digital workforce.

Roundtable: Zero Trust in a Hybrid World

This session will be provided by DUO Security / CISO. In this interactive session, which is open to approximately 8 to 10 participants, everyone is asked to actively participate in the conversation. By sharing experiences and challenges, we learn from each other. The session is supervised by an independent professional facilitator who challenges all attendees not to mince their words. Signing up for this session, means we count on your attendance.

Robert Elferink

Robert Elferink

Sr. Manager Sales Engineering Benelux & Nordics

Roundtable: Defending Against Modern Identity Attacks

Robert Elferink | Technical Leadership expert | Crowdstrike

When 80 percent of the breaches involve credentials, it is clear that any identity can be compromised to launch large scale, persistent attacks on enterprises. With digital transformation and new market realities like remote workforces, there is an increased focus on Zero Trust security to protect enterprises from cyber threats. Enterprises looking to invest in a Zero Trust solution, ask these key questions: How do I reduce security complexity, improve user experience, save money, and reduce the time to identify and remediate breaches?

Johan Van Hove

Johan Van Hove

Identity & Access Management Expert

Roundtable: The Current State of Strong Digital Identity

Johan van Hove | Identity & Access Management Expert | Ubisecure

BYOI (Bring Your Own Identity), or strong reusable digital identities, from Banks, Mobile Operators and eIDs such as Belgium’s itsme digital identity, as well as Identity Wallets, are becoming less regionally siloed and gaining ubiquity as we realise cross-border identity networks-of-networks. Dive into the strong identity ecosystem to discuss how the current digital identity schemes benefit both your organisation and its end-customers, and look at both the challenges and potential of the upcoming cross-border eIDAS 2 and GAIN initiatives. In this interactive session, which is open to approximately 8 to 10 participants, everyone is asked to actively participate in the conversation. By sharing experiences and challenges, we learn from each other. The session is supervised by an independent professional facilitator who challenges all attendees not to mince their words. Signing up for this session, means we count on your attendance.

Register today using relationcode DLYBWUWC to receive a free copy of the book ‘Dare for Tomorrow

Register

Stay informed!

Don't miss a single conference update and sign up for our newsletter!