Programme

Henk Marsman

Henk Marsman

LEAD PRODUCT MANAGER IAM at RABOBANK

Break-out session: Ethics in Security Design

Henk Marsman | Identity & Access Management Researcher | Rabobank

In this session Henk will explore the role of ethics in design of digital solutions, including security solutions. There is a lot of attention for ethics in digital and specifically for algorithms and data (use). Several approaches exist to include value in design or use ‘ethics as a guide, and not as a judge’, to make digital solutions better. Can we make use of these approaches for security solutions, should we, and how would that look like?

Katryna Dow

Katryna Dow

Founder and CEO of Meeco

Keynote: Bias in identity

Katryna Dow | Founder and CEO | MEECO

With the evolution towards Web3, the merging of our physical and digital identities is more impactful, collaborative and experiential than any technology we’ve known. However, along with the opportunities, it is already presenting new security, identity and privacy threats. Without the means for individuals to be an active part of the digital value chain, the likelihood of embedded bias increases.  The bias may be exhibited in the form of exclusion, with certain groups being denied entrance, credit, services, not being able to use the technology or simply discovering that the technology does not work the same for everyone. As Extended and Artificial Intelligence continues to be imbedded in our lives, the risks from bias increase. How do you as a security leader embed Privacy and Security by Design in your technologies and identify the pitfalls ahead of time?

Saskia van Uffelen

Saskia van Uffelen

Digital champion of Belgium

Keynote: Dare for Tomorrow

Saskia van Uffelen | Digital Champion of Belgium

In this session Saskia van Uffelen, Digital Champion for Belgium since 2012 and author of the book ‘Dare for Tomorrow’ shares her insights into the changing society and the pressure from the environment that this puts on the management of companies and organizations. We live in a digital age in which everyone and everything is connected, the competition no longer comes from the sector, and customers, users and citizens are in the driver’s seat. Data is gold and sharing is the new having. The digital age requires a new approach and a new model. Which choices do you make as a CISO? What do you do to become a Security Leader?

Henk Marsman

Henk Marsman

LEAD PRODUCT MANAGER IAM at RABOBANK

Roundtable: How do you involve the human factor in security?

Henk Marsman | Identity & Access Management Researcher | Rabobank

It is often heard that people are the weakest link in the security chain, but this is paradoxically the area with the lowest amount of organisational investment in terms of security/cybersecurity.  How do your peers involve the human factor in their security? This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the conference

Roundtable: How Can we Arrange Supply Chain Security?

Erik R. van Zuuren | Strategic Advisor and Subject Matter Expert various European Commission and chairman of the conference

As a ‘security leader’, you prefer to see that changes that are necessary to bring the security of your own company up to the right level are also quickly implemented by the parties with whom you work. But that takes time and when it comes to security, no steps should be skipped.

Just like you, other CISOs also struggle with this challenge to bring the level of security of chain partners to an equivalent level as quickly as possible. In this interactive session in which we expect all participants not to mince their words, we will start a conversation to learn from each other and to feed each other with possible solutions.

Jacoba Sieders

Jacoba Sieders

Digital identity Expert

Self-sovereign Identity, Will it Work?

Jacoba Sieders | Digital Identity Expert

In this session, we’ll discuss the challenges you face when using or implementing identity, authentication and authorization solutions using self-sovereign identity. This session is moderated by Jacob Seiders, who knows the EU legislation and is aware of the discussions that took place. She also assessed the EU subsidy applications for it. This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Koen Maris

Koen Maris

Cyber Security Leader at PWC Luxembourg

Roundtable: How do You Improve Cyber Crisis Management

Koen Maris | Cyber Security Leader | PWC Luxembourg

Effective crisis preparation goes beyond cyber incident response to address the entire crisis management lifecycle of readiness, response, and recovery. Compliance with laws and regulations is no longer sufficient, but for most managers, including the Chief Information Security Officer (CISO) and IT managers, it is still the basis of action. More is needed today! In this interactive discussion attendees share how they improve their cyber crisis management. This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Roundtable: How Do you Give access to third parties in a secure way?

In our connected world, it is imperative to securely and seamlessly collaborate with B2B business partners to be competitive. Many organizations partner with third parties. But how do you provide access to these third parties in a secure way? This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Roundtable: Zero Trust - Will it Work for Your Organisation?

In this session, we’ll discuss how a zero trust security strategy can help organisations maintain security and manage the risks of a disconnected business environment, while still allowing users to access the right resources. What challenges do you experience and how do you tackle them? This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Roundtable: How Do you prepare for ransomware?

You know that one day you will have to deal with a ransomware attack. These attacks are becoming more sophisticated. Security and risk management leaders need to look beyond the endpoints to help protect the organization from ransomware. How do you prepare for ransomware?
This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Roundtable: Developers and security, work together!

How can you arrange security and development to better work together, when developing new products. Security vulnerabilities can easily sneak into the product. That is why it is extremely important to consider the entire development cycle, but how does it work when they have conflicting interests? Share your best practices and learn from those from your peers. This interactive session is open to approximate 15 participants, where everyone is asked to actively participate in the conversation by sharing experiences and challenges in order to learn from each other.

Register today using relationcode DLYBWUWC to receive a free copy of the book ‘Dare for Tomorrow

Register

Stay informed!

Don't miss a single conference update and sign up for our newsletter!