Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100
Boring Timeless Principles: Maintaining Consistency in Information Security to Strengthen Cyber Resilience
- Implementing effective principles resistant to trends and external and internal cyber threats
- Addressing misconceptions about modern working practices
Filip Nowak, Global Head, Cyber Defence, Ferrero
The AI High Five for Cyber Security
- Five key domains of GenAI for better understanding its potentials
- How to take the next steps toward integrating GenAI into your cybersecurity efforts
- Incorporating GenAI technology into day-to-day activities
Stefan van Gansbeke, CISO, Christelijke Mutualiteit
Panel Discussion: Designing Emergency Response Plans to Manage Security Breach Incidents
- Preparing response plans to establish roles of all staff in limiting the impact of breach incidents & recovering assets post-attack
- Learning from security breaches to address causes to incidents & improve cyber protection measures
- Regular testing of breach incident procedures to highlight gaps in response plans
Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100 (moderator)
Roy Konings, Head of Security, Benelux & Switzerland, Ericsson
Bas Gaal, Director Information Security, Canon Production Printing
Aldo Grech, Head of Sector – Cyber Security Awareness & Governance, European Commission
Coffee Break & Networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Resilience in the Real World: Enhancing OT Cyber Security for Critical Systems
- Examining the current threat landscape, including targeted attacks on industrial control systems
- A discussion of the best practices for mitigating cyber risks through a layered security approach
- Exploring the unique challenges of OT cyber security
Godfried Boshuizen, Chair Editorial Board, FERM
Investing in Information Security: Allocating Budgets to Strengthen Cyber Resilience
- Engaging with senior leaders on ROI of security strategies to secure additional support for new measures
- Guidance on prioritising security needs as part of information security budget planning
- Reserving financial resources to support security processes during emergency situations
Joost Boele, Head of IT Operations, Netherlands Cancer Institute
Creating Staff Training Schemes to Recognise Cyber Threats
- Developing joined-up responses to safely report potential threats & avoid escalation to becoming major incidents
- Adapting staff training to tackle increasingly sophisticated security threats, including spearfishing emails
- Regular inspections to maintain the security of workplace devices: tools & advice
Jeroen Roelandt, CISO, De Watergroep
Implementing Data-Informed Approaches to Information Security
- Collecting performance data on security measures to ensure cyber security KPIs are achieved
- Key tools to identify anomalous data & raise concerns about potential security risks
- Evaluating incident data to tackle gaps in security measures & inform cyber resilience strategies
Joran Leenders, CISO, Ypto
Coffee Break & Networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Panel Discussion: Embedding Security Governance Policies to Build Organisation-Wide Cyber Resilience
- Designing organisation-wide accountability frameworks to ensure senior leaders are held responsible for cyber security decision-making
- Incorporating security governance polices to improve coordination of information security incident response plans & strengthen cyber defences
- Prioritising cyber risks in line with other business needs to maintain support for information security resources from other departments
Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100 (moderator)
Sanjay Kumar Vaid, ICT & Security Risk Officer, Nagelmackers
Shairesh Algoe, Deputy CISO, BNG Bank
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Amir Vashkover, Head of Data Security, Philips
Eric Visser, Head of Enterprise Security Market Area Europe & Latin America, Ericsson
Ilona Crommentuijn, CISO, Holland Casino
Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance
Alex Leer, Technical ISO, ANWB
Alain De Maght, Chief InfoSec Officer, SPF Intérieur
Eilis O’Broin, Director, Operational Risk Management, flatexDEGIRO
Sonia Verhaeghe, ISO, TUI
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
Open Forum Think Tank
Security Metrics & Reporting
Alexander Klaver, Head of IT Security, CVC DIF
Open Forum Think Tank
Operational Technology
Dimitrios Papadopoulos, Director Threat Prevention & OT Security, Brenntag
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Embedding Organisation-Wide Security Restructuring in Response to DORA Restrictions
- Guidance on evaluating company structures to address areas of non-compliance
- Utilising new technology to ensure compliance with new regulations
- Engaging with all staff to ensure they understand how to uphold DORA restrictions
Natascha De Croes, CISO/DPO, DELA
Embedding Risk Management Policies to Address Organisation-Wide Cyber Security Vulnerabilities
- Establishing processes for all staff to appropriately raise concerns about potential security vulnerabilities
- Evaluating vulnerability data to identify & tackle wider trends in information security threats
- Key tips on fixing security gaps in company technology & software
Paul de Wit, CISO, Belfius
Evaluating Cyber Security Policies & Processes to Uphold New Regulations
- Adapting existing information security processes to ensure compliance with the Cyber Resilience Act
- Allocating resources to update cyber security measures in response to national regulations
- Working with staff to understand and fulfil their role in meeting regulation requirements
René Pluis, Global Cyber Security Remediation Officer, Philips
Panel Discussion: Developing AI-Informed Approaches to Strengthen Cyber Security Measures
- Evaluating AI software to meet the needs and scale of your cyber security operations
- Utilising AI to set up joined-up approaches to raising concerns about potential security threats
- Engaging with staff to increase uptake of new AI tools to increase efficiency in working processes
Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100 (moderator)
Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance
Aneesh Ramachandran, ISO, Mercedes-Benz
Natascha De Croes, CISO/DPO, DELA