Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Lyzia van Iterson, Head of Security – Customer Applications, LKQ Europe
Embedding Digital Transformation Strategies to Uphold Cyber Security Systems
- Evaluating working systems to identify areas where digital transformation can increase efficiency
- Incorporating cloud software to strengthen information security storage systems
- Guidance in ensuring ethical usage of digital transformation in cyber security processes without cutting roles
Implementing Organisation-Wide Information Security Defences to Increase Cyber Resilience
- Establishing robust reviews of IT systems to identify and tackle weaknesses in information security defences
- Engaging with staff to increase cyber security awareness and ensure compliance with security measures
- Scaling up cyber security defences as part of business growth to maintain organisation-wide cyber resilience
Miguel Ferreira, CISO, Multi Corporation
Evaluating Information Security Systems to Ensure Compliance with National Regulations
- Adapting reviews of information security systems in response to new regulations: best practice
- Resources to support staff adhering to regulations as part of their working processes
- Key tips on identifying and tackling non-compliant information security systems and processes
Thom Schiltmans, Head of GRC & Security, Resilience & Identity Governance, Signify
Coffee Break & Networking
Workshop 1
Vulnerability Management
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Embedding Data-Informed Approaches to Broadening Cyber Security Strategies
- Creating data quality benchmarks to support cyber security decision-making processes
- Evaluating security incident data to identify trends in cyber attacks
- Best practice in using synthetic data generation to create cyber attack simulations
Giancarlo Guizzardi, Head of Cyber Security, University of Twente
Implementing Security Audits to Support Organisational Risk Management
- Establishing regular audits to monitor the impact of potential security vulnerabilities
- Allocating resources to prioritise risks and tackle the most serious security vulnerabilities
- Tools to use sample checks of IT systems to support vulnerability management processes
Nick van Meeteren, CISO, Hogeschool Rotterdam
Enhancing User Experiences of Security Measures to Increase Compliance with Information Security Strategies
- Utilising new software to improve efficiency in user journeys through security processes
- Key advice on using accessible terminology to ensure staff engagement with security protocols
- Communicating with staff about additional security measures as part of tackling sophisticated cyber threats
Brian Vlootman, CISO, Backbase
Embedding Risk-Based Approaches to Strengthening Security in Supply Chains
- Incorporating security requirements into procurement processes when selecting new suppliers
- Key tips on establishing information sharing guidelines with external partners
- Working with suppliers to improve their security measures and reduce risk within supply chains
Coffee Break & Networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Panel Discussion: Developing Robust Emergency Responses to Security Breach Incidents
- Establishing regular scenario testing exercises to identify gaps in security breach response plans
- Creating guidelines for employees to recognise and appropriately raise security concerns to senior staff
- Tailoring post-attack response plans to recover damaged or stolen company assets
Lyzia van Iterson, Head of Security – Customer Applications, LKQ Europe (moderator)
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Shouvik Dhar, Head of IT Infrastructure & Cyber Security, Sunweb Group
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
Workshop 6
Identity & Access Management
Workshop 7
Threat Intelligence
Workshop 8
Application Security
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Aligning Information Security Policies with Business Strategies
- Working with other departments to embed cyber security into organisation-wide processes
- Utilising cyber security credentials as a competitive advantage to demonstrate trust and transparency
- Securing buy-in from senior leaders by demonstrating how cyber security can improve business outcomes
Leo Harskamp, Chief Security Officer, Directorate of Information Services
Implementing Security Awareness Schemes to Tackle Cyber Threats
- Establishing cyber threat recognition schemes to enable staff to raise concerns about potential cyber risks
- Key tips on creating professional development opportunities to increase security awareness of teams
- Tailoring cyber security awareness schemes to address increasingly sophisticated cyber threats
Ardie Kleijn, CISO, Dutch Land Registry
Allocating Information Security Resources to Expand Cyber Defences
- Guidance on prioritising information security projects with available resources
- Demonstrating ROI for cyber defences to senior leaders to secure additional resources
- Evaluating cyber defences to identify areas for improving efficiency and freeing up information security resources
Holger Spohn, CISO, Candriam
Embedding Security Governance Polices to Ensure Accountability within Information Security Teams
- Designing governance frameworks to hold senior leaders to account for cyber risk decision-making
- Incorporating governance structures to create joined-up processes for reporting and addressing cyber security risks
- Key advice on developing transparency guidelines within teams without risking organisational cyber security
Paul De Wit, Head of Corporate Office Audit, Belfius
Panel Discussion: Utilising AI Tools to Strengthen Information Security Systems
- Working with software providers to select AI products that meet organisational information security needs
- Best practice on using AI to strengthen automated processes to raise alerts about security concerns
- Incorporating AI into threat detection systems to monitor and address trends in cyber attacks
Lyzia van Iterson, Head of Security – Customer Applications, LKQ Europe (moderator)
Michael Payne, Director of Information Security, Landal
Thomas Desmedt, Head of IT & Digital Innovation Program, HOGENT




