Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Evaluating Cyber Security Policies & Processes to Uphold New Regulations
- Adapting existing information security processes to ensure compliance with the Cyber Resilience Act
- Allocating resources to update cyber security measures in response to national regulations
- Working with staff to understand and fulfil their role in meeting regulation requirements
René Pluis, Global Cyber Security Remediation Officer, Philips
Boring Timeless Principles: Maintaining Consistency in Information Security to Strengthen Cyber Resilience
- Implementing effective principles resistant to trends and external and internal cyber threats
- Addressing misconceptions about modern working practices
Filip Nowak, Global Head, Cyber Defence, Ferrero
The AI High Five for Cyber Security
- Five key domains of GenAI for better understanding its potentials
- How to take the next steps toward integrating GenAI into your cybersecurity efforts
- Incorporating GenAI technology into day-to-day activities
Stefan van Gansbeke, CISO, CM/MC
Coffee Break & Networking
Workshop 1
Security Risks of Incorporating Generative AI
Workshop 3
Cybersecurity Complexity and Capacity Development
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Embedding Risk Management Policies to Address Organisation-Wide Cyber Security Vulnerabilities
- Establishing processes for all staff to appropriately raise concerns about potential security vulnerabilities
- Evaluating vulnerability data to identify & tackle wider trends in information security threats
- Key tips on fixing security gaps in company technology & software
Paul de Wit, CISO, Belfius
Investing in Information Security: Allocating Budgets to Strengthen Cyber Resilience
- Engaging with senior leaders on ROI of security strategies to secure additional support for new measures
- Guidance on prioritising security needs as part of information security budget planning
- Reserving financial resources to support security processes during emergency situations
Joost Boele, Head of IT Operations, Netherlands Cancer Institute
Creating Staff Training Schemes to Recognise Cyber Threats
- Developing joined-up responses to safely report potential threats & avoid escalation to becoming major incidents
- Adapting staff training to tackle increasingly sophisticated security threats, including spearfishing emails
- Regular inspections to maintain the security of workplace devices: tools & advice
Jeroen Roelandt, CISO, De Watergroep
Implementing Data-Informed Approaches to Information Security
- Collecting performance data on security measures to ensure cyber security KPIs are achieved
- Key tools to identify anomalous data & raise concerns about potential security risks
- Evaluating incident data to tackle gaps in security measures & inform cyber resilience strategies
Joran Leenders, CISO, Ypto
Coffee Break & Networking
Workshop 5
Employee Training and Security Awareness
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Panel Discussion: Designing Emergency Response Plans to Manage Security Breach Incidents
- Preparing response plans to establish roles of all staff in limiting the impact of breach incidents & recovering assets post-attack
- Learning from security breaches to address causes to incidents & improve cyber protection measures
- Regular testing of breach incident procedures to highlight gaps in response plans
Roy Konings, Head of Security, Benelux & Switzerland, Ericsson
Bas Gaal, Director Information Security, Canon Production Printing
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
Workshop 6
Building Cyber Resilience across the entire organisation
Workshop 7
Monitoring Emergency Privacy Threats
Workshop 8
Managing Third Party Risks
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Aligning Information Security Policies with Business Strategies
- Working with other departments to embed cyber security into organisation-wide processes
- Utilising information security measures & credentials as a competitive advantage to pursue new commercial opportunities
- Demonstrating to board members how information security can improve business outcomes in order to secure buy-in for cyber security strategies
Developing Recruitment Initiatives to Widen Team Capabilities
- Adapting recruitment processes to address skills gaps in security teams
- Establishing entry points at different levels of seniority to attract a wider range of applicants for job vacancies
- Incorporating diverse recruitment schemes to grow teams with a broader range of backgrounds & experiences
Enhancing User Experiences of Security Measures to Increase Compliance with Information Security Strategies
- Utilising new software to improve efficiency in user journeys through security processes
- Key advice on using accessible terminology to ensure staff engagement with security protocols
- Communicating with staff about additional security measures as part of tackling sophisticated cyber threats
Creating Staff Retention & Development Policies to Reduce Employee Turnover
- Collaborating with employees to establish professional development plans to meet career goals
- Staff coaching schemes to support applications for internal promotion opportunities
- Key tips on incorporating hybrid working practices in line with organisation security restrictions
Panel Discussion: Embedding Security Governance Policies to Build Organisation-Wide Cyber Resilience
- Designing organisation-wide accountability frameworks to ensure senior leaders are held responsible for cyber security decision-making
- Incorporating security governance polices to improve coordination of information security incident response plans & strengthen cyber defences
- Prioritising cyber risks in line with other business needs to maintain support for information security resources from other departments
Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance