The Network Group Benelux Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2022 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 13th June 2022
08:30 - 09:05

Arrival, registration & breakfast networking

09:05 - 09:15

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Ardie Kleijn, CISO, Dutch Land Registry at Kadaster

09:15 - 09:50

Know your enemy

  • Identifying recent cyber attack trends
  • Implementing a succinct forecast of where hackers are headed
  • Re-evaluating strategies for company -wide clarity in the fight against systemic invasion

Jelle Niemantsverdriet, National Security Officer, Microsoft

09:50 - 10:20

Fight cyber risk with risk awareness

  • How do you build a risk aware & security mature organization
  • Agile/scrum/DevOps way of working and more digital cyber threats require a different risk approach
  • Building a risk aware and security maturity organisation is key
  • Next steps to keep developing a risk aware and mature organisation

Leon Janson, Head of IT Risk & Security, ING

10:20 - 10:50

Keeping up with compliance

  • Streamlining regulatory updates across an organisation
  • Cross -pollinating IS & Compliance teams with fresh training and upskilling
  • Partnering with your CCO to better understand business aims and obstacles

Andrea Krush, Team Lead Information Security, DAS

10:50 - 11:00

Coffee break & networking

11:00 - 11:25

Workshop 1

 

 

Hosted by AttackIQ

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

 

 
Hosted by Exabeam

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Threat hunting: ML-assisted SOC

 
Inbar Raz, VP Research, Hunters

11:00 – 13:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13:05 - 14:00

Networking Lunch

Stream 1 - Culture Switches
14:00 - 14:35

Reshuffling working cultures to tie off persistent bugs & explore untapped solutions

  • Breaking down silos to close any qualms between divisions
  • Defining a fresh cultural strategy within the workplace
  • Setting values for a security-conscious workforce

Ardie Kleijn, CISO, Dutch Land Registry at Kadaster
 

Stream 2 - Access Management
14:00 - 14:35

Defining ISO 27k Certified Identity & Access Management processes

  • What are the key processes you need to define for the IDAM service and practical examples on how to do it? Approaching from the attacker’s perspective through
    Attack Surface Management
  • How to explain your Access Control Matrix to businessand management stakeholders?

Stanislav Sobolevsky, CISO, OMP
 

Stream 1 - Talent development
14:40 - 15:15

Hands-on team builds for future organisational security

  • Collaborating with HR to pick out ideal talent for an airtight security team
  • Corroborating feedback data with in-person meetings to understand your workforce top-to-toe
  • Maintaining a clear line of cooperation with recruitment

Bart Kulach, International Information Security Lead, NN Group

Stream 2 - Harmonising IS with M&A
14:40 - 15:15

Case Study: How does Exact deal with information security within a strong M&A strategy?

  • Ensuring network access for acquired companies
  • Assessing risk within the field of M&A

Jack Krul, CISO, Exact

15:15 - 15:25

Coffee break & networking

15:25 - 15:50

Workshop 4

Overcoming the disconnect between what you see & what attackers see

Caroline Paddle, Regional Sales Director, Northern Europe, XM Cyber

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

Threat detection & response for hybrid enterprise & modern SOC

 
Marijn Joosten, Regional Sales Manager, Vectra

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
17:10 - 17:55

Fireside chat: Is there a place for hybridity in the world of the CISO?

  • How the CISO role has adapted over the last three years
  • Has the need to adapt augmented your work ethic or challenged it?
  • Important upskilling for the modern CISO
  • Adopting a more operational mindset to supplant division gaps and forge a stronger line of leadership


Lyzia Van Iterson, Regional ISO, Fource Automotive Source

19:00
Networking dinner & drinks reception hosted by Verizon
Tuesday 14th June 2022
08:30 - 09:05

Morning registration & breakfast

Informal networking over breakfast

09:05 - 09:10

Chairperson’s opening remarks

Ardie Kleijn, CISO, Dutch Land Registry at Kadaster

09:10 - 10:10

Roundtable discussions

Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: Team engagement

Robert Kerssies, CISO, Cycloon Post & Fietskoeriers

Roundtable 2: The Threat Landscape

Stefan Englbrecht, Senior Digital Forensics Investigator, Verizon

Roundtable 3: Cyber Innovation

Raviv Raz, Cyber Innovation Tech Lead, ING

Roundtable 4: Fixing Firewalls

10:10 - 10:50

Roundtable wrap-up by the Chairperson

Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.

10:50 - 11:00

Coffee break & networking

11:00 - 11:25

Workshop 6

Dynamic authorisation: The user has an identity – now what?

 
Stuart Charters, Solutions Architect, Ping Identity

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

The future of cyber security & training

 
Joel Anfuso, Head of Product Marketing, SoSafe

12:15 - 12:40
Networking
12.40 - 13.05

Workshop 8

Hosted by ReliaQuest

 
Rasham Rastegarpour, Sales Engineer, ReliaQuest

11:00-13.05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Malware Protection
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Regulatory Management
13.05 - 14.00

Networking Lunch

14:00 -14:35

Presenting to the board

Key points to securing a successful boardroom outcome

  • Striking a balance with your jargon
  • Directing attention to the primary updates and challenges
  • Approach with solutions instead of in search of solutions

Alain De Maght, CISO & DPO, Hôpitaux Iris Sud – Iris Ziekenhuizen Zuid

14:35 - 15:10

Data drivers

Addressing problems through data-backed solutions

  • Focussing on permanent solutions
  • Rate actions based on urgency
  • Learning to live with and thrive off big data

Bart Pieters, Information Security & Privacy Advisor – CIO Rijk, Ministry of Internal Affairs, The Netherlands

15:15 - 16:05

Fireside chat: Where are we now?

Pondering the state of information security & where it may be headed

  • Staying ahead of potential pain-points in an organisation’s infrastructure
  • What will the CISO represent in 10 years’ time?
  • The routes a CISO can and should take for an air-tight security model

Stefan Van Gansbeke, CISO, Christelijke Mutualiteit

16:05 - 16:10
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

AMSTERDAM, NETHERLANDS
13-14 March, 2023

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
45 Moorfields
Moorgate
London
EC2Y 9AE

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy