Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Ardie Kleijn, CISO, Dutch Land Registry at Kadaster
Know your enemy
- Identifying recent cyber attack trends
- Implementing a succinct forecast of where hackers are headed
- Re-evaluating strategies for company -wide clarity in the fight against systemic invasion
Jelle Niemantsverdriet, National Security Officer, Microsoft
Fight cyber risk with risk awareness
- How do you build a risk aware & security mature organization
- Agile/scrum/DevOps way of working and more digital cyber threats require a different risk approach
- Building a risk aware and security maturity organisation is key
- Next steps to keep developing a risk aware and mature organisation
Leon Janson, Head of IT Risk & Security, ING
Keeping up with compliance
- Streamlining regulatory updates across an organisation
- Cross -pollinating IS & Compliance teams with fresh training and upskilling
- Partnering with your CCO to better understand business aims and obstacles
Andrea Krush, Team Lead Information Security, DAS
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Reshuffling working cultures to tie off persistent bugs & explore untapped solutions
- Breaking down silos to close any qualms between divisions
- Defining a fresh cultural strategy within the workplace
- Setting values for a security-conscious workforce
Ardie Kleijn, CISO, Dutch Land Registry at Kadaster
Defining ISO 27k Certified Identity & Access Management processes
- What are the key processes you need to define for the IDAM service and practical examples on how to do it? Approaching from the attacker’s perspective through
Attack Surface Management - How to explain your Access Control Matrix to businessand management stakeholders?
Stanislav Sobolevsky, CISO, OMP
Hands-on team builds for future organisational security
- Collaborating with HR to pick out ideal talent for an airtight security team
- Corroborating feedback data with in-person meetings to understand your workforce top-to-toe
- Maintaining a clear line of cooperation with recruitment
Bart Kulach, International Information Security Lead, NN Group
Case Study: How does Exact deal with information security within a strong M&A strategy?
- Ensuring network access for acquired companies
- Assessing risk within the field of M&A
Jack Krul, CISO, Exact
Coffee break & networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Fireside chat: Is there a place for hybridity in the world of the CISO?
- How the CISO role has adapted over the last three years
- Has the need to adapt augmented your work ethic or challenged it?
- Important upskilling for the modern CISO
- Adopting a more operational mindset to supplant division gaps and forge a stronger line of leadership
Lyzia Van Iterson, Regional ISO, Fource Automotive Source
Morning registration & breakfast
Informal networking over breakfast
Chairperson’s opening remarks
Ardie Kleijn, CISO, Dutch Land Registry at Kadaster
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Robert Kerssies, CISO, Cycloon Post & Fietskoeriers
Stefan Englbrecht, Senior Digital Forensics Investigator, Verizon
Raviv Raz, Cyber Innovation Tech Lead, ING
Roundtable wrap-up by the Chairperson
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
11:00-13.05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Presenting to the board
Key points to securing a successful boardroom outcome
- Striking a balance with your jargon
- Directing attention to the primary updates and challenges
- Approach with solutions instead of in search of solutions
Alain De Maght, CISO & DPO, Hôpitaux Iris Sud – Iris Ziekenhuizen Zuid
Data drivers
Addressing problems through data-backed solutions
- Focussing on permanent solutions
- Rate actions based on urgency
- Learning to live with and thrive off big data
Bart Pieters, Information Security & Privacy Advisor – CIO Rijk, Ministry of Internal Affairs, The Netherlands
Fireside chat: Where are we now?
Pondering the state of information security & where it may be headed
- Staying ahead of potential pain-points in an organisation’s infrastructure
- What will the CISO represent in 10 years’ time?
- The routes a CISO can and should take for an air-tight security model
Stefan Van Gansbeke, CISO, Christelijke Mutualiteit