Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Lyzia van Iterson, Information Security Manager Customer Applications & Information Security Officer BeNeLux & France, LKQ Europe
10 lessons learned from 6 visits to the A&E: Implementing information security controls to strengthen company-wide cyber defences
- Developing responsibilities for all employees to contribute towards improving organisational information security
- Guidance on selecting & implementing proportionate security measures to build up cyber resilience
- Embedding a common language for organisations to use when recording information about cyber security incidents
Rick Veenstra, Senior Information Security Advisor, Isala
Establishing KPI’s to measure the success of information security measures
- Defining realistic outcomes for security measures to avoid KPIs being achieved at the expense of cyber resilience
- Maintaining transparency through KPIs to ensure the accountability of senior leaders responsible for information security
- Evaluating the effectiveness of cyber security measures to inform future KPIs
Haissam Hariz, CISO, NIBC Bank
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Embedding governance & accountability to improve cyber security across organisations
- Designing management structures to enable organisations to account for their cyber risks
- Establishing procedures for escalating & responding to security concerns
- Working with accounting officers to ensure accountability among senior leaders for risk decisions
Boris Awdejew, Global CISO, Fiege
Identifying & managing vulnerabilities to enhance product security
- Working with external security community
- Automation of everything
- Penetration tests and vulnerability research
Cezary Cerekwicki, Head of Product Security, Opera
Detecting cyber security events to avoid escalation to becoming incidents
- Tools & resources to identify & tackle emerging cyber threats
- Implementing common processes to share cyber security event information & avoid repeat incidents
- Using event data to inform approaches to recognising more sophisticated attacks
Jelle Niemantsverdriet, National Security Officer, Microsoft
Coffee break & networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel discussion: How to attract, retain & develop talent in information security teams
- Creating entry points at multiple levels of seniority into cyber teams to attract a wider range of applicants
- Professional development opportunities to tackle skills shortages in teams
- Developing career pathways to ensure employee progression & reduce staff turnover
Stefan Van Gansbeke, MC – Director Risk, Security & Legal – CISO, Christelijke Mutualiteit
Mahdi Abdulrazak, Group CISO, SHV Energy
Krzysztof Dworucha, Cyber Security Lead EMEA & APAC, AlterDomus
Morning registration & breakfast
Informal networking over breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Ardie Kleijn, CISO, Kadaster
Maksim Chernousov, Head of Security Governance & IT, Gorillas
Arash Rahmani, BISO, NN Group
Andrea Krush, Head of Information Security, DAS
Ron Werther, ISO, De Volksbank
Gert-Jan Ingenhoes, Global ISO, JDE
Christa van Tuijl, CISO, PLUS Retail
Ranadeep Sarkar, IT Director, Information Security, Schoeller Allibert
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
11:00-13.05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Collaborating with vendor companies to maintain information security within supply chains
- Incorporating security requirements into procurement processes to manage supply chain risks
- Developing guidelines for data sharing with vendors to reduce vulnerabilities within supply chains
- Evaluating dependencies on supplier companies to determine their impact on organisational security
Evgenii Bogdanov, Global Cyber Risk Director, HSBC
Protecting Trust in a Changing World: Expanding Security from the Transaction to Every Interaction
- Cyber Trends and Insights: Actors and methods observed in Europe/Global
- A deep look at the evolving cyber threat landscape and important defenses to enhance
- Resilience with Mastercard: Digital Risk, Financial Risk, Cyber Risk, Systemic Risk and Threat casting
Maikel Ninaber, Director Cyber & Intelligence, Mastercard
Responding to security breach incidents to strengthen cyber resilience
- Preparing incident response plans to establish the roles of all staff in managing a security breach
- Learning from security breaches to address causes to incidents & improve cyber protection
- Regular testing of breach incident procedures to highlight gaps in response plans
Rene Pluis, Global Cyber Security Remediation Officer, Philips
Panel discussion: Embedding new technology to reduce cyber security risks
- Collaborating with technology providers to design software that meets cyber security priorities
- Working with staff to make the best use of new technology & strengthen cyber defences
- Engaging with senior leaders to secure resources for new information security technology
Bas Gaal, Director Information Security, Canon Production Printing
Jack Krul, CISO, Exact
Tim Ottens, Senior Data Scientist, PostNL
Rene Pluis, Global Cyber Security Remediation Officer, Philips