Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Effecting Change through Transformational CISO Leadership Approaches
- Inspiring teams through individualised consideration to increase performance & retention
- Communicating effectively with key stakeholders & senior leaders to influence decision-making
- Fostering a culture of innovation & inclusivity through empowering leadership
Ardie Kleijn, CISO, Kadaster
Mastering Incident Response: Best Practices to Address Security Breaches
- Tools to identify security breaches as they occur to limit their severity & impact
- Step-by-step protocols to measure damage & report appropriately
- Strategies to review systems & address areas for improvement following a security breach
Andre Adelsbach, CISO, SES Satellites
Panel Discussion: Bridging the Gap: Cyber Security in the Wider Business
- Eliminating the divide between cyber security & the wider business in order to increase operational efficiency
- Streamlining decision-making processes through cross-departmental integration
- Enabling business growth by aligning priorities & objectives
Coffee Break & Networking
Workshop 1
Security Risks of Incorporating Generative AI
Workshop 2
Zero Trust Implementation
Workshop 3
Cybersecurity Complexity & Capacity Development
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Embedding Security in the Software Development Cycle
- Identifying areas for automation & improvement to determine new technology requirements
- Methods of evaluating technology options in a saturated market
- Approaches to seamless adoption of new technologies
Shairesh Algoe, Deputy CISO, BNG Bank
Evaluating Approaches to Human Factors in Cyber Security
- The benefits & risks of multi-factor authentication for access management
- Evaluating privileged access & privileged user management strategies
- Adopting regular account & password review processes for identity management
Bart Lismont, Senior Information Security Officer, KBC Bank & Verzekering
The Benefits of Consolidating Third-Party Vendors
- Auditing third-party vendors to minimise wasted investment
- Streamlining third-party contracts to optimise operational efficiency
- Strengthening relationships & enhancing visibility with core third-party vendors
Ronald Westerveen, CISO, Prinses Maxima Centrum
Consistency between DORA-NIS2 & ISO 27001-27002
- Some recommendations regarding ISO 27002
- Understanding the points of distinction & similarity between DORA & NIS 2
- Discussing four major gaps in ISO 27001-27002: business continuity, security testing, managing supply chain risk, and incident reporting
Jean-Yves Mathieu, CISO, Banque Internationale à Luxembourg
Coffee Break & Networking
Workshop 4
Ransomware & Cyber Attacks
Workshop 5
Employee Training & Security Awareness
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel discussion: Attracting, Retaining & Developing Diverse Talent in Security Teams
- Evaluating methods of attracting diverse talent such as widening points of entry & trialling new recruitment schemes
- Engaging with employees to ensure teams are supported & motivated in order to increase retention
- Implementing regular check-in’s & developing personal development plans to support teams in fulfilling their potential
Jeroen Roelandt, CISO, De Watergroep
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Dalia Khader, Divisional CISO, Swiss Life
Ilona Crommentuijn, CISO, Holland Casino
Dieter Vandenbroeck, CISO, Nagelmackers
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
Workshop 6
Building Cyber Resilience
Workshop 7
Monitoring Emergency Privacy Threats
Workshop 8
Managing Third Party Risks
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Adopting AI with Confidence: Addressing Security Concerns
- Outlining common security concerns raised around AI & ML
- Tools to identify & rectify points of weakness in AI software
- Methods of responding to AI & ML security breaches
Preparing Emergency Response Plans to Cyber Attacks
- Identifying which methods of cyber attack your business may be vulnerable to
- Crafting response plans for each method of cyber attack with input from key third-parties
- Considering running tests to identify flaws in plans
Paul de Wit, CISO, Belfius
Vulnerability Management & Threat Intelligence
- Embedding effective anti-malware strategies to decrease general vulnerability
- Constructing frameworks to regularly assess vulnerabilities in software & systems
- Strategies to monitor developments in cyber threat
Upskilling & Reskilling: The Key to Successful Recruitment
- Implementing upskilling in recruitment schemes to broaden points of entry
- Looking beyond traditional employment criteria to support applicants with reskilling
- Considering benefits of alternative recruitment strategies
Taco Hettema, Senior Information Security Officer, Nederlandse Spoorwegen
Panel Discussion: Building & Delivering an Efficient & Agile Cyber Security Strategy
- Conducting risk assessments & evaluating legacy systems to accurately inform security goals
- Delivering an agile cyber security strategy in collaboration with decision-makers
- Selecting, implementing & monitoring a security framework whilst retaining flexibility to make adjustments as the landscape evolves
Rob de Lange, CISO, Provincie Overijssel