Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Lyzia Van Iterson, ISO, LKQ
Embedding Cyber Security Governance & Accountability into Working Practices
- Incorporating information security into decision-making processes to promote company-wide cyber resilience decisions
- Developing accountability frameworks to determine responsibility among senior leaders for taking risk
Thom Schiltmans, Head of Security, Resilience & Identity Governance, Signify
Panel: Artificial Intelligence: What the CISO Needs to Know
- Understanding how AI will soon become a necessary skill for any CISO who wants to stay relevant in the field
- Why investing in AI-powered defence is the only way to keep up with the coming wave of AI-powered attacks.
(Moderator)Rens van Dongen, Senior Information Security Officer, Nederlandse Spoorwegen
Siegfried Moyo, Head of Information Security, Americold
Nicholas Batte, Assistant VP, IT Infrastructure Security, Mizuho
Martin Potappel, CISO, Translink
Coffee break & networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Understanding the Human Aspect of Cyber Security in Order to Mitigate the Risk of a Breach
- How are employees being targeted and what vulnerabilities are being exposed?
- How can we harmonise organisational protocol with the mitigation of human error?
- What training protocols have worked well? And are there any more tools at our disposal to encourage vigilance?
Joost Boele, CISO, Antoni van Leeuwenhoek
Collaborating with Vendor Companies to Maintain Information Security within Supply Chains
- Incorporating security requirements into procurement processes to manage supply chain risks
- Developing guidelines for data sharing with vendors to reduce vulnerabilities within supply chains
- Evaluating dependencies on supplier companies to determine their impact on organisational security
Christa van Tuijl, CISO, PLUS Retail
Rise of AI in the Context of Security
- Implementing innovation for AI in cybersecurity
- Cyber “Innovation” reality check
- What are the key things you need to take into account when building AI solutions?
Jelle Niemantsverdriet, National Security Officer, Microsoft
IT-OT Convergence: Managing the Cybersecurity Risks
- Ensuring the security and resilience of operational technology with integration of IT and OT
- How to adapt to the evolving threat landscape and stay ahead of potential vulnerabilities
Ivo van Nimwegen, CISO, Siemens
Coffee break & networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel discussion: How to attract, retain & develop talent in information security teams
- Creating entry points at multiple levels of seniority into cyber teams to attract a wider range of applicants
- Professional development opportunities to tackle skills shortages in teams
- Developing career pathways to ensure employee progression & reduce staff turnover
Taco Hettema, Senior Information Security Officer, Nederlandse Spoorwegen
Paul De Wit, CISO, Belfius
Mahdi Abdulrazak, Group Information Security & Risk Officer, SHV Energy
Gert-Jan Ingenhoes, Lead ISO, JDE
Morning registration & breakfast
Informal networking over breakfast
Roundtable discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Roy Konings, Head of Security, Benelux & Switzerland, Ericsson
Kobe Shwartz, Head of Cyber & Threat Intelligence Analysis, Signify
Joran Leenders, CISO, Ypto
Taco Hettema, Senior Information Security Officer, Nederlandse Spoorwegen
Wouter-Bas Van Der Vegt, Global Data Protection & Security Officer, Randstad
Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance
Bandita Panigrahi, Senior Information Security Manager, TomTom
Gracia Mettendaf, ISO, Amaris Zorggroep
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee break & networking
Open Forum Think Tank
How to Efficiently Meet Cyber Security Regulatory Compliance Requirements
Rene Pluis, Regulatory & Standards, Philips
11:00-13.05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Lessons Learned from Building an Information Security Awareness Roadmap
- How to involve all stakeholders
- Tips on how to finetune your content
- Adapting to changing needs
- How you can learn from your mistakes
Paul De Wit, CISO, Belfius
Third Party Security Risk Management programme on a budget
- How to start your TPSRM with resources you already have
- How to increase your automation and minimise onboarding effort
- Lessons learned from our journey
Elli Tsiala, Product Owner – Supply Chain Security, ABN AMRO
Incident Response & the Collaboration between Information Security & Data Protection Teams
- Successfully responding to a data breach
- How can data breaches be prevented?
Wouter-Bas Van Der Vegt, Global Data Protection & Security Officer, Randstad
Jessica Conquet, CISO, Randstad
Successfully Responding to Security Breach Incidents & improve your Cyber Resilience
- Preparing incident response plans to establish the roles of all staff in managing a security breach
- Learning from security breaches to address causes to incidents and improve cyber resilience
Ranadeep Sarkar, IT Director, Information Security, Schoeller Allibert
Panel Discussion: What Does a Realistic Cyber Strategy Look Like?
- What steps are needed to develop a pragmatic security vision and strategy?
- Raising the profile of cyber security with the board to ensure it is given the focus it deserves
- How to acquire the resources to identify, mitigate and manage risks
Siegfried Moyo, Head of Information Security, Americold
Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance
Aurelie Varachaud, ISO, Aliaxis