Arrival, Registration & Breakfast Networking
Introduction from the Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange one-to-one meetings with each other. This will be followed by a welcome from the chairperson
Bart Pieters, Head of Information Security & Privacy, Central Dutch Government
Ali Baccouche, Regional Information Security & Data Privacy Officer, Texas Instruments
Designing Security Strategies to Support Business Growth
- Engaging with board members to advocate for additional resources
- Embedding information security credentials into organisation profiles to create competitive advantages
- Communicating with other departments to uphold cyber security processes & ensure operational efficiency
Michael Beaupre, CISO, Hays
Exploring the Role of the CISO in 2025 & Beyond
- Methods of moving from a technical security function to a strategic leadership position with influence across the entire business
- Key advice on capitalising on your unique skillset in order to expose yourself to new opportunities
- A breakdown on how to keep up with the expanding mandate of the CISO
Gideon Knocke, CISO, Pro Medicus
Panel Discussion: Driving Cultural Transformation to Widen Team Cyber Security Skillsets
- Resources to empower staff to recognise & appropriately report security concerns
- Tailoring cyber training initiatives to tackle increasingly sophisticated information security threats
- Designing security breach training exercises to ensure staff understand how to respond to cyber attacks
Robert Hellwig, CISO, Siegen University
Marc Vallotton, CISO, Banque Internationale à Luxembourg Suisse
Edd Barber, CISO, WEL Networks
Melanie Hendrickx, Head of Information Security Governance, Risk & Compliance, Metro
Boris Ortolf, Director Cyber Security, Baker Tilly
Coffee Break & Networking
Workshop 1
Monitoring Emergency Privacy Threats
Workshop 2
Hosted by Black Duck
Workshop 3
AI Security
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Case Study: Cyber Security in Geneva State Police
- Guidance on determining cyber security priorities when selecting AI tools
- Evaluating information security systems to identify areas where generative AI can increase operational efficiency
- Resources to support staff in utilising generative AI as part of working processes
Patrick Ghion, Chief Cyber Strategy Officer, Geneva State Police
The Convergence of Security, AI & Trust
- Driving a systems-based certification strategy that enables organisations to build lasting digital trust
- Unifying controls to streamline requirements & accelerate innovation
- Demonstrate proactive governance to boost stakeholder confidence
Christian Gerling, Head of Information & Data Security, DQS
Embedding Compliance Strategies to Meet New Information Security Regulations
- EU Cyber Resilience Act: Implementing changes to information security measures to comply with new legislation
- Guidance on working with other senior leaders to secure additional resources to fulfil regulations
- Establishing regular reviews of information security processes & tools to address areas of non-compliance
Bart Pieters, Head of Information Security & Privacy, Central Dutch Government
Creating Recruitment Programmes & Developing Retention Policies to Build High-Performing Teams
- Evaluating recruitment schemes to tackle unconscious bias in processes & build diverse workforces
- Establishing job roles at multiple levels of seniority to reach a wider range of applicants
- Resources for soft skills training to support employees applying for internal promotions
Coffee Break & Networking
Workshop 4
Building Cyber Resilience
Workshop 5
Zero Trust
15:25 – 17:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Panel Discussion: Implementing Emergency Procedures in Response to Malware Attacks
- Establishing joined-up responses for staff to alert senior leaders about information security concerns
- Developing post-attack processes to recover stolen & damaged company assets
- Adapting response plans to mitigate the impact of human error on cyber security measures
Bartosz Prill, Head of Cyber Security, Gretsch-Unitas Group
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Edd Barber, CISO, WEL Networks
Máté Lendvai, BISO, Jedox
Roundtable Wrap-Up
Each host provides a short overview of key findings from their discussion to the room. This is an opportunity for everyone to take notes from each roundtable summary.
Coffee Break & Networking
Workshop 6
Ransomware & Cyber Attacks
Workshop 7
Employee Training & Security Awareness
Workshop 8
Ransomware
11:00 – 13:05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Malware Protection
- Identity & Access Management
- Application Security
- Mobile Security
- Regulatory Management
Networking Lunch
Evaluating Information Security Measures to Strengthen Cyber Resilience
- Defining objectives for security controls to inform performance measures
- Guidance on introducing additional security measures to ensure smooth transitions to new systems
- Collecting feedback from staff on useability of security measures to increase uptake of security tools
Máté Lendvai, BISO, Jedox
Tailoring Internal Information Security Policies to Tackle Insider Threats
- Key tips on incorporating security checks as part of recruitment processes
- Establishing information security clearance levels to control access to company data
- Implementing procedures for removing internal security access for staff after leaving organisations
Manuel Ressel, CISO, Sauter
Adapting Information Security Strategies to Strengthen Security in Supply Chains
- Incorporating background security checks into procurement processes for securing new suppliers
- Establishing information security & privacy agreements as part of vendor contracts
- Engaging with vendors to strengthen their own security measures & build up cyber resilience in supply chains
Boris Ortolf, Director Cyber Security, Baker Tilly
Developing Leadership Approaches to Improve Cyber Security Team Performance
- Collaborating with other senior leaders to define targets for information security teams
- Engaging with all staff to understand their role in contributing towards cyber security objectives
- Creating intervention policies to support staff struggling to manage their workloads
Robert Hellwig, CISO, Siegen University
Panel Discussion: Implementing Vulnerability Management Policies to Address Gaps in Information Security Systems
- Staff training schemes to embed procedures for recognising & notifying colleagues about potential gaps in cyber security systems
- Evaluating performance data of information security measures to highlight emerging trends in cyber security vulnerabilities
- Regular reviews of information security technology & software to identify & tackle risks to organisation-wide cyber security
Neethu Balan, Head of Compliance, Allianz