Amsterdam

The most exclusive security event in the world.

November 16, 2023

Limited to 150 BIO C-Suites

150
places left

WHY SHOULD YOU JOIN
OUR CONFERENCE

Unique agenda featuring the hottest topics, curated by our CISO community, with decision makers in one room for the entire day, and a limited number of exclusive content contributors.

0
Expert Speakers
0
Delegates
0 +
Minutes Of Networking

Expert Speakers

We are delighted to introduce some of our expert speakers in cyber security. Our speakers are distinguished professionals in the field, with years of experience and a passion for sharing their knowledge.

Agenda

08:00

Registration

08:30

Seated Working Roundtable Breakfast

09:00

• Are you aware of all the risks posed by third-party vendors to your organisation’s cyber security?

Dr Martjin Dekker

Global Chief Information Security Officer,
ABN AMRO Bank N.V.

09:25

Cyberthreats continue to grow and cybercriminals are getting more sophisticated. Hence, every user of an organisation, regardless of insiders or outsiders, must be authenticated and authorised. In order to help prevent cyberattacks, one must implement zero trust security effectively.

  • What are the fundamental principles of zero trust?
  • Continuous verification and authentication of devices as no device is out of the suspect list.
  • There are so many aspects of the implementation of Zero Trust, e.g: MFA, Data encryption, comprehensive security assessment etc, what works best for your organisation?

Arseny Kapralov

Head of Operational Security,
Mollie

Prashant Agarwal

Program Leader,
Booking.com

Davide Davolio

Western and Southern Europe Security Specialist,
Uber

Nicole van der Meulen

Cyber Security Evangelist,
Europol

10:00

Innovator Keynote

To Be Announced

10:20

NETWORKING & 1-1 meetings

10:50

Innovator Keynote

To Be Announced

11:15

  • Initiatives to create a strong and highly skilled workforce capable of confronting emerging cyber threats, as described in the European Cybersecurity Skills Framework.
  • Learn about the knowledge, abilities, and skills needed for diverse cybersecurity tasks as well as how the framework may assist organizations in identifying and developing these talents within their workforce.
  • Collaboration between business, academia, and government organizations is essential to fostering innovation and knowledge exchange in the field of cybersecurity and guaranteeing a robust and integrated ecosystem.

Christina Skouloudi

Cyber Security Officer,
Enisa

11:40

Enhancing CyberSecurity Practices
Exploration of effective approaches to strengthen cybersecurity, incident response, and organisational resilience.

Minimizing Attack Surface
We will discover techniques to reduce the vulnerability of systems and networks through proactive vulnerability management and secure configurations.

Countering Advanced Threats
Latest trends and tactics used by cybercriminals, and advanced detection and response techniques for proactive threat mitigation.

Victoria van Roosmalen

CISO & DPO,
Coosto

Antanas Kedys

CISO,
Nexpay

Lorena Carthy-Willmot

Digital Forensics & Cyber Security,
East Police District Norway

dr. Swantje Westpfahl

Director (CEO),
Institute for Security and Safety

12:10

Lunch Break

13:10

Innovator Keynote

To Be Announced

13:35

SCADA Attacks
Uncover vulnerabilities within IoT and SCADA systems and learn strategies to enhance their security.

Strengthening OT Security
Security of operational technology (OT) within IoT environments, safeguarding critical operational infrastructure and connected devices

Shadow IT Impact on OT
Addressing the risks of unauthorized devices and applications in OT environment

Lyzia van Iterson

Information Security Manager,
LKQ Europe

Roelof Kroon

Corporate Information Security Officer,
Alfen

Patrick Ghion

Head Regional Cyber Competence Centres,
Western Switzerland (RC3) at State of Geneve

Trish McGill

Executive Subject Matter Expert – Cyber Security IT/OT,
Nobian

14:10

Innovator Keynote

To Be Announced

14:30

Coffee Break & 1-1 meetings

15:00

Innovator Keynote

To Be Announced

15:25

• As cloud computing increasingly becomes a crucial element in modern business operations, organizations are aware of the imperative need to prioritize the security of their cloud infrastructure. However, we are now taking the next step as the necessity of multi-cloud environments introduces a fresh set of challenges and considerations.

• During this session, we will delve into the significance of securing multi-cloud environments and learn strategies how to mitigate risks, enhance resilience, and ensure robust cybersecurity in this dynamic landscape.

• The next frontier of cloud security and the future of cyber security is in multi-cloud environments.

Raviv Raz

Cloud Security Manager,
ING Bank

15:50

Innovator Keynote

To Be Announced

16:10

Leg stretcher

16:15

Cyber insurance market is ever growing as the cybers threat landscape. It is predicted that the cyber insurance market is expected to grow exponentially, almost doubling in size in the next five years. Which indicates that it will be an integral part of the cybersecurity industry.

  • Insurance policies, are they adequate or it needs to be changed?
  • Do we need to reconsider systematic risk in order to unlock capacity?
  • What are the key drivers of cyber insurance?
  • What does the future of different organisations look like with cyber insurance and without insurance?

Jack Krul

CISO,
Exact

Juan Diego Nocua Gualdron

CISO,
Artsen zonder Grenzen Nederland

Daniela Almeida Lourenço

CISO,
Tinka

Dr Martjin Dekker

Global Chief Information Security Officer,
ABN AMRO Bank N.V.

16:50

NIS2 – To respond to the growing threats posed with digitalisation and the surge in cyber-attacks, the European Commission has introduced the NIS2 Directive in order to strengthen the security requirements, address the security of supply chains, streamline reporting obligations, and introduce more stringent supervisory measures and stricter enforcement requirements, including harmonised sanctions across the EU.
Will you be ready?

DORA – The Digital Operational Resilience Act solves an important problem in the EU financial regulation. But only from the perspective of regulators.
Is your financial institution able to satisfy all the requirements for the protection, detection, containment, recovery and repair capabilities against ICT-related incidents?
What should you do to fully implement it by 2025.?

17:10

Gadgets

17:30

Official Dinner Banquet

Delegates

VOLVO

CISO

ING Bank

Product Owner

SpareBank

CISO

DNB Bank

Head of IT security

Booking.com

Program Leader

SpareBank

CISO

Einride

CISO

ING Bank

Product Owner

Booking.com

Program Leader

Bravida

CISO

ING Bank

Product Owner

SpareBank

CISO

VOLVO

CISO

Bravida

CISO

Booking.com

Program Leader

VOLVO

CISO

ING Bank

Product Owner

Booking.com

Program Leader

SpareBank

CISO

Bravida

CISO

ING Bank

Product Owner

VOLVO

CISO

SpareBank

CISO

Bravida

CISO

Booking.com

Program Leader

VOLVO

CISO

ING Bank

Product Owner

DNB Bank

Head of IT security

SpareBank

CISO

Booking.com

Program Leader

Einride

CISO

SpareBank

CISO

ING Bank

Product Owner

Booking.com

Program Leader

Bravida

CISO

ING Bank

Product Owner

VOLVO

CISO

SpareBank

CISO

Bravida

CISO

Booking.com

Program Leader

Booking.com

Program Leader

Bravida

CISO

ING Bank

Product Owner

VOLVO

CISO

SpareBank

CISO

VOLVO

CISO

ING Bank

Product Owner

SpareBank

CISO

Bravida

CISO

Booking.com

Program Leader

Grand Hotel Huis ter Duin in Noordwijk, with a history dating back 135 years, is a leading name in the Dutch hospitality industry. On top of the Noordwijk’s dunes the majestic Grand Hotel is located directly on the beach with stunning views across the North Sea.

Grand Hotel Huis ter Duin is the No 1 preferred place for diginities and executives to stay at and do business whilst in Amsterdam.

Free Subscription

The most comprehensive Cybersecurity agenda for leading industry executives

Connect and share niched and unique knowledge

Meet our 15-year experience in addressing international cybersecurity challenges

Register for The Conference
25th of May 2023