Unique agenda featuring the hottest topics, curated by our CISO community, with decision makers in one room for the entire day, and a limited number of exclusive content contributors.
0
Expert Speakers
0
Delegates
0+
Minutes Of Networking
Expert Speakers
We are delighted to introduce some of our expert speakers in cyber security. Our speakers are distinguished professionals in the field, with years of experience and a passion for sharing their knowledge.
Cyberthreats continue to grow and cybercriminals are getting more sophisticated. Hence, every user of an organisation, regardless of insiders or outsiders, must be authenticated and authorised. In order to help prevent cyberattacks, one must implement zero trust security effectively.
What are the fundamental principles of zero trust?
Continuous verification and authentication of devices as no device is out of the suspect list.
There are so many aspects of the implementation of Zero Trust, e.g: MFA, Data encryption, comprehensive security assessment etc, what works best for your organisation?
Arseny Kapralov
Head of Operational Security, Mollie
Prashant Agarwal
Program Leader, Booking.com
Davide Davolio
Western and Southern Europe Security Specialist, Uber
Initiatives to create a strong and highly skilled workforce capable of confronting emerging cyber threats, as described in the European Cybersecurity Skills Framework.
Learn about the knowledge, abilities, and skills needed for diverse cybersecurity tasks as well as how the framework may assist organizations in identifying and developing these talents within their workforce.
Collaboration between business, academia, and government organizations is essential to fostering innovation and knowledge exchange in the field of cybersecurity and guaranteeing a robust and integrated ecosystem.
Enhancing CyberSecurity Practices Exploration of effective approaches to strengthen cybersecurity, incident response, and organisational resilience.
Minimizing Attack Surface We will discover techniques to reduce the vulnerability of systems and networks through proactive vulnerability management and secure configurations.
Countering Advanced Threats Latest trends and tactics used by cybercriminals, and advanced detection and response techniques for proactive threat mitigation.
Victoria van Roosmalen
CISO & DPO, Coosto
Antanas Kedys
CISO, Nexpay
Lorena Carthy-Willmot
Digital Forensics & Cyber Security, East Police District Norway
SCADA Attacks Uncover vulnerabilities within IoT and SCADA systems and learn strategies to enhance their security.
Strengthening OT Security Security of operational technology (OT) within IoT environments, safeguarding critical operational infrastructure and connected devices
Shadow IT Impact on OT Addressing the risks of unauthorized devices and applications in OT environment
Lyzia van Iterson
Information Security Manager, LKQ Europe
Roelof Kroon
Corporate Information Security Officer, Alfen
Patrick Ghion
Head Regional Cyber Competence Centres, Western Switzerland (RC3) at State of Geneve
• As cloud computing increasingly becomes a crucial element in modern business operations, organizations are aware of the imperative need to prioritize the security of their cloud infrastructure. However, we are now taking the next step as the necessity of multi-cloud environments introduces a fresh set of challenges and considerations.
• During this session, we will delve into the significance of securing multi-cloud environments and learn strategies how to mitigate risks, enhance resilience, and ensure robust cybersecurity in this dynamic landscape.
• The next frontier of cloud security and the future of cyber security is in multi-cloud environments.
Cyber insurance market is ever growing as the cybers threat landscape. It is predicted that the cyber insurance market is expected to grow exponentially, almost doubling in size in the next five years. Which indicates that it will be an integral part of the cybersecurity industry.
Insurance policies, are they adequate or it needs to be changed?
Do we need to reconsider systematic risk in order to unlock capacity?
What are the key drivers of cyber insurance?
What does the future of different organisations look like with cyber insurance and without insurance?
Jack Krul
CISO, Exact
Juan Diego Nocua Gualdron
CISO, Artsen zonder Grenzen Nederland
Daniela Almeida Lourenço
CISO, Tinka
Dr Martjin Dekker
Global Chief Information Security Officer, ABN AMRO Bank N.V.
NIS2 – To respond to the growing threats posed with digitalisation and the surge in cyber-attacks, the European Commission has introduced the NIS2 Directive in order to strengthen the security requirements, address the security of supply chains, streamline reporting obligations, and introduce more stringent supervisory measures and stricter enforcement requirements, including harmonised sanctions across the EU. Will you be ready?
DORA – The Digital Operational Resilience Act solves an important problem in the EU financial regulation. But only from the perspective of regulators. Is your financial institution able to satisfy all the requirements for the protection, detection, containment, recovery and repair capabilities against ICT-related incidents? What should you do to fully implement it by 2025.?
17:10
Gadgets
17:30
Official Dinner Banquet
Delegates
VOLVO
CISO
ING Bank
Product Owner
SpareBank
CISO
DNB Bank
Head of IT security
Booking.com
Program Leader
SpareBank
CISO
Einride
CISO
ING Bank
Product Owner
Booking.com
Program Leader
Bravida
CISO
ING Bank
Product Owner
SpareBank
CISO
VOLVO
CISO
Bravida
CISO
Booking.com
Program Leader
VOLVO
CISO
ING Bank
Product Owner
Booking.com
Program Leader
SpareBank
CISO
Bravida
CISO
ING Bank
Product Owner
VOLVO
CISO
SpareBank
CISO
Bravida
CISO
Booking.com
Program Leader
VOLVO
CISO
ING Bank
Product Owner
DNB Bank
Head of IT security
SpareBank
CISO
Booking.com
Program Leader
Einride
CISO
SpareBank
CISO
ING Bank
Product Owner
Booking.com
Program Leader
Bravida
CISO
ING Bank
Product Owner
VOLVO
CISO
SpareBank
CISO
Bravida
CISO
Booking.com
Program Leader
Booking.com
Program Leader
Bravida
CISO
ING Bank
Product Owner
VOLVO
CISO
SpareBank
CISO
VOLVO
CISO
ING Bank
Product Owner
SpareBank
CISO
Bravida
CISO
Booking.com
Program Leader
Grand Hotel Huis ter Duin in Noordwijk, with a history dating back 135 years, is a leading name in the Dutch hospitality industry. On top of the Noordwijk’s dunes the majestic Grand Hotel is located directly on the beach with stunning views across the North Sea.
Grand Hotel Huis ter Duin is the No 1 preferred place for diginities and executives to stay at and do business whilst in Amsterdam.
Free Subscription
The most comprehensive Cybersecurity agenda for leading industry executives
Connect and share niched and unique knowledge
Meet our 15-year experience in addressing international cybersecurity challenges