Browse the teissAmsterdam2020 agenda and speakers below. Keep checking back as we’re constantly announcing new speakers in the run up to the event.

08:00 Registration and welcome refreshments

Chair’s Opening Remarks

09:00

Current developments in cybersecurity and cybercrime

Plenary keynote

 

by Marco Gercke, Founder & Director, Cybercrime Research Institute Show Profile

09:10

Cyber and the Board: Security means Business

Plenary keynote

by Steven Durbin, Managing Director, Information Security Forum Show Profile

09:30

TBC

Plenary keynote

by Verizon Show Profile

09:50

Evaluating and minimising information security risks across multi-Cloud estate

Plenary panel discussion

  • Best practice in identifying, mitigating and managing cloud risks
  • Developing a consistent organisation view of cloud risks to make well-informed decisions about vendors and services
  • Using a risk framework for measuring multi-cloud risk

by Martijn Nykerk, CISO, Randstad Digital Factory Show Profile

by Marco Gercke, Founder & Director, Cybercrime Research Institute Show Profile

10:10

11:00 Morning refreshments & networking

What metrics do you use to measure the effectiveness of your internal SOC team?

Roundtable discussion

11:30

How do you plan your cyber incident response exercises?

Roundtable discussion

11:30

Which metrics do you use to measure progress in cultural change?

Roundtable discussion

11:30

Can you recognise burn-out in your information security team, and what strategies do you have to manage this?

Roundtable discussion

11:30

How do you communicate threat intelligence upwards, downwards and outwards?

Roundtable discussion

11:30

How do you involve your supply chain partners in assessing their cyber risk?

Roundtable discussion

11:30

Workshop 1

Workshop

by Netskope Show Profile

11:30

Workshop 2

Workshop

by Egress Show Profile

12:10

Roundtables are repeated at 12:10 – 12:50

12:50 Lunch & networking

Chair’s opening remarks

13:50

Behavioural economics and cognitive bias-driven decision-making: Measuring the impact of your Information Security policies

Case study presentation

  • How your colleagues make mistakes in processing information and planning for the future
  • Does your ‘aggregate bias’ lead you wrongly direct your focus to the wrong individuals?
  • Steps towards identifying and eliminating cognitive bias-driven decision-making
14:00

The Infosec Colour Wheel: Blending the skills of primary Red/Blue Teams to create secondary teams with combined skills and strengths

Case study presentation

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

14:20

Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases

Panel discussion

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this
14:40

Chair’s opening remarks

13:50

Cloud migration: What are the stages to a implementing a successful strategy?

Case study presentation

  • Is a complete migration a possibility, or is a hybrid cloud setup the best way forward?
  • What are the major reasons for cloud-adoption failing, and how to avoid them?
  • Why end-to-end visibility, monitoring and logging is your most crucial step

by Martijn Nykerk, CISO, Randstad Digital Factory Show Profile

14:00

Password cracking and the future of authentication – the myth behind your “strong” passwords

Case study presentation

  • How companies often mishandle information, rendering even extremely strong passwords absolutely useless
  • The myths behind “randomness” in passwords that take “the lifespan of the universe” to crack
  • A practical example of how a malicious party would go about cracking an entire customer database of passwords, often managing to find seemingly “super strong” passwords in mere hours
  • An overview of how leading tech companies and researchers are thinking about the future of authentication and how to solve these problems

by Jake Davis, AKA "Topiary", Security researcher & ethical hacker Show Profile

14:20

Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas

Panel discussion

  • Which compliance questions reveal the biggest security risks with 3rd parties?
  • Alternative approaches to identifying risk in the supply chain
  • How to work up and down the supply chain to improve information security

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

14:40

15:30 Afternoon refreshments & networking

Communicating strategically to achieve security goals

Case study presentation

  • Seizing strategic communication opportunities
  • Communicating through action to establish your brand
  • The unexpected power of downward communication

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

16:00

The changing needs of the CISO: Moving from hard technical skills to a soft skills focus

Case study presentation

 

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

16:20

Unacceptable personal pressure: Strategies to identify and avoid Information Security professional burn-out during the day-to-day and during a crisis

Panel discussion

  • How to recognise burn out in your team and yourself, and ways in which we can reduce the stress of individuals
  • Building a team culture and values, and how your culture influences honesty and openness
  • Align expectations with vulnerability and remembering the forgotten victims of a data breach

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

16:40

Using Artificial Intelligence to identify malicious activity within your network

Case study

  • What is the threat from smart malware and botnets?
  • Where is the intersection between AI, cyber security, and human-computer Interaction?
  • How do we ensure security, privacy and transparency in complex and automated systems?
16:00

Tackling the insider threat – investing in your investigators and using understandable and enforceable policies

Case study presentation

  • Ensuring evidence-based visibility into user activity to reduce investigation time
  • Making uncovering the intent of the insider your priority
  • Eliminating a mis-allocation of resources when investigating insider threats
16:20

Threat trends for 2020/21 and beyond; Deep fakes, offensive AI and reputational attacks

Panel discussion

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • Changing geo-political context affecting the threat environment for commerce and industry

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

by Jake Davis, AKA "Topiary", Security researcher & ethical hacker Show Profile

by Jon Holden, Head of Information Security, Atom Bank Show Profile

16:40

17:10 Drinks reception & networking

back to top
teiss logo

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.