Agenda


Browse the teissAmsterdam2019 agenda and speakers below. The teissAmsterdam2020 agenda will be released next year

08:00 Registration and welcome refreshments

Chair’s welcome and introduction

by Martin Smith MBE, Chairman & Founder, The Security Company Show Profile

09:00

Internet Organised Crime Threat Assessment – trends for 2019 in cyber-dependent crime

Keynote

  • Key findings in the four crime priority areas
  • The convergence of cyber and terrorism
  • Cross-cutting crime factors, including social engineering
  • Future threats and developments

by Steven Wilson, Head of European Cyber Crime Centre, Europol Show Profile

09:10

Information Security Setup in a decentral global organisation: The roles, tools and partner ecosystem

Keynote

  • Not every company is the same. Large, multi-divisional and global organizations have to handle organizational complexity day-in day-out whilst staying safe and being able to react on cyber attacks.
  • Tom will share out of his 25 year experience in operational and strategic IT roles in large global organizations what his experiences are and how he recommends to approach cyber security in such organisations, especially where the corporate governance might not speak for a maximum of standardization and centralization.
  • Tom will shed light on roles in cyber and information security, rules and processes as well as on partner ecosystems he recommends to build to be able to make the right decisions and react fast and effective

by Tom Linckens, Executive Vice President & Chief Information Officer, Bertelsmann Show Profile

09:30

Cybersecurity & French Enterprises: What does the latest survey of CISOs reveal about attacks, risks and resilience?

Keynote

  • The increasingly decisive impact of cyber-attacks on French enterprises
  • Cloud and IoT: what are the increased risks with digital transformation?
  • Faced with cyber-risks, how are French enterprises developing a cyber-resilience strategy?
  • Three “human” issues for the future: awareness, governance and resources

by Alain Bouillé, President, CESIN Show Profile

09:50

How to build trust, starting with identity

Historically, hub & spoke networks with rigid security boundaries have protected users and applications. In a cloud centric world, users can work anywhere with a wifi/4G connection and access applications in the cloud and physical datacenters. How do we protect users, applications and data from attack? This keynote will cover;

  • How to build trust based on identity.
  • How visibility is key to build a security policy.
  • How to apply a risk based policy to user application access.

by Mark Ryan, Director Product Management, Zscaler Show Profile

10:10

Understanding & managing risk across your digital infrastructure

Keynote

by Ali Neil, Director of International Security Solutions, Verizon Show Profile

10:30

10:50 Morning refreshments & networking

Unlocking the business value of security

Roundtable discussion

  • Does your Security team struggle to gain budget and attention from business executives and board members, until it’s too late?
  • What measures can Security teams use to illustrate value to the business, and position Security as a business enabler?
  • How can you improve your team’s relevance and reputation in your organisation?

by Duncan Brown, Chief Security Strategist - EMEA, Forcepoint Show Profile

11:20 & 12:00

Alternative approaches to recruitment: Attracting and retaining talent from non-traditional routes

Roundtable discussion

by Martin Smith MBE, Chairman & Founder, The Security Company Show Profile

11:20 & 12:00

Are open source developers security’s new front line?

Roundtable discussion

  • How can security teams educate developers on the growing trend of malicious attacks on open source.
  • How can developers step into the role of security, to protect themselves, and the millions of people depending on them?
  • Is DevSecOps just a buzzword, or is it vital to protecting the software supply chain?

by Nick Coombs, Vice President of EMEA North & ROE, Sonatype Show Profile

11:20 & 12:00

Is cyber security training a waste of your budget? Where to focus security education to have the greatest impact

Roundtable discussion

by Kelly van der Woning, CISO, Justitiële Informatiedienst Show Profile

11:20 & 12:00

How do you run your hacking and incident response exercises, and how do these replicate “live” threats?

Roundtable discussion

by Felix Cillessen, CIO, Ziekenhuis Rivierenland Tiel Show Profile

11:20 & 12:00

Zero trust evaluation guide: Securing the modern workforce

Roundtable discussion

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

11:20 & 12:00

How do you encrypt your data? Do you already manage your Encryption keys?

Roundtable discussion

by Peter Menssen, Regional Sales Manager, Digital Identity & Security, Thales eSecurity Show Profile

11:20 & 12:00

12:40 Lunch & networking

The six “critical norms” towards cyber stability – working together to combat intellectual property violations via the Internet, and improving everyone’s Cyber Hygiene

Keynote

  • Building a strengthened multi-stakeholder approach to reduce risks to the stability of cyberspace
  • Enhancing digital cooperation and increase capacity-building efforts by all actors
  • The Paris Call for Trust and Security in Cyberspace and developing common principles for securing cyberspace
  • Responsibilities of key private sector actors in improving trust, security and stability in cyberspace

by Uri Rosenthal, Commissioner, Global Commission on Stability of Cyberspace Show Profile

13:30

Leading Organisational Security Change: Tactics for maintaining and measuring an effective programme

Case study presentation

  • Evolving Security from a technology to a business function
  • Making Security measurable through proper KPIs and SLAs
  • Embedding Security targets into the company and employee performance targets
  • Building co-interested Security alliances throughout the company

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

14:10

Identifying threats in your information supply chain: Do any 3rd party compliance assessments improve your security?

Case study presentation

  • What do compliance checklists really protect?
  • Which compliance questions reveal the biggest security risks with 3rd parties
  • Alternative approaches to identifying risk in the supply chain
  • How to work up and down the supply chain to improve information security

by Victoria van Roosmalen, CISO & DPO, Coosto Show Profile

14:30

How do you measure the impact of your information security and awareness programmes?

Panel discussion

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this
  • Can you measure employees’ emotions about organisational security?

by Luisella ten Pierik, CISO, Stedin Show Profile

by Ivo van Nimwegen, CISO, Siemens Nederland Show Profile

by Sebastiaan Passtoors, Founder, Nation4mi Show Profile

by Kevin McPeake, Eco & BioHacker, CSO, CyberSecurity Culture & Ethics Specialist, Peak Security Show Profile

14:50

A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks

Case study presentation

  • Leveraging AI algorithms to defend against advanced, never-seen-before, cyber-threats
  • How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
  • How to achieve 100% visibility of your entire business including cloud, network and IoT environments
  • Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls

by Timothy De Jong, Account Executive, Darktrace Show Profile

14:10

The Quantum Threat and a three-phase plan to prepare your business today

Case study presentation

  • Bigger keys, QKD, and Post Quantum
  • Being agile when it comes to encryption
  • Quantum key distribution to preserve the integrity and confidentiality of data
  • Post-quantum cryptography for devices, software and networks

by Jaya Baloo, CISO, KPN Show Profile

14:30

External Threats: Emerging trends in 2019, and predictions for 2020 and onwards in cyber criminality

Panel discussion

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • The rise of crypto-jacking and the potential of AI for attack
  • Changing geo-political context affecting the threat environment for commerce and industry

by Jaya Baloo, CISO, KPN Show Profile

by Benjamin Sims, Founder, Tech City Labs Show Profile

by Arnoud Tijssen, Cyber Security Consultant, The Future Group Show Profile

14:50

The Magecart threat and how you can mitigate the risk to your organisation

Case study presentation

  • How did the attacks on Ticketmaster and British Airways happen?
  • Assessing the threat posed by third-party JavaScript
  • How can organisations prevent or mitigate that threat

by Benjamin Sims, Founder, Tech City Labs Show Profile

15:20

15:40 Afternoon refreshments & networking

Risky business? How technology can reduce risk to empower people to share data effectively

Workshop

  • Understand how technologies like machine learning can be used to quantify risk and actually prevent data breaches.
  • Understand how adopting a new risk profile can inform the intelligent application of security measures, like encryption, so all sensitive data is protected.
  • Examine how user frustrations (from both senders and recipients) can be reduced using smart technology that will promote adoption of security technologies.
  • Understand how these approaches will provide wider benefits to organisation, including providing ROI for security spend.
  • Learn how this new security posture can be applied to enhance compliance with key data protection legislation, including GDPR.

by Axel van Drongelen, General Manager – Benelux, Egress Show Profile

16:00

Supercharge security metrics and culture by making CyberSecurity a function of Finance

Case study presentation

  • Why IT Governance isn’t an effective solution and instead promotes a “false sense of security” to the leadership team and shareholders alike, with potentially grave consequences down the road
  • A comparison between two national GSM carriers who had very different beginnings and why they both eventually decided that Cybersecurity is indeed a function of Finance
  • An independent post-mortem analysis of other companies including Yahoo, Equifax, Uber, and what went wrong; and a brief mention of how Schiphol Airport approached this issue and how they responded.
  • What are the few exceptions not to place it in Finance, and then where does it go to in those cases?

by Kevin McPeake, Eco & BioHacker, CSO, CyberSecurity Culture & Ethics Specialist, Peak Security Show Profile

16:50

Hackers! Do we shoot or do we hug?

Workshop

  • The ‘real’ definition of hackers, the way hackers think and work, and how they can be used instead of feared by companies.
  • How bug bounties and the Responsible Disclosure processes can work, but also how they sometimes do not.
  • How can these processes be improved?
  • Opening the door to a safer online world

by Edwin van Andel, CEO, Zerocopter Show Profile

16:00

The updated ePrivacy regulation: What to expect and how to prepare

Legal briefing

  • The background and nature of the e-Privacy Regulation, as well its relationship with the GDPR
  • The status of the negotiations and next steps towards finalisation of the Regulation, as well as the expected timescale
  • The main changes that are expected to be introduced by the e-Privacy Regulation
  • What these changes mean for businesses and how they can prepare for it

by David Dumont, Partner, Hunton Andrews Kurth Show Profile

16:50

17:10 Drinks reception & networking

back to top

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.