Browse the teissAmsterdam2020 agenda and speakers below. Keep checking back as we’re constantly announcing new speakers in the run up to the event.

08:00 Registration and welcome refreshments

Chair’s Opening Remarks

09:00

Current developments in cybersecurity and cybercrime

Plenary keynote

 

by Marco Gercke, Founder & Director, Cybercrime Research Institute Show Profile

09:10

Cyber and the Board: Security means Business

Plenary keynote

by Steven Durbin, Managing Director, Information Security Forum Show Profile

09:30

TBC

Plenary keynote

by Verizon Show Profile

09:50

Evaluating and minimising information security risks across multi-Cloud estate

Plenary panel discussion

  • Best practice in identifying, mitigating and managing cloud risks
  • Developing a consistent organisation view of cloud risks to make well-informed decisions about vendors and services
  • Using a risk framework for measuring multi-cloud risk

by Martijn Nykerk, CISO, Randstad Digital Factory Show Profile

by Marco Gercke, Founder & Director, Cybercrime Research Institute Show Profile

by Kevin Fielder, CISO, Just Eat Show Profile

by Peter HJ van Eijk, Associate Professor Cyber Security and Cloud, Utrecht University of Applied Sciences Show Profile

10:10

11:00 Morning refreshments & networking

What metrics do you use to measure the effectiveness of your internal SOC team?

Roundtable discussion

11:30

How do you plan your cyber incident response exercises?

Roundtable discussion

11:30

Which metrics do you use to measure progress in cultural change?

Roundtable discussion

11:30

Can you recognise burn-out in your information security team, and what strategies do you have to manage this?

Roundtable discussion

11:30

How do you communicate threat intelligence upwards, downwards and outwards?

Roundtable discussion

11:30

How do you involve your supply chain partners in assessing their cyber risk?

Roundtable discussion

11:30

Workshop 1

Workshop

by Netskope Show Profile

11:30

Workshop 2

Workshop

by OneTrust Vendorpedia Show Profile

12:10

12:50 Lunch & networking

Chair’s opening remarks

13:50

The InfoSec Leaders’ Legal Briefing: ePR, GDPR and Data protection changes in global, regional and national jurisdictions

Legal briefing

  • GDPR – Profiling Overview including; Data; Subject; Fundamental Rights
  • Article 22 – Interpretational challenges for sole automated processing
  • What of the future? – identifying risk; working towards more efficient compliance; Privacy by Design and Certification

by David Dumont, Partner, Hunton Andrews Kurth Show Profile

14:00

The changing needs of the CISO: Moving from hard technical skills to a soft skills focus

Case study presentation

 

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

14:20

The Infosec Colour Wheel: Blending the skills of Development, Red and Blue Teams for a rainbow of multi-disciplinary security strengths

Case study presentation

  • What can Developers (Yellow Team), Attackers (Red Team) and Defenders (Blue Team) learn from each other?
  • More importantly, HOW can they learn from each other?
  • Where do these fit into the DevOps and DevSecOps paradigms?

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

14:40

Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases

Panel discussion

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this

by Sarah Janes, Specialist in Culture & Behaviours in Security, Layer8 Show Profile

by Kevin Fielder, CISO, Just Eat Show Profile

by Steven De Best, Data driven security awareness expert, Digitaal Weebaar Show Profile

by Zari Haji Rasoul, Sr. Privacy en Security adviseur, Ministerie van Buitenlandse Zaken Show Profile

15:00

Chair’s opening remarks

13:50

Cloud migration: What are the stages to a implementing a successful strategy?

Case study presentation

  • Is a complete migration a possibility, or is a hybrid cloud setup the best way forward?
  • What are the major reasons for cloud-adoption failing, and how to avoid them?
  • Why end-to-end visibility, monitoring and logging is your most crucial step

by Martijn Nykerk, CISO, Randstad Digital Factory Show Profile

14:00

Password cracking and the future of authentication – the myth behind your “strong” passwords

Case study presentation

  • How companies often mishandle information, rendering even extremely strong passwords absolutely useless
  • The myths behind “randomness” in passwords that take “the lifespan of the universe” to crack
  • A practical example of how a malicious party would go about cracking an entire customer database of passwords, often managing to find seemingly “super strong” passwords in mere hours
  • An overview of how leading tech companies and researchers are thinking about the future of authentication and how to solve these problems
14:20

Changing cyber landscapes: The battle of algorithms

Case study presentation

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI

by Miguel Pieters, Cyber Security Account Executive EMEA, Darktrace Show Profile

14:40

Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas

Panel discussion

  • Which compliance questions reveal the biggest security risks with 3rd parties?
  • Alternative approaches to identifying risk in the supply chain
  • How to work up and down the supply chain to improve information security

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

15:00

15:40 Afternoon refreshments & networking

Communicating strategically to achieve security goals

Case study presentation

  • Seizing strategic communication opportunities
  • Communicating through action to establish your brand
  • The unexpected power of downward communication

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

16:00

Identifying the barriers to improving cyber resilience in your organisation, and how to overcome them

Case study presentation

  • What are the challenges between internal organisational structures?
  • How do you access to the right skills and technology?
  • Leading a shift in mindset from SOC to shared duty
16:20

Unacceptable personal pressure: Strategies to identify and avoid Information Security professional burn-out during the day-to-day and during a crisis

Panel discussion

  • How to recognise burn out in your team and yourself, and ways in which we can reduce the stress of individuals
  • Building a team culture and values, and how your culture influences honesty and openness
  • Align expectations with vulnerability and remembering the forgotten victims of a data breach

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

16:40

Workshop 3

Workshop

by Egress Show Profile

16:00

Threat trends for 2020/21 and beyond; Deep fakes, offensive AI and reputational attacks

Panel discussion

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • Changing geo-political context affecting the threat environment for commerce and industry

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

by Jon Holden, Head of Information Security, Atom Bank Show Profile

16:40

17:10 Drinks reception & networking

back to top
teiss logo

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.