27th – 29th October 2020, teissBenelux2020 | The European Information Security Summit Online
All Session times are Central European Time (CET)
Tuesday 27th October 2020

Host’s welcome

10:00

Cyber and the Board: Security means Business

Presentation

by Steven Durbin, Managing Director, Information Security Forum Show Profile

10:05

Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases

Panel discussion

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this

by Sarah Janes, Specialist in Culture & Behaviours in Security, Layer8 Show Profile

by Zari Haji Rasoul, Sr. Privacy en Security adviseur, Ministerie van Buitenlandse Zaken Show Profile

by Steven Durbin, Managing Director, Information Security Forum Show Profile

10:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

11:00

Session close

11:30

Host’s welcome

13:00

Identifying the barriers to improving cyber resilience in your organisation in a post-COVID-19 world, and how to overcome them

Presentation

  • What are the challenges between internal organisational structures?
  • Ensuring a “security-first” approach to upskilling teams, with on-demand, targeted awareness raising for remote workers
  • What metrics or indicators could be used to assess progress? Mapping your people’s readiness to the risks your organisation face
13:05

Behavioural economics and cognitive bias-driven decision-making: Measuring the impact of your Information Security policies

Panel discussion

  • How your colleagues make mistakes in processing information and planning for the future
  • Does your ‘aggregate bias’ lead you wrongly direct your focus to the wrong individuals?
  • Steps towards identifying and eliminating cognitive bias-driven decision-making
13:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

14:00

Session close

14:30

Host’s welcome

16:00

Cloud migration: What are the stages to a implementing a successful strategy?

Presentation

  • Is a complete migration a possibility, or is a hybrid cloud setup the best way forward?
  • What are the major reasons for cloud-adoption failing, and how to avoid them?
  • Why end-to-end visibility, monitoring and logging is your most crucial step
16:05

Evaluating and minimising information security risks across multi-Cloud estate

Panel discussion

  • Best practice in identifying, mitigating and managing cloud risks
  • Developing a consistent organisation view of cloud risks to make well-informed decisions about vendors and services
  • Using a risk framework for measuring multi-cloud risk

by Peter HJ van Eijk, Associate Professor Cyber Security and Cloud, Utrecht University of Applied Sciences Show Profile

16:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

17:00

Session close

17:30
Wednesday 28th October 2020

Host’s welcome

10:00

Current developments in cybersecurity and cybercrime in a post-COVID-19 world

Presentation

10:05

Threat trends for 2021 and beyond; Deep fakes, offensive AI and reputational attacks

Panel discussion

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • Changing geo-political context affecting the threat environment for commerce and industry
10:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

11:00

Session close

11:30

Host’s welcome

13:00

Changing cyber landscapes: The battle of algorithms

Presentation

  • Paradigm shifts in the cyber landscape and advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI
13:05

Using Artificial Intelligence to identify malicious activity within your network

Panel discussion

  • What is the threat from smart malware and botnets?
  • Where is the intersection between AI, cyber security, and human-computer Interaction?
  • How do we ensure security, privacy and transparency in complex and automated systems?
13:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

14:00

Session close

14:30

Host’s welcome

16:00

The Infosec Colour Wheel: Blending the skills of Development, Red and Blue Teams for a rainbow of multi-disciplinary Security strengths

Presentation

  • What can Developers (Yellow Team), Attackers (Red Team) and Defenders (Blue Team) learn from each other?
  • More importantly, HOW can they learn from each other?
  • Where do these fit into the DevOps and DevSecOps paradigms?

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

16:05

Aligning home-life security and company security: Making your remote colleagues the CISO of their own homes

Panel discussion

  • Instilling the concept that security belongs to everyone in the organisation
  • Focusing on awareness raising for remote workers
  • Rewarding and recognising colleagues who do the right thing for security

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

16:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

17:00

Session close

17:30
Thursday 29th October 2020

Host’s welcome

10:00

Combatting cyber risk: enterprise detection and response in the post-Covid world

Presentation

  • What choices exist for organisations based on specific needs, preferences and existing technology commitments?
  • insight on how to deliver a programmatic and structured approach to threat detection and response which enables you to gain holistic visibility into threats from different detection tools
  • How by building effective response processes integrated with relevant threat intelligence can help ensure that you prioritise and address the most critical threats.
10:05

Tackling the remote insider threat – investing in your investigators and using understandable and enforceable policies

Panel discussion

  • Ensuring evidence-based visibility into user activity to reduce investigation time
  • Making uncovering the intent of the insider your priority
  • Eliminating a mis-allocation of resources when investigating insider threats
10:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

11:00

Session close

11:30

Host’s welcome

13:00

Communicating strategically to achieve security goals

Presentation

  • Seizing strategic communication opportunities
  • Communicating through action to establish your brand
  • The unexpected power of downward communication

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

13:05

Unacceptable personal pressure: Strategies to identify and avoid Information Security professional burn-out during the day-to-day and during a crisis

Panel discussion

  • How to recognise burn out in your team and yourself, and ways in which we can reduce the stress of individuals
  • Building a team culture and values, and how your culture influences honesty and openness
  • Align expectations with vulnerability and remembering the forgotten victims of a data breach

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

13:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

14:00

Session close

14:30

Host’s welcome

16:00

The changing needs of the CISO: Moving from hard technical skills to a soft skills focus

Presentation

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

16:05

Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas

Panel discussion

  • Running a risk assurance programme on 3rd party and critical suppliers
  • Reviewing supplier risk assessments – don’t assume they are the same as their pre COVID-19 assessments
  • Effectively establishing whether 3rd parties have minimised the risk of a cyber-attack

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

16:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

17:00

Session close

17:30
back to top
teiss logo

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.