27th – 29th October 2020, teissBenelux2020 | The European Information Security Summit Online
All Session times are Central European Time (CET)
Tuesday 27th October 2020

Cyber and the Board: Security means Business

Presentation

  • Enterprise risk management must be extended to create risk resilience
  • Approaches to managing the changing technological and business landscape
  • Implementing a risk-based approach to managing security as a business issue.
  • Building on a foundation of preparedness that evaluates the threat vectors from a position of business acceptability and risk management

by Steven Durbin, Managing Director, Information Security Forum Show Profile

10:05

Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases

Panel discussion

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this
  • How do security awareness programmes designed for the home differ from those designed for the office?

by Sarah Janes, Specialist in Culture & Behaviours in Security, Layer8 Show Profile

by Zari Haji Rasoul, Sr. Privacy en Security adviseur, Ministerie van Buitenlandse Zaken Show Profile

by Daniel Norman, Senior Solutions Analyst, Information Security Forum Show Profile

10:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

11:00

Session close

11:30

Current developments in cybersecurity and cybercrime in a post-COVID-19 world

Presentation

  • How megatrends such as 5G, AI and Quantum Computing impact the cybersecurity landscape
  • Beyond “quantity and quality of attacks are increasing” – what are the current trends
  • From registering fake websites to large scale fraud – how criminals are already exploiting the global pandemic COVID-19

by Marco Gercke, Founder & Director, Cybercrime Research Institute Show Profile

13:05

Threat trends for 2021 and beyond; Ransomware, data theft and reputational attacks

Panel discussion

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • Changing geo-political context affecting the threat environment for commerce and industry
  • Where is the balance between Detection, Protection and Response?
  • What is driving the current Ransomware trend, and how should Organisations respond?

by Marco Gercke, Founder & Director, Cybercrime Research Institute Show Profile

by Chris Goettl, Senior Director of Product Management, Ivanti Show Profile

13:20

Continuous Vulnerability Management – Striving for a 14 Day SLA

Presentation

  • When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially.
  • Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment.
  • Gain some quick tips on how to execute continuous vulnerability management effectively so you can protect your organization before a threat actor hits.

by Chris Goettl, Senior Director of Product Management, Ivanti Show Profile

14:00

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

14:15

Session close

14:45

Enabling and securing employees in today’s work-from-anywhere world

Presentation

  • Is 2020 the beginning of the end for traditional data centre security stacks?
  • What’s the best way to get visibility and control of remote users’ web and cloud activities?
  • How does a ‘Secure Access Service Edge’ accelerate user mobility and cloud adoption?

by Ross Asquith, Security Transformation Principal, Netskope Show Profile

16:05

Evaluating and minimising information security risks across multi-Cloud estate

Panel discussion

  • Best practice in identifying, mitigating and managing multi-cloud risks – are there fundamental differences for organisations?
  • Shared responsibility model – is it our usage that brings the greatest risk?
  • Developing a consistent organisation view of cloud risks to make well-informed decisions about vendors and services
  • Using a risk framework for measuring multi-cloud risk

by Martijn Nykerk, Global CISO, Randstad Show Profile

by Peter HJ van Eijk, Associate Professor Cyber Security and Cloud, Utrecht University of Applied Sciences Show Profile

by Ross Asquith, Security Transformation Principal, Netskope Show Profile

16:20

Attendee roundtables

Room 1: Netskope Private Access – a modern VPN in a ‘work from anywhere’ world (Demonstration)

Room 2: Layer 8 – minimising information security risks across multi-cloud estates (Demonstration)

Room 3: How to reduce your network & security costs?

Room 4: Netskope Q&A

17:00

Session close

17:30
Wednesday 28th October 2020

Reducing the Data Attack Surface: Overcoming barriers to cyber resilience

Presentation

  • How to securely remove sensitive data at home and on-prem for a remote workforce
  • How to address sensitive data in the cloud (including AWS and Azure public clouds) and overcome data migration “spillage”
  • The disadvantages of physical destruction, reformatting and other data destruction methods and why your current erasure methods might not suffice for both HDDs & SSDs

by Yves Gheeraert, Managing Director, France & Benelux, Blancco Show Profile

10:05

Measuring your organisation’s information security posture – which metrics help you evaluate your posture?

Panel discussion

  • Overcoming communication challenges around communicating the guidelines for measuring and improving your information security posture
  • Data retention, sanitisation and lifecycle – setting a clear structure to measure changes in your information security posture, internally and with vendors
  • What are the challenges of measuring your changing information security posture over time?

by Victoria van Roosmalen, CISO & DPO, Coosto Show Profile

by Yves Gheeraert, Managing Director, France & Benelux, Blancco Show Profile

10:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

11:00

Session close

11:30

The Infosec Colour Wheel: Blending the skills of Development, Red and Blue Teams for a rainbow of multi-disciplinary Security strengths

Presentation

  • What can Developers (Yellow Team), Attackers (Red Team) and Defenders (Blue Team) learn from each other?
  • More importantly, HOW can they learn from each other?
  • Where do these fit into the DevOps and DevSecOps paradigms?

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

13:05

Challenges and pitfalls in the drive to SOC modernisation

Panel discussion

  • Communication and clarity – what is the SOC team responsible for, and for what are they not?
  • The importance of adversary simulation with incident response teams
  • “How do you measure what you don’t know?” – engagement and communication outside of the SOC
  • Moving away from static response plans and tools to improve response

by Greg van der Gaast, Head of Information Security, The University of Salford Show Profile

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluwer Show Profile

by Matthias Maier, Product Marketing Director, Splunk Show Profile

13:20

Security Secrets: Why leading SOC teams have Cloud-y vision

Presentation

  • Why it is key for Security Leaders to understand the business transformation and cloud strategy within your organisation
  • What the future of security operations centres (SOCs) and job roles will look like
  • What it looks like to plan and prepare your SOC for the Cloud

by Matthias Maier, Product Marketing Director, Splunk Show Profile

13:50

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

14:05

Session close

14:30
Thursday 29th October 2020

Combatting cyber risk: enterprise detection and response

Presentation

  • What choices exist for organisations based on specific needs, preferences and existing technology commitments?
  • Insight on how to deliver a programmatic and structured approach to threat detection and response which enables you to gain holistic visibility into threats from different detection tools
  • How by building effective response processes integrated with relevant threat intelligence can help ensure that you prioritise and address the most critical threats.

by Ashish Khanna, Director of Professional Services- EMEA, Verizon Business Show Profile

10:05

Tackling the remote insider threat – effective, human-centric investigation

Panel discussion

  • Ensuring evidence-based visibility into user activity to reduce investigation time
  • Making uncovering the intent of the insider your priority
  • Eliminating a mis-allocation of resources when investigating insider threats
  • Evidence preservation in an “always-on” digital world

by Jeremy Swinfen Green, Editor-in-Chief, teiss Show Profile

by Ashish Khanna, Director of Professional Services- EMEA, Verizon Business Show Profile

10:20

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

11:00

Session close

11:30

The changing needs of the CISO: Moving from hard technical skills to a soft skills focus

Presentation

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

16:05

Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas

Panel discussion

  • Running a risk assurance programme on 3rd party and critical suppliers
  • Reviewing supplier risk assessments – don’t assume they are the same as their pre COVID-19 assessments
  • Effectively establishing whether 3rd parties have minimised the risk of a cyber-attack
  • How much is enough?  And, how do you stop “burning out” your suppliers?
  • What is the end result you’re trying to achieve?

by Quentyn Taylor, Director of Information Security - EMEA, Canon Show Profile

by Jay Moloo, Information Technology & Cyber Security Professional, DB Schenker Show Profile

by Miguel Pieters, Sales Team Leader EMEA, Darktrace Show Profile

16:20

Changing Cyber Landscapes: The Battle of Algorithms

Presentation

  • Paradigm shifts in the cyber-threat landscape
  • Advancements in offensive AI attack techniques
  • How defensive AI can fight back

by Miguel Pieters, Sales Team Leader EMEA, Darktrace Show Profile

17:00

Attendee roundtables

Private rooms for attendees to meet and continue the discussion with the panellists

17:15

Session close

17:45
back to top
teiss logo

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.