{"id":7196,"date":"2024-06-11T08:36:23","date_gmt":"2024-06-11T06:36:23","guid":{"rendered":"https:\/\/heliview.com\/cyber-security-experience\/?page_id=7196"},"modified":"2024-12-05T13:23:30","modified_gmt":"2024-12-05T11:23:30","slug":"programma","status":"publish","type":"page","link":"https:\/\/heliview.com\/cyber-security-experience\/programma\/","title":{"rendered":"Programma"},"content":{"rendered":"
We heten je van harte welkom in ‘t Spant! Bussum. De koffie en thee staat al klaar.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”8:45 – 9:30″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Bekend o.a. als Digitaal Rechercheur van TV-programma Hunted waar hij voortvluchtigen opspoort in Nederland, zal Martijn ons nu door de dag heen leiden.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:30 – 9:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=”.vc_custom_1731490059289{background-image: url(https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/10\/04821243-CSE-XL-header-homepage.png?id=6190) !important;}” el_id=”forrester”][vc_column_inner]
Madelein van der Hout presenteert de voorspellingen voor cybersecurity in 2025 die Forrester heeft een samenvatting samengesteld. Krijg inzicht in de belangrijkste aandachtspunten in trends en beveiligingen volgens analisten en industrie-experts\u00a0voor het komende jaar.<\/p>\n
Forrester’s onderzoeken helpen organisaties om zich voor te bereiden op deze opkomende trends en bedreigingen, zodat zij effectief kunnen plannen en hun cybersecuritystrategie\u00ebn kunnen versterken in 2025.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7233″ img_size=”” css=””][vc_btn title=”9:45 – 10:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Cyber risk is steadily reported to be in the top 3 of critical business risks, but research shows that most companies do not have a proper cyber governance and that their boards lack the cyber expertise to perform due oversight. Regulators around the world are responding by issuing specific requirements as to due cyber governance including requirements as to board oversight, the role & position of CISOs and Board\u2019s cybersecurity knowledge and expertise. These regulations also include provisions involving individual personal accountability and liability of board members. In this session we look at what the new NIS2 and DORA requirements mean for boards and their CISOs, and how they need to step up their game to meet the new regulatory standards. We discuss what constitutes proper cyber governance and how this impacts the current role & position of CISO\u2019s.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6057″ img_size=”” css=””][vc_btn title=”10:15 – 10:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6297″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”4\/6″]
Join this session to learn how to build an effective data management strategy:<\/p>\n
In our talk, we’ll break down the top cybercrime trends to watch so you can stay ahead of the curve with your security team and protect your organisation from attacks. We’ll explore the ever-increasing involvement of AI in cyberattacks, which is changing the game for everyone involved. We’ll look at the double-edged sword of emerging technologies like 5G and quantum computing. We’ll also talk about the rise of hacktivism and the role of cyberattacks in global political tensions, and the evolution of phishing attacks into more complex, multi-channel threats.<\/p>\n
Key takeaways of the session:<\/strong><\/p>\n Join this session and learn the tradecraft of Punk Spider, Famous Chollima and Cozy Bear and how to stop them.<\/p>\n Know them. Find them. Stop them.<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7350″ img_size=”” css=””][vc_btn title=”11:50 – 12:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=”.vc_custom_1731490262908{background-image: url(https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/10\/04821243-CSE-XL-header-homepage.png?id=6190) !important;}” el_id=”madelein”][vc_column_inner] Er zijn slechts 12 plekken beschikbaar, dus meld u snel aan![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7233″ img_size=”” css=””][vc_btn title=”11:50 – 12:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Take-aways: Wat zijn de laatste trends in Ransomware, Leer hoe cybercriminelen onderhandelen, Wat de do’s en don’t zijn mocht je moeten onderhandelen.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7220″ img_size=”” css=””][vc_btn title=”11:50 – 12:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Tijdens deze exclusieve Round Table sessie krijgt u de unieke kans om in een kleine, interactieve setting samen te sparren met experts en vakgenoten. Onder leiding van Renco Schoemaker, een ervaren security-trainer en CISO, verkennen we de impact van deze veranderingen op uw organisatie en gaan we in op concrete stappen die u kunt nemen om compliant te blijven.<\/p>\n Let op, er is slechts een beperkt aantal plaatsen beschikbaar voor deze sessie. Zorg ervoor dat u zich snel aanmeldt om verzekerd te zijn van deelname![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7326″ img_size=”” css=””][vc_btn title=”11:50 – 12:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=”.vc_custom_1731490163097{background-image: url(https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/10\/04821243-CSE-XL-header-homepage.png?id=6190) !important;}” el_id=”evolane”][vc_column_inner] Join this session and learn how to prepare your organisation for the future of cybersecurity including:<\/p>\n\n
\r\n <\/a>\r\n\r\n
Burak Agca<\/a><\/h3>\r\n
Senior Sales Engineer \u2013 Benelux at Crowdstrike<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
Threat hunting insights to outsmart modern adversaries<\/h2>\r\n
Burak Agca, Senior Sales Engineer \u2013 Benelux van Crowdstrike<\/h3> \r\n <\/div>[vc_column_text css=””]The CrowdStrike 2024 Threat Hunting Report unveils the latest tactics of the 245+ adversaries we actively track. This year\u2019s report shows how modern adversaries continue to evolve as they emulate legitimate user behavior \u2014 with 86% of hands-on keyboard attacks by eCrime actors seeking financial gain. They are also expanding their reach to execute cross-domain attacks across clouds, identities, and endpoints.<\/p>\n
Roundtables<\/h2>\r\n
<\/h3> \r\n <\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n <\/a>\r\n\r\n
Madelein van der Hout<\/a><\/h3>\r\n
Senior Analyst van Forrester Research B.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
Round Table: Strategic Actions to Take for 2025<\/h2>\r\n
Madelein van der Hout, Senior Analyst, Forrester Research B.V.<\/h3> \r\n <\/div>[vc_column_text css=””]Hoe kunt u als organisatie anticiperen op de toekomstige ontwikkelingen in cybersecurity? Tijdens deze interactieve sessie, die perfect aansluit op de ochtend-keynote, bespreekt\u00a0Madelein van der Hout\u00a0<\/em>strategische stappen die uw organisatie kan nemen richting 2025.
\nDeze sessie biedt u:<\/p>\n\n
\r\n <\/a>\r\n\r\n
Martijn Hoogesteger<\/a><\/h3>\r\n
Digitaal Rechercheur van Tv-programma HUNTED<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
Interactieve sessie: De eerste 24 uur na de hack\/ onderhandelen met criminelen.<\/h2>\r\n
Martijn Hoogesteger, Digitaal Rechercheur van Tv-programma HUNTED<\/h3> \r\n <\/div>[vc_column_text css=””]Je bent geraakt door Ransomware en er zit niets anders op dan praten met de cybercriminelen die je data gestolen en versleuteld hebben. Wat zeg je? Waar zeg je dat? Hoe krijg je sowieso contact met ze? In deze interactieve sessie sta je in de schoenen van het bestuur van een organisatie die deze vragen zal moeten beantwoorden. Stap voor stap nemen we besluiten om tot het juiste resultaat te komen: de organisatie die weer veilig verder kan opereren. Hoe doe je dat veilig, en kan je deze criminelen eigenlijk wel vertrouwen? Leer dit en meer bij deze sessie!<\/p>\n
\r\n <\/a>\r\n\r\n
Renco Schoemaker<\/a><\/h3>\r\n
Trainer Security & CISO a.i. van TSTC<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
Round Table Sessie: BIO 2.0 \u2013 NIS2, Cbw, ISO 27001, BCM, OT, en ISO 27005<\/h2>\r\n
Renco Schoemaker, Trainer Security van TSTC & CISO a.i. Gemeente Utrecht<\/h3> \r\n <\/div>[vc_column_text css=””]De wereld van informatiebeveiliging staat nooit stil. De komst van BIO 2.0, NIS2, Cbw, ISO 27001, Business Continuity Management (BCM), Operationele Technologie (OT), en ISO 27005 brengt nieuwe eisen, verantwoordelijkheden en uitdagingen met zich mee. Maar wat betekent dit concreet voor organisaties en hoe kunnen ze zich effectief voorbereiden?<\/p>\n
\n
Break-out ronde 3<\/h2>\r\n
<\/h3> \r\n <\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=”cert2connect”][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n <\/a>\r\n\r\n
Mitchell Pompe<\/a><\/h3>\r\n
Cloud Security Professional van Netskope Netherlands B.V<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
The Most Important Shift in Cybersecurity: Embracing SASE, Zero Trust, and AI Governance<\/h2>\r\n
Mitchell Pompe, Cloud Security Professional van Netskope Netherlands B.V<\/h3> \r\n <\/div>[vc_column_text css=””]Discover the dynamic shift we have seen in Cyber Security programmes along with the introduction of new and disruptive technologies.<\/p>\n
\n
\r\n <\/a>\r\n\r\n
Maty Siman<\/a><\/h3>\r\n
CTO\/Co-Founder at Checkmarx<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
Go LLeM : AI and Appsec \u2013 History, Present and Future<\/h2>\r\n
Maty Siman, CTO\/CO-FOUNDER VAN CHECKMARX<\/h3> \r\n <\/div>[vc_column_text css=””]This presentation explores the emerging risks in human-created intelligence and the growing complexities of safeguarding modern AI technologies. As we navigate this evolving landscape, we\u2019ll uncover insights into how these challenges mirror concerns voiced throughout history. From contemporary vulnerabilities to classical literature, we\u2019ll trace the journey of human-created intelligence through centuries of myth, fiction, and reality. By examining these evolving narratives, from ancient cautionary tales to modern security frameworks, we aim to draw lessons that illuminate the path to a more secure and responsible future for AI.<\/em>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7485″ img_size=”” css=””][vc_single_image image=”6911″ img_size=”” css=””][vc_btn title=”12:20 – 12:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=”aon”][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n <\/a>\r\n\r\n