{"id":7196,"date":"2024-06-11T08:36:23","date_gmt":"2024-06-11T06:36:23","guid":{"rendered":"https:\/\/heliview.com\/cyber-security-experience\/?page_id=7196"},"modified":"2024-12-05T13:23:30","modified_gmt":"2024-12-05T11:23:30","slug":"programma","status":"publish","type":"page","link":"https:\/\/heliview.com\/cyber-security-experience\/programma\/","title":{"rendered":"Programma"},"content":{"rendered":"
[vc_row][vc_column][vc_empty_space]
\r\n

<\/h2>\r\n

Dit was het programma van de vorige editie<\/h3> \r\n <\/div>[\/vc_column][\/vc_row][vc_row el_class=”custom-programma”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Volledig programma” tab_id=”1599112684853-8461d187-35b9″][vc_row_inner el_id=”1″][vc_column_inner width=”1\/6″][vc_single_image image=”5256″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Ontvangst en registratie<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n

We heten je van harte welkom in ‘t Spant! Bussum. De koffie en thee staat al klaar.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”8:45 – 9:30″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Martijn\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Martijn Hoogesteger<\/a><\/h3>\r\n

Digitaal Rechercheur van Tv-programma HUNTED<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Opening door de dagvoorzitter<\/h2>\r\n

Martijn Hoogesteger | Dagvoorzitter Cyber Security Experience en Digitaal rechercheur van tv-programma HUNTED<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n

Bekend o.a. als Digitaal Rechercheur van TV-programma Hunted waar hij voortvluchtigen opspoort in Nederland, zal Martijn ons nu door de dag heen leiden.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:30 – 9:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=”.vc_custom_1731490059289{background-image: url(https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/10\/04821243-CSE-XL-header-homepage.png?id=6190) !important;}” el_id=”forrester”][vc_column_inner]

\r\n

Keynotes<\/h2>\r\n

<\/h3> \r\n <\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=”TU”][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Madelein\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Madelein van der Hout<\/a><\/h3>\r\n

Senior Analyst van Forrester Research B.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Forrester Research: de belangrijkste opkomende Cybersecurity Trends voor 2025<\/h2>\r\n

Madelein van der Hout, Senior Analyst bij Forrester Research B.V.<\/h3> \r\n <\/div>[vc_column_text css=””]\n

Madelein van der Hout presenteert de voorspellingen voor cybersecurity in 2025 die Forrester heeft een samenvatting samengesteld. Krijg inzicht in de belangrijkste aandachtspunten in trends en beveiligingen volgens analisten en industrie-experts\u00a0voor het komende jaar.<\/p>\n

Forrester’s onderzoeken helpen organisaties om zich voor te bereiden op deze opkomende trends en bedreigingen, zodat zij effectief kunnen plannen en hun cybersecuritystrategie\u00ebn kunnen versterken in 2025.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7233″ img_size=”” css=””][vc_btn title=”9:45 – 10:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Prof.\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Prof. Lokke Moerel<\/a><\/h3>\r\n

Hoogleraar Global ICT Law en Raadslid Cyber Security Raad<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

What is \u2018due\u2019 cyber governance? The new rules of the game.<\/h2>\r\n

Prof. Lokke Moerel, Hoogleraar Global ICT Law van Tilburg University<\/h3> \r\n <\/div>[vc_column_text css=””]\n

Cyber risk is steadily reported to be in the top 3 of critical business risks, but research shows that most companies do not have a proper cyber governance and that their boards lack the cyber expertise to perform due oversight. Regulators around the world are responding by issuing specific requirements as to due cyber governance including requirements as to board oversight, the role & position of CISOs and Board\u2019s cybersecurity knowledge and expertise. These regulations also include provisions involving individual personal accountability and liability of board members. In this session we look at what the new NIS2 and DORA requirements mean for boards and their CISOs, and how they need to step up their game to meet the new regulatory standards. We discuss what constitutes proper cyber governance and how this impacts the current role & position of CISO\u2019s.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6057″ img_size=”” css=””][vc_btn title=”10:15 – 10:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6297″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”4\/6″]

\r\n

OCHTENDPAUZE MET 1-OP-1 GESPREKKEN OP HET NETWERKPLEIN<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]Verse koffie, thee en een versnapering staan klaar. En de eerste 1-op-1 gesprekken vinden plaats.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”10:45 – 11:15″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=”.vc_custom_1731490091380{background-image: url(https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/10\/04821243-CSE-XL-header-homepage.png?id=6190) !important;}” el_id=”commvault”][vc_column_inner]
\r\n

Break-outsessie ronde 1<\/h2>\r\n

<\/h3> \r\n <\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=”cribl”][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Darren\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Darren Thomson<\/a><\/h3>\r\n

Cybersecurity Executive, VP & CTO van Commvault<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

The Evolving Threat Landscape & The Need For True Cyber Resilience<\/h2>\r\n

Darren Thomson, Cybersecurity Executive, VP & CTO van Commvault<\/h3> \r\n <\/div>[vc_column_text css=””]As the security threat landscape evolves and is fundamentally changed by AI, Cloud Computing, Software Supply Chains and other dynamics, it is time to recognise that IT security alone is not enough to protect our business. The convergence of data protection and security enables true Cyber Resilience. In this session, Darren will describe practical ways to enable maturity in Cyber Resilience.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7337″ img_size=”” css=””][vc_btn title=”11:20 – 11:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Wilfred\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Wilfred van der Linde<\/a><\/h3>\r\n

Senior Solution Engineer van Cribl Netherlands B.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Break-outsessie: Optimize your Data Management Strategy - How to build a Security Data Engine<\/h2>\r\n

Wilfred van der Linde, Senior Solution Engineer van Cribl Netherlands B.V.<\/h3> \r\n <\/div>[vc_column_text css=””]According to IDC, data volumes are growing at 28% CAGR, so in just three years, the total amount of data will double! How are your teams and security tools able to continue collecting, processing, routing, and analysing this data at scale without compromising quality or increasing cost?<\/p>\n

Join this session to learn how to build an effective data management strategy:<\/p>\n