This was the programma of 2024
How do you translate strategy into implementation? How do you prepare yourself so that you are resilient? Risk, Compliance & Business Continuity. Security Awareness. Legislation and regulations. Threats and opportunities of Artificial Intelligence. Security of complex cloud environments. Data protection and privacy. Incident Response. Technology tracks and security best practices.
Welcome
We would like to welcome you to Postillion Convention Centre Utrecht Bunnik. Parking is free and Bunnik Station is only a 10-minute walk away. In addition, the Kosterijland, Bunnik bus stop is right next to the hotel.
The coffee and tea is ready for you!
Welcome speech and opening by chair Meike de Jong
Meike de Jong, Chair Security Leadership
Dagvoorzitter Meike de Jong opent de dag geheel in stijl. Meike is met haar enthousiasme en jarenlange ervaring als presentator en redacteur de aangewezen persoon om het congres in goede banen te leiden.
Keynote: Security and Governance: Responsible Gen AI in practice
Douwe Groenevelt, Vice President & Deputy General Counsel at ASML
New technologies offer opportunities, but certainly also raise complex issues. Discover how ASML, as a leading organization, deals with the challenges of Generative AI. What does effective internal governance look like? What concerns are there around ethics, information security, privacy and protection of IP, and how are they addressed in practice? What policies are needed for this?
Experience during this presentation (including a live demo) which strategies ASML uses to effectively manage the risks of Gen AI in this rapidly evolving world, and thus arrive at a “Responsible” implementation of Gen AI.
Keynote: BUILDING AN ORGANISATION’S RISK FRAMEWORK AND ENGAGING WITH ITS SENIOR MANAGEMENT
DR. LEILA TAGHIZADEH, Global Head of Cyber Risk & CISO IberoLatAm at Allianz Group
In today’s rapidly evolving digital landscape, most if not all organisations face increasing cyber threats that put their (sensitive) information and (critical) systems at risk. Therefore, organisations must take the necessary steps towards understanding and managing their cyber risk. This can only be achieved by implementing an effective risk management framework. By building a risk framework and governance around it, organisations can ensure resilience and security as they will get a clearer view of their organisation’s risks, as it will involve all layers of their organisations, and it will allow senior management to have a clear overview of the organization’s exposure. Join us as we explore the importance of balancing regulation and cyber risk management in the era of cyber threats.
Morning break at the network square with 1-on-1 conversations
Fresh coffee, tea, fruit water, mineral water and brainfoods are ready for you. The first 1-on-1 conversations take place. In the EventManager you can find your planned conversations.
Break-out 1A: Achieving Cyber Resilience – AI vs AI
Menno Rippen, Principal Sales Engineer - Benelux & Nordics of BlackBerry
The sudden rise in remote work has dramatically increased the number of cyberattacks, successfully due to the sophistication of malware and user environments that have not been able to keep up with the increase in advanced attacks.
Organizations worldwide are struggling to keep up with their security. The urgency is even greater today with the exponential growth of AI-driven malware, while cybersecurity regulations are increasing.
Artificial intelligence and machine learning continue to evolve. But what happens when this technology is used against the most advanced defenses? Can AI-generated malware defeat AI-powered security software? How does Zero Trust apply here?
In this session, learn how to set up an effective defense to achieve cyber resilience.
Break-out 1B: Turning Data into Action: Strategies for Success with Security Data Lakes
Sjoerd de Jong, Sr. Sales Engineer at SentinelOne
In this break-out session, we will discuss how to turn data into action with security data lakes. We will explore the benefits of security data lakes, best practices for implementation, and strategies for getting value from security big data.
We will also share insights and lessons learned from successful security data lake projects and offer practical tips for organizations looking to implement their own security data lake solutions. By the end of the presentation, you will have a deeper understanding of the role of security data lakes in cybersecurity and how to leverage them to improve their security posture.
Break-out 1C: Identity Lifecycle and Governance at the Speed of Business
Joost Koiter, Senior Consultant at FuseLogic
Control over your identities and their access will allow you to safely and securely focus on your core business. Reduce business risks and meet audit and compliance requirements while still maintaining user friendly access processes. This requires modern Identity Governance and Administration (IGA). Traditionally this comes with substantial investments in time, expertise, and technology, making it feasible only for large organizations. And even then, the effort to achieve good IGA levels is often proved to be too difficult still. This is why FuseLogic together with Okta presents a modern approach to IGA. Join us to learn more!
CISOForum 1D: Critical of the NIS2? Do the right thing with it!
Gemma Jansen, CISO, Provincie Noord-Holland
The NIS2 Directive is the EU-wide legislation on cybersecurity and successor to the NIS (NIB/Wbni) from 2016. It provides legal measures to increase the general level of cybersecurity in the EU. In addition, the NIS2 Directive prescribes more of a Duty of Care, Reporting Duty and Supervision. But when exactly are you critical infrastructure? What requirements are set for keeping the supply chain safe? How is management involved and their responsibility and liability addressed?
In this interactive session, led by Gemma Jansen, we will discuss where to start and what you need for that.
CISOForum 1E: AI Leadership and the Impact on Cybersecurity and Business Resilience
Ivana Nikolik, Forbes Council Official Member and mentor at Women in AI Netherlands
In this interactive session, led by Ivana Nikolik, Forbes Council Official Member, Mentor at Women in AI Netherlands and Top Leadership Voice, we will discuss AI Leadership and its impact on cybersecurity and business resilience. Join this session together with your peers and discuss the impact of AI on being a good leader in cybersecurity and business resilience:
- What makes you a good leader with upcoming technologies
- Succes stories about AI-driven data security and privacy
- Integrated machine learning for effective threat detection
- Impact of AI on your role as security leader
Break-out 2A: Hack the brain: Social Engineering Innovations from 2023
Bas van Erk, Director Benelux & Nordics of SoSafe
This session showcases the top 5 cybercrime trends that have been witnessed in 2023 and explaining which psychological factors play a particularly important role in cyber-attacks. The interface between humans and machines remains the number one entry point – more than 85 percent of all attacks start with the human factor. Bas van Erk will detail some innovative approaches to fighting these sophisticated and manipulative types of cybercrimes, as organizations now face an innovative dark economy where cybercrime-as-a-service is the common business model. Tactics are evolving almost by the minute and attackers do not hesitate to use psychological tactics to manipulate our minds.
Break-out 2B: Cyber Recovery: Is your company prepared for a Ransomware attack?
Peter Maes, Sales Engineer & Wim Heijs, Sales Engineer of CommVault Systems
This session focuses on cyber recovery and shows you how to protect yourself against cyber threats such as ransomware. With well-thought-out and tested protection against ransomware incidents, advanced preparation, automated validation and rapid recovery options, regardless of where your data resides.
Discover in this session how you can secure your company data, minimize cyber threats (including early detection) and simplify business continuity.
Break-out 2C: Friday Afternoon 4 o’clock … A CSO story. How BAS saved my weekend
Tiennot van Dilst, CTO of Cert2Connect | CISSP, CEH, CIPP/e, CxCE
What are you going to do? It is Friday afternoon 4 o’clock, just before the weekend. Most of the technical team has already gone home or has a day off. The phone rings and one of the board members calls concerned about an attack that is occurring in the industry.
In this session Tiennot van Dilst, CTO at Cert2Connect and CSO ai at the Hametha, tells how he ended up having a nice weekend on his boat.
Lunch break at the network square and 1-on-1 conversations
An extensive lunch arrangement is ready for you. During lunch there is enough space to have 1-on-1 conversations and network with colleagues.
Break-out 3A: Risk Management & Compliance: 5 Programs to get ahead of DORA and NIS2
Edwin van den Heuvel, Director, Technical Account Management at Tanium
In this session Edwin van den Heuvel, will delve into the key programs that every organization must implement to prepare for upcoming regulations in cybersecurity.
- How to streamline Asset Inventory Management and Visibility
- Enabling Cybersecurity Best Practices and User Awareness
- Strengthening Vulnerability Management and Patching Processes
- Proactive Incident Detection and Rapid Response Strategies
- Real-time Monitoring and Centralized Logging for Enhanced Security
Break-out 3B: Detecting zero-days on day zero with Machine Learning
Michiel Appelman, Senior Solutions Engineer, Cloudflare
As attackers get more numerous and start to get help from ChatGPT and other LLMs, the amount of malicious payloads that bypass our signature-based defenses are increasing. It’s becoming increasingly unrealistic to expect our Security Analysts to keep up with writing effective mitigation rules. In this session you will hear how we are able to turn the tables and leverage ML and AI to detect and prevent zero-days on day zero.
- How attackers are evolving and getting help
- What it takes to train ML models to recognize new attack
- Help to comply with NIS2 by seeing and blocking new threats immediately
- What we can do to make your security analysts more effective
CISOForum 3C: The Human Factor in Cybersecurity
Rick Strijbos, Managing Director of Security Academy
Technology alone can never guarantee total cybersecurity, even though technological developments can of course significantly increase it. People are an important link when it comes to the cybersecurity of your organization, playing both the role of causer of cyber insecurity and that of solver. The ‘human factor’ is therefore one of the pillars of an integrated approach to cybersecurity. How have you organized the human factor in your organization or within your partnerships? Which approach do you choose for an effective cybersecurity policy?
During this interactive session, you will discuss with your peers on the basis of statements. This session will be informally moderated by Rick Strijbos of the Security Academy. The aim of the conversation is to exchange knowledge and experience and to learn from each other’s successes and mistakes in order to subsequently grow together.
CISOForum 3D: Navigating Cybersecurity Storms: Leadership in Times of Crisis
Ad Krikke, CISO executive partner & coach of Gartner Nederland B.V.
In an era where digital threats are evolving and organizations are constantly challenged, effective security leadership is essential. But what happens when the inevitable happens? How do you prepare yourself to be resilient?
In this interactive session, led by Ad Krikke, we will discuss how to lead effectively in times of cybersecurity crisis, with practical tips and strategies that can be applied immediately.
CISOForum 3E: Verder dan de NIS2, in gesprek over DORA
Maikel Ninaber | Director, Cyber and Intelligence (C&I) | Mastercard
The DORA legislation makes it mandatory (and verifiable) for organizations in the financial sector to be operationally resilient. But what does it mean to be operationally resilient and what specific measures do organizations need to take to meet this requirement? The official guidelines will be announced in January 2024.
In this interactive session, Maikel Ninaber will provide an update and we will jointly discuss the consequences of DORA and what exactly that means in practice.
Break-out 4A: Effectively and responsibly harnessing the Power of Cyber AI
Rick Verhagen, Enterprise Account Executive at Darktrace
In today’s interconnected digital landscape, the rapid evolution of Artificial Intelligence poses both unprecedented opportunities and formidable threats to cybersecurity. To effectively defend against AI-driven attacks, organizations must adopt a strategic approach that involves selecting the right AI tools and techniques for specific cybersecurity tasks.
This session will explore the critical importance of matching the right AI to the right challenge. Darktrace will delve into the solutions associated with AI-driven attacked showcasing real examples from their Research and Development centre. You will gain insights into the synergy between human expertise and AI capabilities enabling them to make informed decisions on deploying AI for enhanced security
Break-out 4B: Trust Technologies: A Game Changer for Security & Privacy
Mark van Staalduinen, Trust and Safety Lead of Dutch Blockchain Coalition
Digital trust is a significant change in perspective compared to cybersecurity: protection from the perspective of the asset owners, to trust in digital services and technologies from the perspective of end users and society. Information security and privacy protection are now high on the agenda for every initiative and every (data) collaboration. We regularly find ourselves in seemingly impossible situations in which security and privacy seem to be at odds. Precisely to stimulate innovation within our digital society and given the fact that digital transformation is irreversible, new technologies are being developed, with safeguards that match the existing challenges and expectations: Trust Technologies. During this breakout session, Mark will provide an overview of international developments surrounding technology that can help strengthen digital trust, using practical use cases.
Afternoonbreak at the network square and 1-on-1 conversations
During the lunch break, various snacks, hot and cold drinks are available. The last round of 1-on-1 conversations is now taking place. You can find your planned conversations in the EventManager.
Leadership under extreme circumstances
Marco Kroon | Ridder Militaire Willems-Orde & voormalig leidinggevende Korps Commandotroepen
Marco Kroon, Knight of the Military Order of William and former leader of the Commando Corps, provides insight into what leadership really is and what it means to lead under extreme circumstances during this unique keynote. Using true stories supported by images and sound, he shows that leadership without teamwork, camaraderie and loyalty is pointless. This applies to life-threatening situations, but also in the business world.
Networking drinks
We will end the day in an appropriate manner while enjoying a drink, bitterbal and other snacks. Chat informally with colleagues, professionals, partners and speakers.
Who's speaking?
Curious about who is contributing to the conference and what experience they bring with them? Quickly view the complete overview!