CISO Benelux Summit | March 21, 2019 | InterContinental Amstel Amsterdam - Amsterdam, Netherlands

↓ Agenda Key

Keynote Presentation

Visionary speaker presents to entire audience on key issues, challenges and business opportunities

Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee." title="Keynote Presentations give attending delegates the opportunity to hear from leading voices in the industry. These presentations feature relevant topics and issues aligned with the speaker's experience and expertise, selected by the speaker in concert with the summit's Content Committee.

Executive Visions

Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics

Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members." title="Executive Visions sessions are panel discussions that enable in-depth exchanges on critical business topics. Led by a moderator, these sessions encourage attending executives to address industry challenges and gain insight through interaction with expert panel members.

Thought Leadership

Solution provider-led session giving high-level overview of opportunities

Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community." title="Led by an executive from the vendor community, Thought Leadership sessions provide comprehensive overviews of current business concerns, offering strategies and solutions for success. This is a unique opportunity to access the perspective of a leading member of the vendor community.

Think Tank

End user-led session in boardroom style, focusing on best practices

Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard." title="Think Tanks are interactive sessions that place delegates in lively discussion and debate. Sessions admit only 15-20 participants at a time to ensure an intimate environment in which delegates can engage each other and have their voices heard.

Roundtable

Interactive session led by a moderator, focused on industry issue

Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done." title="Led by an industry analyst, expert or a member of the vendor community, Roundtables are open-forum sessions with strategic guidance. Attending delegates gather to collaborate on common issues and challenges within a format that allows them to get things done.

Case Study

Overview of recent project successes and failures

Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions." title="Case Studies allow attending executives to hear compelling stories about implementations and projects, emphasizing best practices and lessons learned. Presentations are immediately followed by Q&A sessions.

Focus Group

Discussion of business drivers within a particular industry area

Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions." title="Focus Groups allow executives to discuss business drivers within particular industry areas. These sessions allow attendees to isolate specific issues and work through them. Presentations last 15-20 minutes and are followed by Q&A sessions.

Analyst Q&A Session

Moderator-led coverage of the latest industry research

Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst." title="Q&A sessions cover the latest industry research, allowing attendees to gain insight on topics of interest through questions directed to a leading industry analyst.

Vendor Showcase

Several brief, pointed overviews of the newest solutions and services

Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences." title="Taking the form of three 10-minute elevator pitches by attending vendors, these sessions provide a concise and pointed overview of the latest solutions and services aligned with attendee needs and preferences.

Executive Exchange

Pre-determined, one-on-one interaction revolving around solutions of interest

Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest." title="Executive Exchanges offer one-on-one interaction between executives and vendors. This is an opportunity for both parties to make key business contacts, ask direct questions and get the answers they need. Session content is prearranged and based on mutual interest.

Open Forum Luncheon

Informal discussions on pre-determined topics

Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch." title="Led by a moderator, Open Forum Luncheons offer attendees informal, yet focused discussions on current industry topics and trends over lunch.

Networking Session

Unique activities at once relaxing, enjoyable and productive

Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive." title="Networking opportunities take various unique forms, merging enjoyable and relaxing activities with an environment conducive to in-depth conversation. These gatherings allow attendees to wind down between sessions and one-on-one meetings, while still furthering discussions and being productive.

 

Thursday, March 21, 2019 - CISO Benelux Summit

8:00 am - 8:45 am

Registration and Networking Breakfast

 

8:45 am - 9:00 am

Welcome Address & Opening Remarks

Presented by:

Sheraz Ali, Founder, Executive Director, European Cyber Resilience Research Network View details

 
 
 

9:00 am - 9:30 am

Share:

Keynote Presentation

Cybersecurity - War Stories From the Trenches

"All men make mistakes, but only wise men learn from their mistakes", an inspiring quote by Winston Churchill. In our daily work, we assist clients who have fallen victim to cybercrime, where cybersecurity has failed to prevent, detect and respond to an attack in time. Never wasting a good crisis, our clients are eager to solve the issues and emerge stronger. In this session, we will share the war stories from the trenches and the mistakes others have made, so that you can learn. You will listen to and discuss firsthand real live experiences from incident responders and cybersecurity experts. You will leave the session with a set of practical tips and a better understanding on how to prevent other organizations mistakes.

Sponsored by:

PwC View details

 
 

Matthijs van der Wel, Director Cyber Forensics, PwC View details

 
 
 

9:35 am - 10:00 am

Executive Exchange

 

Share:

Executive Boardroom

Are the Apps That Run Your Business Also Your Achilles' Heel?

Business critical applications (BCAs) are at the heart of businesses, but not enough is being done to keep them secure. Enterprise resource planning systems (ERPs), Banking Payment Systems and the individual applications that often, but not always, sit under these umbrellas are critical. They are at the centre of operations from HR, payroll and accounting to manufacturing, logistics, inventory management and supply-chain planning. 

Without BCAs, it's hard for hospitals to have medicines, for automakers to source critical components, for retailers to stock stores, for brewers to make beer. But, in spite of them being an obvious target for serious attackers, organisations currently do little to afford them special protection. This session will review CyberArk-sponsored research in eight Western European economies that - troublingly - finds that BCAs are mostly protected by generic cyber defences that don't distinguish between low-value data or services and those that are absolutely essential, potentially undermining the tools that are at the very heart of modern businesses.

Sponsored by:

CyberArk View details

 
 

David Higgins, EMEA Technical Director, CyberArk View details

 
 
 

10:05 am - 10:30 am

Executive Exchange

 

Think Tank

Cyber Security For The Executive Boards: Effectively And Efficiently Securing The Digital Transformation Journey

The Challenge: The estimated cost of cyber-attacks per year is $1 trillion (World Economic Forum, 2018) and increasingly Boards are worried about potential lawsuits and fines from a Cyber breach. In addition, the General Data Protection Regulation (GDPR) now poses fines of up to ?20 million for companies that don't comply with the Regulation, on top of the damage a breach could cause to an organisation's reputation. 

This session will provide the Executive Boards with a briefing to ensure Boards are provided with critical knowledge and understanding of Cyber Security and Information Assurance necessary to improve an organisation's Cyber Resiliency.

Presented by:

Emanuel Tanase, Global CISO, Lombard International View details

 
 
 

10:35 am - 10:45 am

Morning Networking Coffee Break

 

10:50 am - 11:15 am

Executive Exchange

 

Share:

Executive Boardroom

Innovation: Where Design Thinking Meets Traditional Phase Gates

Many companies have difficulty innovating. A typical innovation process falls somewhere between a traditional phase gated approach at one end of the spectrum and modern design thinking at the other end. Neither are perfect, and this talk argues that it is possible to combine the strengths of both to achieve hyper-innovation. 

Takeaways:

  • Insights in to how technology-led innovation works in the phase-gated approach (and doesn't) 
  • Insights in to how modern design thinking is disrupting traditional innovation, but also it's pitfalls 
  • How to tailor your innovation framework to get the best of both worlds

Sponsored by:

NearForm View details

 
 

Damian Beresford, Technical Director, NearForm View details

 
 
 

11:20 am - 11:45 am

Executive Exchange

 

Share:

Think Tank

Next Generation Agile Through Agile Ways of Working and Agile Platforms

Agile is on everyone's agenda but how do you become really agile. What do we mean with agile and how can we achieve this through our way of working and the digital landscape we have. The think tank will discuss current position of the market and the status of digital platforms such as cloud in this.

Presented by:

Pascal Huijbers, CTO, Fujitsu View details

 
 
 

11:50 am - 12:15 pm

Executive Exchange

 

Share:

Thought Leadership

Mobile-centric Zero Trust Security Framework

CIOs and CISOs face three big challenges: 

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud, and endpoints. 
  • Enforce corporate security without impacting the user experience. 
  • Redefine enterprise security strategies to address a perimeter-less environment.

Traditional security models designed on the premise of organizations having a well-defined IT perimeter no longer apply in the perimeter-less world. Passwords based security, which assumed that users operated and accessed business information only form within the enterprise IT perimeter were adequate in the past. But in today's IT environment, where users are accessing information from a variety of untrusted devices, apps, networks, locations, and services - passwords alone are no longer sufficient. It should be no surprise that passwords are still the number 1 cause of data breaches. According to the Verizon Data Breaches Investigations report - 81% of breaches involved weak or stolen passwords. This is because passwords are easily compromised. 

In the reality of today's security world how does an organization protect itself? With a Zero Trust approach and framework to security. Zero trust assumes that bad actors are already in the network and secure access is determined by an "always verify, never trust" approach. Zero trust approach requires that you verify the device, user, apps, networks, and presence of threats before granting access. In addition, you should have on-going enforcement. But with many theories about Zero trust how do you ensure you've taken the right approach. 

Sponsored by:

MobileIron View details

 
 

Alex Mosher, Global VP Solutions, MobileIron View details

 
 
 

12:20 pm - 12:45 pm

Executive Exchange

 

Think Tank

The Drivers for Secure by Design in an Agile World

The 5 critical success factors and the balance shift in Control and Trust (I object against the classic auditor statement: Trust is Good, Control is better in relationship with Secure by Design).

Presented by:

Sjoerd Peerlkamp, CISO, Alliander

 
 

12:45 pm - 1:45 pm

Working Lunch & Panel

Charging Ahead: Speeding Up Transformation Through Disruption

Disruption alters, destroys but also creates value. You realize the need to act once revenue starts to shift, which is happening at a faster pace than most would think. Disruption can be a great thing if you act upon it, but it's a threat if you watch idly. We will discuss how CIOs and CISOs can be proactive and act on disruption by figuring out how to identify, prioritize and respond.

Moderated by:

Sheraz Ali, Founder, Executive Director, European Cyber Resilience Research Network View details

 
 

Panelists:

Tony Rimmer, CSO, Fugro

 

Remco Helwerda, CTO, KPN View details

 
 

Luisella Ten Pierik, CISO, Stedin View details

 
 

Dr. Martijn Dekker, CISO, ABN AMRO View details

 
 
 

1:50 pm - 2:15 pm

Executive Exchange

 

Share:

Executive Boardroom

Cloud Security - It's Not Black and White

Security systems can be complex to implement, however some of them are at least easy to explain - malware is always bad and some web sites are always inappropriate for business. Cloud is different and we need to come from a different angle. Some cloud services may be high risk, but even low risk services can be used in a high risk manner. Our security approach needs to understand content, context and user behaviour to ensure appropriate policies. This presentation reviews current cloud adoption, shares anecdotes about cloud security and makes hard-hitting recommendations on what you need to do. Information from this presentation can be shared back in your organisation to make the case for a comprehensive cloud adoption team to address cloud needs.

Sponsored by:

McAfee View details

 
 
 

2:20 pm - 2:45 pm

Executive Exchange

 

Share:

Think Tank

The Digital Enterprise As Seen By The Enterprise Architect: An Approach to Define your Digital Transformation Strategy

Takeaways:

  1. Forget the buzzword and address what is important: How technology impacts your business operating model 
  2. The benefits of addressing your Digital Transformation through an Enterprise Architect's eyes 
  3. Your digital strategy and your business strategy should be one and the same

Presented by:

Dario Guzman, Chief Enterprise Architect, JACOBS DOUWE EGBERTS View details

 
 

Think Tank

CISO's Got Talent: Finding, Growing & Retaining the Best People

While new technology and solutions can help CISOs make more, faster and better decisions for an organization, nothing will take the place of a highly talented workforce. CISOs need to be great recruiters of talent but even more importantly growing the skills and capabilities of their team providing engaging and challenging opportunities for people. One of the big issues here is what makes people fit for the job? What competences at what level do you need? Currently, there appear a myriad of functions related to cyber security; how to make sense out of this? 

Takeaways: 

  • Several approaches exist to verifying job competencies;  
  • Be specific in what you request for the job. Requiring one basic certification will not solve the job.  
  • It's not just the knowledge, it's also the ability to use that knowledge (skill).

Presented by:

Jan Wessels, ISO, Rabobank View details

 
 
 

2:50 pm - 3:15 pm

Executive Exchange

 

Think Tank

Bringing Down the Barriers


Presented by:

Semeen Akhter, CIO Europe, Unilever

 
 

3:15 pm - 3:25 pm

Afternoon Networking Coffee Break

 

3:30 pm - 3:55 pm

Executive Exchange

 

Think Tank

The Key Role of Security Culture in Innovation & Competition
  • Human factor, the easiest way to attack a system  
  • The User and Customer role in the IT Security ecosystem today 
  • How to develop a positive Corporate Cybersecurity Culture  
  • How to learn to unlearn and develop security agility  
  • Turn the human threat vector into security factor and IT and corporate success

Presented by:

Kay Behnke, CISO, FrieslandCampina View details

 
 
 

4:00 pm - 4:25 pm

Executive Exchange

 

Think Tank

Enabling Supply Chain & Global Trade

Supply chain has been around a long time and often no one understands the journey that products such as sun glasses or fruit happens before you purchase them at the store. Technology today is drastically simplified the supply chain experience. As a result, enabling trade has become a challenge and impossible if we do not improve our processes, invest in technology, and leverage the vast list of new technologies we are getting for us to use.

Digital transformation is one thing, but the possibilities we can have when we fully integrate data, flows or predictive analysis are unmeasurable. This session will cover the future of supply chain and its impact on global trade. 

Presented by:

Rui Pedro Silva, Global Head of Technology Deployment, Maersk Logistics & Services View details

 
 
 

4:30 pm - 5:15 pm

9/11 My Survival

9/11 is a day we will never forget. British BAFTA winning documentary film maker Paul Berriff was in the street beneath the twin towers filming with the New York Fire Department's assistant commissioner when the towers collapsed. Paul was knocked unconscious as the South Tower came down on top of him. He was laying in the debris when 30 minutes later the North Tower also collapsed on him. Paul tells the story of what happened to him, his family, his film crew and others leading up to that terrible event on September 11th 2001. It was a day when Paul had planned for his family to be sightseeing on the roof of the tower at the time the planes struck but, through fate, his plans had to be cancelled at the last minute. This is a dramatic and emotional presentation with film and audio from one of the hijacked planes as well as from those trapped in the towers. Paul tells the minute by minute drama of himself as he arrived under the towers that morning, the collapse and how he miraculously survived with his life and film footage which become some of the most iconic imagery filmed that day.

 

5:20 pm - 5:30 pm

Closing Remarks

Presented by:

Sheraz Ali, Founder, Executive Director, European Cyber Resilience Research Network View details

 
 
 

5:30 pm - 6:30 pm

Summit Happy Hour