The C-Suite Editions

The most exclusive Cyber Security events in the world.

What is
NEXT IT Security?

Next IT Security brings together C-Level cybersecurity decision makers for a day of expert-led discussions on the most current security challenges. This event provides an invaluable opportunity to explore the latest developments in cybersecurity.

Expert-led discussions

We invite the best and brightest in the industry to share their knowledge and insights on cybersecurity. The event is curated by our team of experts who are also speakers at the event.

Meet like-minded people

Next IT Security provides attendees with an opportunity to network with other professionals who have similar interests in cybersecurity. Attendees can also find potential employers or employees for their company.

Learn about new Trends

Next IT Security features keynote speeches from renowned speakers on hot topics such as malware and ransomware prevention and mitigation, mobile security, cloud security etc.

A day of networking

We have an abundance of networking opportunities with our break out sessions and informal round tables which allow you to meet like-minded people. You’ll never struggle for conversation again!

Upcoming Events

20232024

Keynotes

We are delighted to introduce some of our expert speakers in cyber security. Our speakers are distinguished professionals in the field, with years of experience and a passion for sharing their knowledge.

keynote

Magnus Carling

CISO
Stena AB

I'm a versatile manager with experience in the IT business since 1995. My experience range from network engineering and server management, to IT-management frameworks and information security management. IT and security has been part of my life for a long time and I enjoy the potential IT unlock in both humans as well as enterprises - as long as it is secure.

Most of my spare time I spend with my family and friends. I like to try new recipes, barbecue, explore new and old wines, go snowboarding whenever I can, run and write.

Writing is a big part of my life and I write stories that are everything but ordinary.

keynote

Jacqueline Johnson

CISO
Energienet (Danish Energy Grid)

During my 20+ years in the security sector I have a good feeling about what works in practice and gives results and what doesn’t. The part that engages me most is integration of technical security with legal and financial aspects as well as people’s behavior.

Core skill is CISO work and guiding board members and executives about cybersecurity, operational resilience and business assurance.

Also advice on regulations, directives and practices for the financial services and energy sector.

keynote

Monika Kullberg

Security Culture & Awareness Manager
Sandvik

Psychologist with 20 years of experience in leadership, behavior and organizational transformation. Certified in Organizational Behavior Management. Introduced behavior change model in cybersecurity to H&M Group, is now Manager of Security Culture at Sandvik Group. Previously Vice-President for Doctors without Borders, Brussels. Nominated for Sweden's most prestigious psychology award, Stora Psykologpriset.

keynote

Filip Nowak

Global Head of Cyber Defence
Ferrero

Filip Nowak's extensive expertise and MBA qualification uniquely position him as an exceptional speaker for the Supply Chain discourse. His substantial experience in Procurement and Supply Chain Management reflects a deep grasp of the complexities and challenges inherent in this domain. With a strategic outlook, he excels in optimizing supply chain operations, offering insights into bolstering resilience, managing risks, and fostering collaborative ties throughout the supply chain network. Filip's profound knowledge holds the potential to provide illuminating viewpoints, empowering businesses to navigate the intricacies of contemporary supply chain landscapes with confidence and competence.

keynote

Magnus Carling

CISO
Stena AB

I'm a versatile manager with experience in the IT business since 1995. My experience range from network engineering and server management, to IT-management frameworks and information security management. IT and security has been part of my life for a long time and I enjoy the potential IT unlock in both humans as well as enterprises - as long as it is secure.

Most of my spare time I spend with my family and friends. I like to try new recipes, barbecue, explore new and old wines, go snowboarding whenever I can, run and write.

Writing is a big part of my life and I write stories that are everything but ordinary.

keynote

Jacqueline Johnson

CISO
Energienet (Danish Energy Grid)

During my 20+ years in the security sector I have a good feeling about what works in practice and gives results and what doesn’t. The part that engages me most is integration of technical security with legal and financial aspects as well as people’s behavior.

Core skill is CISO work and guiding board members and executives about cybersecurity, operational resilience and business assurance.

Also advice on regulations, directives and practices for the financial services and energy sector.

keynote

Monika Kullberg

Security Culture & Awareness Manager
Sandvik

Psychologist with 20 years of experience in leadership, behavior and organizational transformation. Certified in Organizational Behavior Management. Introduced behavior change model in cybersecurity to H&M Group, is now Manager of Security Culture at Sandvik Group. Previously Vice-President for Doctors without Borders, Brussels. Nominated for Sweden's most prestigious psychology award, Stora Psykologpriset.

keynote

Filip Nowak

Global Head of Cyber Defence
Ferrero

Filip Nowak's extensive expertise and MBA qualification uniquely position him as an exceptional speaker for the Supply Chain discourse. His substantial experience in Procurement and Supply Chain Management reflects a deep grasp of the complexities and challenges inherent in this domain. With a strategic outlook, he excels in optimizing supply chain operations, offering insights into bolstering resilience, managing risks, and fostering collaborative ties throughout the supply chain network. Filip's profound knowledge holds the potential to provide illuminating viewpoints, empowering businesses to navigate the intricacies of contemporary supply chain landscapes with confidence and competence.

How to embrace and handle the upcoming Artificial Intelligence development In this session, you'll discover AI's cybersecurity risks, capabilities, and defense strategies. Gain insights into the evolving AI landscape, learn to defend against AI-driven threats, and promote responsible AI usage. See you on Next IT Security.

The value of having experienced CISO with a lawyer degree in the age of biggest fines for not being compliant with security regulations. Jacqueline will be a Keynote speaker on the upcoming event 26th of October in Stockholm and here is a teaser of her lecture. Interesting to hear more? Join us and subscribe over this link.

How to embrace and handle the upcoming Artificial Intelligence development In this session, you'll discover AI's cybersecurity risks, capabilities, and defense strategies. Gain insights into the evolving AI landscape, learn to defend against AI-driven threats, and promote responsible AI usage. See you on Next IT Security.

The value of having experienced CISO with a lawyer degree in the age of biggest fines for not being compliant with security regulations. Jacqueline will be a Keynote speaker on the upcoming event 26th of October in Stockholm and here is a teaser of her lecture. Interesting to hear more? Join us and subscribe over this link.

keynote

Dr Martijn Dekker

Global Chief Information Security Officer
ABN AMRO Bank N.V.

As top executive and Chief Information Security Officer at ABN AMRO Bank, Martijn has more than 25 years of experience of driving the security strategy of the organisation. Next to that, he has been teaching and supervising master students for over 10 years at Dutch universities. Since early 2020, he is visiting professor Information Security at the University of Amsterdam, conducting research in the field of information security governance, decision making, security automation and information theory.

keynote

Christina Skouloudi

Cyber Security Officer
Enisa

Christina Skouloudi, an esteemed professional with a versatile background, specializes in design and research at the intersection of architecture and technology. Her innovative approach is rooted in her experience across academia and practice, enabling her to bridge theoretical insights with practical applications. Christina's work encompasses sustainable architecture, digital fabrication, and interactive environments, showcasing her commitment to shaping the built environment through cutting-edge methodologies. Her expertise, creative vision, and commitment to sustainable design make her a valuable contributor to the field of architecture and technology.

keynote

Raviv Raz

Cloud Security Manager
ING Bank

Raviv has pioneered and disrupted several domains in Cybersecurity including: Network

Access Control, Web Behaviour Analytics, Programming Language Processing.

As part of his R&D work in ING he co-founded the CodeFix and PurpleAI innovation

initiatives: reducing false-positive alerts in application security testing and using AI in

offensive security testing.

Specialising in Application Security, Raviv has blogged, lectured, appeared in the news

and released open-source tools used by tens of thousands of hackers.

Including R.U.D.Y that appeared on the TV show Mr. Robot

keynote

Patric J.M. Versteeg

Patric is a visionary executive passionate about revolutionizing information and cybersecurity management. As a dynamic leader, he challenges traditional thinking, driving innovation. Committed to continuous learning, he's at the forefront of the field with a global network of peers. With two decades of experience and numerous certifications, he excels in delivering strategic planning and tailored solutions for secure businesses.

WHY SHOULD YOU JOIN
OUR CONFERENCE

Unique agenda featuring the hottest topics, curated by our CISO community, with decision makers in one room for the entire day, and a limited number of exclusive content contributors.

0 +
Expert Speakers
0 +
Delegates
0 +
Minutes Of Networking

Networking

At Next IT Security, you will have the chance to connect with hundreds of industry professionals from a wide range of sectors and areas across the Nordics

Here, you will have the opportunity to build meaningful relationships with people who have experienced similar struggles and successes in their respective fields.

Networking and forging strategic partnerships are encouraged so that you can leave the event with a wealth of valuable connections.

Next IT Security addresses the evolving landscape of AI in cybersecurity, where the balance between human expertise and AI tools is at the forefront. We delve into crucial topics, from GDPR compliance to fostering a robust cybersecurity culture. Our mission is to equip IT security leaders with tactical insights and a forum for collaboration, ensuring the continuous growth of professionals and organizations in this dynamic field.

Agenda

08:00

Registration

08:15

Power Breakfast

08:55

AI Methods, such as deep fakes and voice cloning, are maximizing the success rates of social engineering by the minute. Many experts worry that the accessibility of generative AI solutions will further democratize and erode the thrust of even worsen political instability. In this presentation, Bas van Erk will delve into the current landscape of hackers’ exploitation of AI for their malicious attacks, while also highlighting other emerging trends that demand our attention.

Bas Van Erk

Director Nordics
SoSafe

09:00

• As an information security leader, you know that your organization is constantly under threat from cyber attacks. But have you considered the potential risks of artificial intelligence?

• Artificial intelligence is quickly becoming a powerful tool for cyber attackers, and without proper understanding of its capabilities and limitations, organizations may be vulnerable to devastating attacks. Additionally, the lack of regulations surrounding AI use lead to ethical concerns.

• As an information security leader, you have a responsibility to protect your organization from these risks. By understanding the capabilities and limitations of AI, you can better defend against potential threats and ensure that your organization stays ahead of the curve.

• Don’t let yourself fall behind in this new era of technology. Attend this session and stay ahead of emerging threats as well as ensure responsible usage within your organization.

Magnus Carling

CISO,
Stena AB

09:25

• Many cybersecurity leaders are struggling to effectively communicate with management boards. Technical terms and jargon make it difficult for their message to be understood.

• This session will give you insight on how other leaders bridge the gap between technical and non-technical departments, establishing best practices for creating a more effective cybersecurity culture. Don’t miss out on the opportunity to improve communication within your organization.

• Establishing an effective cybersecurity culture can make all the difference in protecting your company from potential cyber threats.

• Take control of your organization’s cybersecurity future today by learning your peer’s experience. Improve communication and foster a stronger security culture within your organization.

Elin Ryrfeldt

CISO,
AXFOOD

Jonas Rendahl

CISO,
Aurobay

Mikael Nyman

Head of IT Security,
Länsförsäkringar

Daniel Riddarvinge

Information Security Officer, Saminvest AB

10:00

  • Establishing the need for an identity-driven, consolidated security architecture. 

  • Fine-tuning your SIEM as the best threat detection and response system. 

  • Security and risk posture management: Assessing and mitigating the risks of the prime target, AD right. 

  • Enforcing your organization’s security through CASB. 

Harish Sekar

Senior Technical Evangelist
Manage Engine

10:20

Coffee break and 1-1 meetings

10:50

Tell people not to click a link, pat each other on the back, and ride off into the sunset. If only security awareness training was that simple.

In this session, Javvad Malik, Lead Security Awareness Advocate for KnowBe4, will explain how to take your security awareness to the next level and prevent it from going stale. Changing behaviors and creating a culture of security can only be achieved by adopting the right mindset and techniques. In this session you will learn: Why you need to brand the security department the right way The psychological approach to getting your message across Practical advice on building a strong security culture

Javvad Malik

Lead Security Awareness Advocate,
KnowBe4

11:15

When it Comes to Compliance you need to Juggle with many Regulations

• Are you still using dozens of spreadsheets for managing compliance for IT security and data privacy? It can be overwhelming.

• With so many regulations and standards to comply with, it can be overwhelming to manage it all. But ignoring compliance could lead to serious consequences for your organization.

• Be proactive in managing compliance by hearing best practices and advice on tools for day-to-day operations. Make sure your organization meets all necessary requirements to avoid loss of customer trust, reputation damage, or hefty fines.

• Get ahead of potential problems by attending this session. Ensure your area of responsibility is fully compliant.

Jacqueline Johnson

CISO,
Energienet (Danish Energy Grid)

11:40

• As a cybersecurity leader, you might be concerned about the impact of machine learning and AI on your team’s role in protecting your organization from cyber threats.

• The rise of machine learning and AI has sparked discussions on whether or not humans will be replaced in the cybersecurity field. This session dives deep into this topic and explores both challenges and opportunities that come with the shift towards AI-driven cybersecurity.

• As software development becomes increasingly automated, it’s more important than ever to understand the role of human factor in cybersecurity. This panel uncovers just how crucial human expertise is when it comes to protecting sensitive data from cyber threats.

• Gain valuable insights into the impact of AI on cybersecurity and learn how to leverage human expertise for optimal results. Start preparing for an AI-driven future now.


Moderator:
Robby Coppens

Director, Solutions Engineer Central Europe
Netskope

Johan Nordin

Director of IT & IS,
Extenda Retail

Anders Nørklit Thingholm

Head of Information Security,
DANX Carousel Group

Marcus Küchler

Head of Global IT Security,
Epiroc

Aki Khan

CISO,
WSP I Sverige

12:10

Lunch Break

13:10

When companies embark on their digital transformation journey, the often prioritize two key factors:

  • Leveraging cloud technology for speed and innovation
  • Harnessing the power of the cloud to enhance business value.

However, critical considerations like risk management, exposure reduction, vulnerability mitigation, and fostering collaboration among dev-, sec-, and ops-teams are sometimes relegated to the background. Unfortunately, this lack of attention, combined with a lack of visibility and existing attack vectors, creates a complex cybersecurity landscape Cybercriminals are acutely aware of these vulnerabilities and are continually devising new methods to infiltrate cloud environments. The consequences are far-reaching, resulting in costly disruptions, publicized breaches, loss of trust, and revenue downturns. These incidents have become increasingly prevalent in recent months.

In our presentation, we delve into the Wiz operating model, offering actionable insights, tips, and tricks, as well as real customer experiences and best practices aimed at safeguarding your business. During this session, you will:

    • Grasp the significance of cloud-related risks: Understand what risks in the cloud entail and how hackers exploit them.
    • Explore the new paradigm of cloud security: Learn about the evolving cloud security model and discover how proactive adoption can protect your cloud environments.
  • Demystify cloud security with Wiz: Find out how Wiz democratizes cloud security by providing complete visibility and contextual understanding, allowing you to focus on your core business priorities.

Fredrik Karbing

Security Evangelist,
Wiz

13:35

Are Cybersecurity leaders really the right persons to take over yet another responsibility?  If yes, how do they navigate the GDPR challenges?

With the increasing number of data breaches and legal implications, it’s imperative for businesses to comply with GDPR regulations. Non-compliance can lead to heavy fines, loss of reputation, and even business shutdown. But where do you begin? What are the best practices, pros and cons when you have data protection on your table?

This panel will equip you with updated strategies for data protection, including implementing data minimization and pseudonymization, data privacy agreements, and more.

Join the panel on our journey towards complete GDPR compliance! Learn form your peers on their experiences in meeting GDPR requirements  and ensure your customers’ and employees’ personal data is kept safe. Act by updating your data protection strategies and ensure compliance with privacy regulations.

Bernard Helou

Cybersecurity Manager
Schibsted News Media

Knud Kokborg

Global IT Compliance Manager,
Falck

Scott Melnyk

CISO
Internationella Engelska Skolan

Marianne Hove Solberg

CISO,
SpareBank 1 SMN

14:10

Innovator Keynote

To Be Announced

14:30

Coffee Break & 1-1 meetings

15:00

What can AI bring to security? Learn whether AI can help or hinder security teams as they adapt to an AI world.

Mandy Andress

CISO,
Elastic

15:25

• In today’s rapidly evolving digital landscape, human error and social engineering remain persistent threats to organizational security.

• Let us explore how psychology, communication, collaboration, and behavior design can integrate to mitigate human risk effectively. Discover the profound impact of psychological insights on shaping secure behaviors, cultivating a security-aware culture, and empower employees to become an active line of defense against and social engineering attacks.

• This holistic perspective equips CISOs to navigate board-level discussions on human risk and strategically elevate resilience.
Join us as we examine how this integrated approach can transform human risk mitigation and improve security. 

Monika Kullberg

Security Culture & Awareness Manager,
Sandvik

15:50

Innovator Machine Learning Keynote

To Be Announced

16:10

Leg stretcher and book signing by

Magnus Carling

Author of “Svart kod” trilogy
CISO,
Stena AB

16:15

Modern technologies like cloud computing, Infrastructure as a service (IaaS) and containers, just to name a few, have created a tremendous boost in productivity but at the same they also have increased security challenges. In this operating environment, traditional vulnerability management, intended just as looking at software vulnerabilities / CVEs, is not effective anymore. Modern vulnerability management should focus on managing vulnerabilities beyond traditional scanners: security teams should assess vulnerabilities more comprehensively including infrastructure, applications and cloud.

Today, organizations have far too many security tools: SAST, DAST, IAST, SCA, secrets scanning, container scanning, cloud scanning, penetration testing reports, bug bounty reports and what not. This means too much data to digest: typically, the security team will continuously throw those findings and reports (sometimes in a hard to read format) at the software development and application teams for remediating the issues, with the result that those teams, already understaffed, are overwhelmed with fixing several thousands of vulnerabilities. In addition, the lack of integration and automation between tools further reduces the effectiveness of vulnerability management.

Properly monitoring, prioritizing and remediating vulnerabilities from different sources is a crucial part of an effective vulnerability and threat management strategy. In this session we will see how to turn traditional vulnerability management into efficient continuous and comprehensive threat management thanks to collaboration while leveraging on processes and tools.

Main points:

Traditional vulnerability management challenges

Moving towards a more comprehensive approach

Collaboration as a key to vulnerability management

Emilio Soressi

Business Information Security Officer (BISO) at
Posti Group Suomi Oy

16:50

Contemporary cyber security supply chain risk management practices reflect traditional ideas of lack of trust, survival of the fittest, assume evil, compliance with bureaucracy, or technocentrism. Each and every of those ideas combined or alone lead to short term survival, mistakenly understood as security. The author will shortly describe the problems, but focus mostly on possible alternative objectives and methods for more secure supply chain networks like adaptability, culture over management,  synergism or friendly intel. The presentation will be based on the author’s personal research and practical insights gained from cyber security incidents within casual, software and hardware supply chain incidents.

Filip Nowak

Global Head of Cyber Defence,
Ferrero

18:00

Networking Dinner Cruise and Annual CISO Raffle

Highly Exclusive. Operakällaren’s name dates back to 1787 when it was situated in the cellar under Gustav III’s opera house. History permeates the atmosphere in this heritage property, the most prestigious meeting place in Stockholm, is a house filled with opportunities, inspiration and fantastic networking.

We prepared these hot topics crucial for you just in November 2023 due to the unique BeNeLux cyber landscape including: highly interconnected supply chains, dependance on third party vendors, and the region’s high adoption of multi-cloud which is  the next frontier. All these raise the need for a new cloud security operations model and the need for safeguarding your IoT ecosystems.

In addition,  increased cyber threats during the holiday season impose development of a strong cybersecurity workforce,  with you as a leader of building cyber resilience.

That is why you must stay updated on the latest trends to effectively protect your leadership position and your organization.

Agenda November 2023

Supported by

08:00

Registration

08:30

Seated Working Roundtable Breakfast

09:00

• Are you aware of all the risks posed by third-party vendors to your organisation’s cyber security?

Dr Martijn Dekker

Global Chief Information Security Officer,
ABN AMRO Bank N.V.

09:25

Cyberthreats continue to grow and cybercriminals are getting more sophisticated. Hence, every user of an organisation, regardless of insiders or outsiders, must be authenticated and authorised. In order to help prevent cyberattacks, one must implement zero trust security effectively.

  • What are the fundamental principles of zero trust?
  • Continuous verification and authentication of devices as no device is out of the suspect list.
  • There are so many aspects of the implementation of Zero Trust, e.g: MFA, Data encryption, comprehensive security assessment etc, what works best for your organisation?

Arseny Kapralov

Head of Operational Security,
Mollie

Prashant Agarwal

Program Leader,
Booking.com

Davide Davolio

Western and Southern Europe Security Specialist,
Uber

Nicole van der Meulen

Cyber Security Evangelist,
Europol

10:00

Deepfakes are here, and they are here to stay. And with technology ever advancing, it is no longer a matter of simply knowing what a deepfake is. Organizations need to actively decide how they can utilize them to grow their business, and at the same time defend against the malicious use of this technology. In this session, we’ll look at the evolving role of deepfakes in our lives. We’ll talk about real-world examples, you’ll learn what makes them so special, and how you can protect against deepfakes in general. 

Jelle Wieringa

Security Awareness Advocate,
KnowBe4

10:20

Coffee break & 1-1 meetings

10:50

  • Establishing the need for an identity-driven, consolidated security architecture. 

  • Fine-tuning your SIEM as the best threat detection and response system. 

  • Security and risk posture management: Assessing and mitigating the risks of the prime target, AD right. 

  • Enforcing your organization’s security through CASB. 

Harish Sekar

Senior Technical Evangelist,
Manage Engine

11:15

  • Initiatives to create a strong and highly skilled workforce capable of confronting emerging cyber threats, as described in the European Cybersecurity Skills Framework.
  • Learn about the knowledge, abilities, and skills needed for diverse cybersecurity tasks as well as how the framework may assist organizations in identifying and developing these talents within their workforce.
  • Collaboration between business, academia, and government organizations is essential to fostering innovation and knowledge exchange in the field of cybersecurity and guaranteeing a robust and integrated ecosystem.

Christina Skouloudi

Cyber Security Officer,
Enisa

11:40

Enhancing CyberSecurity Practices
Exploration of effective approaches to strengthen cybersecurity, incident response, and organisational resilience.

Minimizing Attack Surface
We will discover techniques to reduce the vulnerability of systems and networks through proactive vulnerability management and secure configurations.

Countering Advanced Threats
Latest trends and tactics used by cybercriminals, and advanced detection and response techniques for proactive threat mitigation.

Victoria van Roosmalen

CISO & DPO,
Coosto

Antanas Kedys

CISO,
Nexpay

Lorena Carthy-Willmot

Digital Forensics & Cyber Security,
East Police District Norway

dr. Swantje Westpfahl

Director (CEO),
Institute for Security and Safety

12:10

Lunch Break & 1-1 Meetings

13:10

Are you ready for the cloud? Most companies are on the path of digital transformation using the cloud to drive innovation! What about risk, exposure, and vulnerabilities when you adopt these new ways to compose services and applications? In this presentation, we give you a view of the art of possibilities with some actionable tips and tricks around the new cloud security operation model! 

Objectives
1- Get an understanding of what risk means in the cloud.
2- Learn how the new cloud security model works.
3- You will get insights into the art of the possible in contextual cloud security

Frans van Ierland

Cloud Security Craftsman,
Wiz

13:35

SCADA Attacks
Uncover vulnerabilities within IoT and SCADA systems and learn strategies to enhance their security.

Strengthening OT Security
Security of operational technology (OT) within IoT environments, safeguarding critical operational infrastructure and connected devices

Shadow IT Impact on OT
Addressing the risks of unauthorized devices and applications in OT environment

Lyzia van Iterson

Information Security Manager,
LKQ Europe

Roelof Kroon

Corporate Information Security Officer,
Alfen

Patrick Ghion

Head Regional Cyber Competence Centres,
Western Switzerland (RC3) at State of Geneve

Trish McGill

Executive Subject Matter Expert – Cyber Security IT/OT

14:10

Securing the world is a tough challenge and it’s only getting harder as the global threat landscape is perpetually evolving, with new threats and capabilities filling the niche of those that preceded them. In this session, we will take a look at how the capabilities of GenAI can help facing this challenge a little bit easier. We’ll cover the latest key trends in cybersecurity, GenAI, and Cloud Security, and how these can help organizations contribute to a safer, more secure world, one (GenAI) step at a time.

Arno van de Velde

Principal Solutions Architect,
Elastic

14:30

Coffee Break & 1-1 meetings

15:00

Innovator Keynote

To Be Announced

15:25

• As cloud computing increasingly becomes a crucial element in modern business operations, organizations are aware of the imperative need to prioritize the security of their cloud infrastructure. However, we are now taking the next step as the necessity of multi-cloud environments introduces a fresh set of challenges and considerations.

• During this session, we will delve into the significance of securing multi-cloud environments and learn strategies how to mitigate risks, enhance resilience, and ensure robust cybersecurity in this dynamic landscape.

• The next frontier of cloud security and the future of cyber security is in multi-cloud environments.

Raviv Raz

Cloud Security Manager,
ING Bank

15:50

Innovator Keynote

To Be Announced

16:10

Leg stretcher

16:15

Cyber insurance market is ever growing as the cybers threat landscape. It is predicted that the cyber insurance market is expected to grow exponentially, almost doubling in size in the next five years. Which indicates that it will be an integral part of the cybersecurity industry.

  • Insurance policies, are they adequate or it needs to be changed?
  • Do we need to reconsider systematic risk in order to unlock capacity?
  • What are the key drivers of cyber insurance?
  • What does the future of different organisations look like with cyber insurance and without insurance?

Jack Krul

CISO,
Exact

Juan Diego Nocua Gualdron

CISO,
Artsen zonder Grenzen Nederland

Daniela Almeida Lourenço

CISO,
Tinka

Dr Martjin Dekker

Global Chief Information Security Officer,
ABN AMRO Bank N.V.

16:50

NIS2 – To respond to the growing threats posed with digitalisation and the surge in cyber-attacks, the European Commission has introduced the NIS2 Directive in order to strengthen the security requirements, address the security of supply chains, streamline reporting obligations, and introduce more stringent supervisory measures and stricter enforcement requirements, including harmonised sanctions across the EU.
Will you be ready?

DORA – The Digital Operational Resilience Act solves an important problem in the EU financial regulation. But only from the perspective of regulators.
Is your financial institution able to satisfy all the requirements for the protection, detection, containment, recovery and repair capabilities against ICT-related incidents?
What should you do to fully implement it by 2025.?

Patric J.M. Versteeg

17:10

Annual CISO Raffle

17:30

Official Dinner Banquet

Grand Hotel Huis ter Duin in Noordwijk, with a history dating back 135 years, is a leading name in the Dutch hospitality industry. On top of the Noordwijk’s dunes the majestic Grand Hotel is located directly on the beach with stunning views across the North Sea.

Grand Hotel Huis ter Duin is the No 1 preferred place for diginities and executives to stay at and do business whilst in Amsterdam.