Benelux

Amsterdam

November 14, 2024

Media Partners

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Global and Benelux Security Trends For 2025

Negotiation in Ransomware - To Pay or Not to Pay

Shadow IT - Outside CISO’s Visibility

Cloud Security Challenges - From Digitalization To Misconfiguration

Artificial Intelligence in Cybersecurity Practise

Expert Speakers
0 +
Delegates
0 +
Minutes Of Networking
0 +

Keynotes

Jelena Zelenović Matone

CISO at European Investment Bank, Member of World Economic Forum and founding board member and first president of Women4Cyber & Woman Cyber Force
CISO of the year award for 2019, Luxembourg. The Global Cyber Sentinel Award Winner 2020 for immense contribution to cybersecurity domain globally. CISO of the year Europe 2021. Versatile and innovative professional with emphasis on cyber security risk management, policies and procedures creation, IT/IS security, IT Operations, audit, risk mitigation, business process improvement and IT governance. Proven results in building internal and external client relationships, even at government levels for best cybersecurity practices, and driving growth in competitive and ever-changing markets. Proactive in assessing and responding to market and consumer trends. Highly effective at identifying and implementing business process improvements while safeguarding and adding to controls. Skilled at communicating effectively with clients, senior management and colleagues.

Jean-Yves Mathieu

Global Head of Cyber Defence Ferrero
An understanding of security methodologies, best practice and standards (ISO27001/ISO27002, etc…). Experience with solutions and products in the following IT security areas: DLP, data classification, endpoint and network security, data encryption. The management of the risks analysis linked to the information systems. The design of action plans aiming at the improvement of the risk coverage High Level understanding local regulations (CSSF, LSF) and applicability. Project Manager SOC (solution oriented) Privacy by Design, Data Breach, Identity & Access Governance • Business Impact Analysis, BCP-DRP Management & Coordination, • Swift Alliance Access, Olympic & Avaloq, Kleverware, Fircosoft (AML solution) • Sophos Safeguard (encryption solution), Lumension • GFI Languard (vulnerabilities management), • GDPR, CSSF (12/552, 13/554, etc…) • ISO 27001:2013 / 27002 & ISO 27005 / ISO 22301:2012, COBIT

Zsolt Fabian

Group Cybersecurity Lead Byborg Enterprises
Zsolt is a seasoned cybersecurity professional with a career spanning over 15 years. As a Group Cybersecurity Lead, Zsolt has built robust security programs and assembled high-performing teams for some of the world's Top 100 high-traffic websites, technology companies and payment systems. With a dedication to cybersecurity he has significantly contributed to making the digital world a more secure space for everyone. Known for a strategic, data-driven approach, Zsolt's expertise in risk management and incident response has been instrumental in mitigating security threats for businesses of all sizes.

Erik Frambach

CISO Pensioenfonds Rail & Openbaar Vervoer
Making IT work for the business has always been my motto. After I left university with a MSc in biology I put this motto into practice by developing "e-learning software" for the Open University. My interest then shifted towards network architecture and technology, and the Internet and its applications. Information security soon became my specialty. Certifications: CISSP, CISM, ISO 27001 Lead Auditor, CIPP/E. Next stop: CCISO or CCSP. I've participated in many projects involving information security, identity & access management, and IT governance & compliance. Working with businesses both big and small, local and multi-national, profit and non-profit, public and military, loosely managed and tightly regulated, has taught me what works and what doesn't work under specific conditions. My strength lies in applying this expertise and experience to selecting and implementing suitable solutions, in tune with the business.

Edward Asiedu

Senior Principal Security
DataBee by Comcast Technologies Solutions

Edward Asiedu is Senior Principal Security Strategist for Comcast Technology Solutions’ DataBee™ business in EMEA. Edward joined DataBee from Splunk, where he spent nearly seven years in professional services consulting and sales engineering for cybersecurity solutions. He has deep technical expertise and experience working with public and private sector security leaders, advising on both strategy and implementation. 

Alain De Maght

Former CISO/DPO
at Hopitaux Iris Sud Brussels - Senior Lead implementer ISO 27001

IT Director and consultant, 20+ y - international expertise in IT & Data Governance / Enterprise Architecture & Business processes. Willing to join a business/IT transformation team, share knowledge and orchestrate execution with peers. Ensure measurable achievements.

Continuous learner : GDPR, blockchain,... Strives at highlighting and implementing improvement opportunities.

Member of IT Executive Circle, IT Security Boardroom, CIONET, CIO Club, BELTUG, ISACA, IAPP, DPO circle and Cercle de Lorraine.

US and Europe certified private pilot (airplane) - Ground instructor.

Lyzia van Iterson

Cybersecurity Leader
LKQ Europe

Lyzia is a seasoned expert shaping the cybersecurity landscape. Her dynamic insights, as showcased in her works, demonstrate her commitment to fostering digital resilience. With a diverse background and extensive knowledge, she is a driving force in addressing emerging threats and empowering organizations to navigate complex security challenges.

Jack Krul

CISO
Exact

Drawing from an extensive cybersecurity background, Jack Krul stands as a dynamic professional skilled in navigating complex digital landscapes. With a strategic approach, he leverages his rich experience to fortify organizations against evolving cyber threats. His leadership in innovative solutions showcases a commitment to technological excellence, ensuring robust protection in an ever-changing digital realm.

Sümeyra Arda Çirpili

Cyber Security Project Manager
Rabobank

Sümeyra Arda Çirpili is an experienced professional specializing in cybersecurity and digital forensics. She currently serves as a Cybersecurity Specialist at STM, where she focuses on enhancing digital security frameworks and mitigating cyber threats. Sümeyra holds a Master's degree in Cybersecurity from Gebze Technical University and has a robust background in computer engineering. She is dedicated to advancing her expertise in threat intelligence, incident response, and forensic analysis, contributing significantly to the field through her work and continuous learning.

Dr. Martijn Dekker

Global CISO
ABN AMRO BANK

As top executive and Chief Information Security Officer at ABN AMRO Bank, Martijn has more than 25 years of experience of driving the security strategy of the organisation. Next to that, he has been teaching and supervising master students for over 10 years at Dutch universities. Since early 2020, he is visiting professor Information Security at the University of Amsterdam, conducting research in the field of information security governance, decision making, security automation and information theory.

 

Next to his executive- and academic roles, he is member of the advisory board and chair of the ICT subcommittee of CBS (Statistics Netherlands) and member of several advisory boards.

As an experienced leader in cybersecurity, Martijn also enjoys presenting keynotes, lectures and training.

Arnaud Wiehe

Director Information Security
FedEx

Arnaud Wiehe is an author, speaker, consultant, and thought leader in cybersecurity. He has worked in leadership and cybersecurity roles for major global companies, including as a CISO for multiple years. He holds several prestigious cybersecurity certifications, including:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Cloud Security Professional (CCSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Certified Fraud Examiner (CFE)

Throughout his career, Arnaud has demonstrated a strong focus on cybersecurity best practices and keeping current with emerging trends, technologies ,and innovation. He is a graduate of the Singularity University and a member of the Association of Professional Futurists. He is widely respected by his peers as an expert in cybersecurity and IT governance.

Tiago Teles

Head of Advanced Analytics & AI
ABN AMRO BANK

Tiago Teles has 15+ years of cybersecurity leadership experience. He is currently an InfoSec manager at ABN AMRO bank and a cybersecurity lecturer at TIAS Business School. His passion lies in understanding cutting edge technologies and how best to secure them. He is the author of the upcoming book “Emerging Tech, Emerging Threats” (together with author Arnaud Wiehe). He holds an MBA and the CISSP certification.

Steven Furnell

Professor of Cyber Security
University of Nottingham

Prof. Steven Furnell is Professor of Cyber Security in the School of Computer Science at the University of Nottingham. His research interests include security management and culture, usability of security and privacy, and technologies for user authentication and intrusion detection.  He has authored over 390 papers in refereed international journals and conference proceedings, as well as various books, book chapters, and industry reports.  Steve is the UK representative to Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and a board member of the Chartered Institute of Information Security, and a member of the Steering Group for the Cyber Security Body of Knowledge (CyBOK) and the Careers and Learning Working Group within the UK Cyber Security Council.  

Jim Leseman

CISO & COO
Clear.bio

I'm a specialist in personalized nutrition, the ketogenic diet an (intermittent) fasting. Working for the precision nutrition health tech startup The Clear Health Program.

Personal website (Dutch): ketoking.nl

Experienced in Google Marketing Platform (DV360, Analytics, Google Ads), Google Ad Manager (DFP), Adform, Appnexus, Platform161

Methodical consultant with strong analytical skills and a passion for technology, driven to outperform himself on digital marketing and advertising. Has worked for two research agencies, a trading desk, as well as two leading DSPs. Knowledge of other DSPs and ad servers too. International projects taught me how to smoothly run marketing communications projects, to perform up- and cross selling and how to turn (big) data into comprehensible, actionable reports and strategic insights.

In 2010 I have achieved my Master of Science (MSc / Drs.) degree in sociology at VU University Amsterdam. Earlier, I graduated as a Bachelor of Economics (BEc) in media marketing at Inholland University

Consultancy, RTB, programmatic advertising, (big) data, advertising, PPC, social, project management, (key) account management, market/marketing research, brand and communication management, statistical analyses, reporting, big data, methodology, team management.

Roelof Kroon

CISO
Alfen

Roelof is a visionary leader adept at steering transformative projects. With a strategic outlook, he excels in business development, innovation, and seamless technology integration. Roelof's passion for growth and change consistently drives impactful solutions for intricate challenges, making him an invaluable asset to any endeavor.

Amir Vashkover

Head of Data Security
Philips

Amir Vashkover is a seasoned technology leader with vast experience in both operational and leadership roles within the field of Cybersecurity. He currently leads Philips’ Data Security division after a stint as Information & Markets Cyber Security Officer for the EMEA region. Before that, Amir held leadership positions across multiple industries, including roles as CISO, VP of Business development and Product management. He holds a university degree in Electrical & Computer engineering from the Ben-Gurion University, and an MBA from the Bar- llan University in Israel. Prior to his commercial career Amir has served the Israeli Military, up to the rank of Lt. Col (res.) leading large field units.

Jeroen Prinse

CISO
Nationaal Cyber Security Centrum
(NCSC-NL)

He is absolutely passionated about shifting security left and integrating security in DevOps. Facilitating ‘the business’ with secure and compliant by design building blocks, security capabilities like secret management, automated security testing and other services.

Since the mid 90’s he is an ethical hacker and he responsibly discloses vulnerabilities to companies and people in a way they understand. His highly analytical skills enable him to clarify complex problems quickly and come to pragmatic solutions.

He is experienced in the technical and organizational aspects of information security, like (but not limited to): cloud security, secure software development, (automated) security testing, vulnerability management, (web) application security, network security, operational security, Secure DevOps, complex (information security) risk assessments, information security governance, information security management, being compliant with laws and regulations, information security standards and frameworks, identity and access management and writing and implementing information security policies/standards.

Rogier Posthuma

CISO
KIWA N.V.

Over more than 20 years I have accumulated a wide body of security expertise, ranging from Technical IT Security to the organizational side of security, IT risk management and compliance and assurance of Security. The emphasis of my work experience has always been IT security. Over time I have gained Security knowledge and experience including:

  • Cyber Security & IT Security
  • Physical Security
  • IT and Security Risk Management
  • Security Compliance & Assurance
  • Security Governance
  • Security Awareness
  • ISO27001 implementation and certification
  • Cloud Security
  • Identity and Access Management
  • Vulnerability Management
  • Securing high performance and low latency trading infrastructures
  • IT Security in FinTech

Alan Lucas

CISO
Homefashion Group B.V.

A seasoned cybersecurity leader with a strong technical background in cybersecurity software engineering, cyber incident response, security operations, information security management, and cyber threat intelligence, Alan brings over a decade of expertise in the cybersecurity industry.

His technical acumen coupled with a strategic perspective, equips Alan with the comprehensive ability to guide organizations towards enhanced security and resilience. Alan leverages a complete cybersecurity portfolio for tackling all cybersecurity challenges, ensuring a proactive and effective approach to safeguarding organizations, as well as leading software engineering teams to develop secure internal and customer-facing software solutions.

Arno Van de Velde

Principal Solutions Architect
Elastic

Description is being prepared...

Craig Roberts

Field CTO
Rapid7

Craig was the Field CTO and part of the founding team of Noetic Cyber, a company acquired by Rapid7 earlier this year. He is now focussed on Rapid7's attack surface capability, ensuring customers get maximum value from the platform and are feeding back on our Strategy.

Craig has over a decade in cybersecurity working in several roles, supporting customers in building out and running world class security data programs and Security Operations Centers (SOC). He has particular expertise around the Financial Services and Government sectors.

Richard Hensen

Enterprise Solutions Engineer
Wiz

Richard Hensen is a highly skilled Solution Engineer at Wiz Cloud Security, where he plays a pivotal role in designing and delivering cutting-edge cloud security solutions to a global portfolio of clients. With over a 20 years of experience in cybersecurity and cloud infrastructure, Richard specializes in helping organizations secure their cloud environments, ensuring regulatory compliance, and mitigating risks in an increasingly complex digital landscape.

Jonas Gyllenhamma

Senior Solutions Engineer
Censys

Jonas Gyllenhammar is a security IT professional with over two decades of experience in Information Technology and Cyber Security. Jonas is a cyber security technologist, security advocate and business problem solver. Previously he has worked for a variety of industry leading companies including: Sophos, Ivanti, Juniper Networks. In his role with the technology team at Censys, he helps customers uncover threats and vulnerabilities before they become risks.

Javvad Malik

Lead Security Awareness Advocate
KnowBe4

Javvad Malik is the Lead Security Awareness Advocate at KnowBe4 and is based in London. Malik is an IT security professional with over 20 years of experience as an IT security administrator, consultant, industry analyst and security advocate. He is also a multi-award winner and is currently a Guinness World Records holder for the most views of a cybersecurity lesson on YouTube in 24 hours. Malik is passionate about helping people understand the value of cyber security and how every department and individual can play their part. He often educates his audience through blog posts, videos, podcasts and at public speaking events. Malik holds the SACP and CISSP certification.

Partners

Ticket Price

990 €

Have a promo code?
Get your FREE ticket !!!

Apply for The C-Suite Edition

2024


We prepared these hot topics crucial for you just in November 2024 due to the unique BeNeLux cyber landscape including: highly interconnected supply chains, dependance on third party vendors, and the region’s high adoption of multi-cloud which is  the next frontier. All these raise the need for a new cloud security operations model and the need for safeguarding your IoT ecosystems.

In addition,  increased cyber threats during the holiday season impose development of a strong cybersecurity workforce,  with you as a leader of building cyber resilience.

That is why you must stay updated on the latest trends to effectively protect your leadership position and your organization.

Agenda November 2024

08:00

Registration

08:15

Power Breakfast

Let's open the conference with a power breakfast where you will have the opportunity for the first morning networking with colleagues from different industries and a chance to make new acquaintances and exchange business cards.

08:50

Firestarter Digicert

09:00

  • An in-depth overview of the Threat Intelligence-based Ethical Red Teaming (TIBER-EU) framework, designed by the European Central Bank to enhance cyber resilience across the financial sector.
  • Ransomware Attack: A detailed analysis of a recent ransomware attack on a financial institution, demonstrating how TIBER-EU protocols can identify vulnerabilities, mitigate risks, and improve response strategies.
  • Practical recommendations and best practices derived from TIBER-EU implementation experiences, focusing on strengthening defenses, enhancing threat intelligence, and ensuring robust incident response mechanisms.

Jelena Zelenović Matone

CISO at European Investment Bank, Member of World Economic Forum and founding board member and first president of Women4Cyber & Woman Cyber Force

09:25

  • What does being a “business enabler” even mean?
  • Does the (C)ISO have the opportunity and resources to enable business?
  • Do organisational structures and perspectives need to change for business enablement by (C)ISOs?
  • Does a high-profile, customer-facing CISO look distracted from the day job?

Moderator: Edward Asiedu

Senior Principal Security Strategist
DataBee by Comcast Technologies Solutions

Jeroen Prinse

CISO
Nationaal Cyber Security Centrum
(NCSC-NL)

Jim Leseman

CISO & COO
Clear.bio

Erik Frambach

CISO
Pensioenfonds Rail & Openbaar Vervoer

Steven Furnell

Professor of Cyber Security
University of Nottingham

10:00

As organizations navigate the complexities of AI adoption, governance and compliance, and digital transformation, cloud security has become a strategic priority. The challenge is not just safeguarding data but leveraging security investments to unlock business value. In this session with Wiz, we’ll explore proven strategies for aligning cloud security with business objectives to drive ROI, operational efficiency, and innovation. Learn how advancing cloud security maturity can fuel growth, mitigate risk, and deliver a competitive edge in an increasingly digital economy.

Richard Hensen

Enterprise Solutions Engineer
Wiz

10:20

Coffee break and 1-1 meetings

10:50

Why does social engineering work and how can we prevent it? To better understand this age-old question we will delve into the mindset of social engineering attacks, exploring why they work and how we can fight back. We will share insights on using nudges to guide people towards better cybersecurity decisions and emphasise the importance of building a strong cybersecurity culture.

Key takeaways:

  • Understand the mindset and behavioural principles that make social engineering attacks so effective
  • Learn how nudges can be used to encourage better cybersecurity habits
  • Discover the importance of fostering a strong cybersecurity culture within organisations

Javvad Malik

Lead Security Awareness Advocate
KnowBe4

11:15

  1. Increasing Importance of Data Privacy;
  2. Rise of Zero-Trust Architectures and Approach;
  3. Integration of Cybersecurity and Business Strategy;
  4. Cyber Security In The Board Room;
  5. Cyber Resilience – Beyond Cyber Security;
  6. Cybersecurity Priorities in 2025

Sofia Staff Frederiksen

Head of Information Security
Apoteket AB

Jan Öhman

CISO
Polystar OSIX

Jean-Yves Mathieu

CISO
Banque Internationale à Luxembourg

11:40

  • What are some leading edge technologies the leaders on the panel are seeing? 
  • How do they balance the risk of new technologies with the benefits? 
  • Does the consolidation of technology via marketplaces or cloud hyperscalers damage access to innovative technologies?

Craig Roberts

Field CTO
Rapid7

Tiago Teles

Head of Advanced Analytics & AI
ABN AMRO BANK

Dr. Martijn Dekker

Global CISO
ABN AMRO BANK

Arnaud Wiehe

Director Information Security
FedEx

12:10

Firestarter Illumio

12:20

Lunch Break & 1-1 Meetings

13:20

Generative AI has taken the world by storm and we’ve seen this taken up in the realm of Security as well. Let’s go through some of the developments from an organisational and technical perspective on what we can do, what we can’t do, and what forces we have to deal with to leverage this technology in the current world. With real world examples and innovations we’ll also talk about guardrailing these technologies properly so they can be made fit for purpose.

Arno Van de Velde

Principal Solutions Architect
Elastic

13:45

The challenges posed by shadow IT and its impact on the visibility and control of assets are getting bigger.
• The risks associated with unauthorized IT deployments and the potential consequences for organizational security are neglected too often.
• Develop strategy for identifying and mitigating shadow IT risks as well as for enhancing the visibility and control of  your organization’s assets.
• Don’t let shadow IT compromise your organization’s security. Don’t play dead. Join us on this session to gain actionable insights into managing shadow IT and turning it to official IT. This will strengthen your overall cybersecurity posture and make you sleep well at night.

Lyzia van Iterson

Cybersecurity Leader
LKQ Europe

Jack Krul

CISO
Exact

Alain De Maght

Former CISO/DPO
at Hopitaux Iris Sud Brussels - Senior Lead implementer ISO 27001

Sümeyra Arda Çirpili

Cyber Security Project Manager
Rabobank

14:20

This presentation, Emerging Vulnerabilities Every Enterprise Should Know About, examines critical vulnerabilities in internet-connected devices and software. Attendees will learn to assess these threats, with a focus on the risks facing edge and SOHO devices and the common exposure of certain software platforms, particularly Windows. We’ll cover strategies for minimizing attack surfaces, securing the supply chain, and improving detection within attack surface management (ASM) frameworks. Join us to gain essential insights for strengthening your organization’s security posture against evolving threats.

Jonas Gyllenhamma

Senior Solutions Engineer
Censys

14:45

Firestarter Teleport

14:55

Coffee Break & 1-1 meetings

15:25

Malcolm Larri, Host of the Next IT Security conferences will provide you with the history of Next IT Security. How everything started, what is the mission statement, and as well the plans for expansion for 2025.

Malcolm Larri

Host of
Next IT Security

15:35

98% of organizations have experienced a breach via a third-party. This talk will explore the challenges of integrating and managing third-party services in today’s SaaS-dominated environment. We will discuss practical strategies for effective due diligence, overcoming false security assurances, questionnaire exchanges and fairy tales often provided by vendor documentation. We are going to look forward to how the evolving regulatory requirements are shaping this domain. The session aims to arm CISOs and business leaders with actionable insights for enhancing third-party risk management, ensuring both operational resilience and compliance.

  • Due Diligence Realities: Examine the challenges and limitations of current due diligence practices in revealing true third-party risks and the steps to enhance the process.
  • Lifecycle Management: Strategies for managing the lifecycle of third-party relationships, from onboarding to offboarding, to prevent security breaches despite vendor security assurances.

Impact of Regulations: Analyze how recent regulatory changes are reshaping organizational strategies for third-party risk management and what measures can be taken to comply.

Zsolt Fabian

Group Cybersecurity Lead
Byborg Enterprises

16:00

AI: A potential paradise alley for cybersecurity advancements, promising enhanced threat detection, automated response, and efficient risk mitigation.

The road to a dystopian future: Concerns arise regarding AI’s susceptibility to manipulation, biases, and unintended consequences, posing new security challenges.

Balancing innovation with caution: Embracing AI in cybersecurity requires careful consideration of ethical implications, regulatory frameworks, and proactive risk management strategies.

Team Blue

Jean-Yves Mathieu

CISO
Banque Internationale à Luxembourg

Team Red

Amir Vashkover

Head of Data Security
Philips

16:25

  • Leveraging Cloud Technologies: Explore the critical role of cloud technologies in digital transformation and the unique security challenges they introduce.
  • Multi-Cloud Security Strategies: Understand the security implications of adopting multi-cloud environments and discover effective strategies to safeguard them.
  • Ensuring a Secure Digital Transformation: Gain practical insights into securing your organization’s digital transformation journey, minimizing risks, and maximizing cloud benefits.

Roelof Kroon

CISO
Alfen

Alan Lucas

CISO
Homefashion Group B.V.

Amir Vashkover

Head of Data Security
Philips

Rogier Posthuma

CISO
KIWA N.V.

17:00

The Digital Operational Resilience Act is a EU regulation that financial institutions have to comply with by 17 January 2025. The ideas behind this act are sound and reasonable, but when it comes to implementation, many challenges come up. The journey of a CISO navigating an organization towards compliance is tricky. This presentation will focus on a some of these challenges, and it will offer tips & tricks to avoid potholes and bumps:

  • Scoping the project: translating DORA lingo to business processes and IT systems in a pragmatic way
  • Principle-based articles versus rule-based standards: both are part of the regulation, but they interfere with DORA’s proportionality principle
  • Oversight by regulators: it is still unknown how regulators are going to audit compliance, but some reasonable assumptions can/must be made

Erik Frambach

CISO
Pensioenfonds Rail & Openbaar Vervoer

17:20

Book singing by

Dr. Martijn Dekker

Global CISO
ABN AMRO BANK

Arnaud Wiehe

Director Information Security
FedEx

Tiago Teles

Head of Data Insights and Issue Management
ABN AMRO BANK

17:30

Official Dinner Banquet

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event