Venue
Virtual Event

What is Qwoted?

Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.

Event Date Tue Dec 1 EST (about 4 years ago)
Location Virtual Event
Region EMEA
Details

When the scientific council for Dutch government policy (the WRR) published its report on cyber readiness in September 2019, it concluded that neither the government nor companies nor society as a whole were well-prepared for large-scale cyber attacks.

Indeed, drawing conclusions from an attack which disabled the Dutch emergency phoneline service, they went so far as to say that there was too much "improvisation and gambling" in dealing with cyber attacks and their consequences.

The key issue it identified was the complex, unmapped interdependencies in both public and private sectors, which creates a problem of visibility that undermines efforts to heighten security.

In its response to the WRR report, the government suggested improvements to the exchange of information on threats and countermeasures. To that end, a joint operational platform is being set up for the NCTV, NCSC, AIVD, MIVD, OM and National Police, which will concentrate on analysing cyber-related incidents and threats. Various ministries are making inventories of possible blind spots, as part of the effort to centralise cybersecurity initiatives and visibility.

Elsewhere in the region, the same issues arise, the same vulnerabilities exist and the same solutions are required: better information sharing, better sector-based coordination, and a more strategic approach overall.

For private sector companies, the challenge is not simply how to adopt a broader risk management approach to information security. Just like governments, their internal silos and technology fragmentation are a fundamental impediment to better cybersecurity.

So, according to Verizon's DBIR this year, basic asset management is still a problem. According to the DBIR, half of all companies are present on seven or more networks. Yet getting visibility into your entire asset footprint and understanding your extended attack surface is crucial.

And COVID and its accelerated digitalisation is making things worse. Cloud assets were involved in 24% of breaches this year, with applications a key issue. 40+% of these breaches came from web apps, rapidly overtaking desktop as the top source of breach. These and other third-party vendors present a real and growing problem for organisations in terms of visibility, complexity and security.

The e-Crime & Cybersecurity Benelux Congress will take place online and will look at how cybersecurity teams, risk management functions and boards are tackling the key issues. As digitalisation goes critical, is this finally the moment at which traditional cybersecurity management has to change?

Strengthening identity and access management
• IDAM is still the Achilles heel of many organisations
• Remote working has thrown a spotlight on IDAM policies and the technologies that can help overstretched cybersecurity professionals tighten up
• What have we learned from the past few months? Have any solutions or strategies proved their superiority?

Speakers

2020 Speakers

Koen van Loo
CIO, Renson

Andrea Foppiani
IT Resilience Manager, Cargill

Johannes Braams
Senior Cybersecurity Advisor, Royal Haskoning DHV

Jeroen Gaiser
Coordinating Cybersecurity Advisor, Rijkswaterstaat

Carol Evrard
Intellectual Property, Technology and Data Protection Associate, Wilson Sonsini Goodrich & Rosati

Wouter Wissink
Senior Principal Risk Engineer Cyber & PI Tech Europe, Chubb

Chris Martin
Security Specialist, Google Cloud Security

Abdelkader Cornelius
Threat Intelligence Analyst, Recorded Future

Rupert Collier
Director of Sales – EMEA and APAC , RangeForce

Jan Tietze
Director Security Strategy EMEA, SentinelOne

Moty Cristal
CEO, NEST

Gal Messinger
Global Head of Security, Signify

Miguel Pieters
Sales Team Leader EMEA, Darktrace

Frederik Weidemann
Chief Technical Evangelist, Onapsis Inc

Ronald Pool
Senior Solutions Engineer, CrowdStrike

Stephen Roostan
VP EMEA, Kenna Security

Dan Burns
Head of Cybersecurity Operations, Next

Justin Shaw-Gray
Account Director, Synack Inc.

Mark Walmsley
CISO, Freshfields Bruckhaus Deringer

Ronald den Braven
SE Manager Prisma Access/SaaS EMEA, Palo Alto Networks

Eva Telecka
Hub Lead for IT Risk Management and Security & Liaison Lead EMEA, Merck & Co.

Daniela Lourenço
Business Information Security Officer, CarNext

Sponsors & Partners

2020 Sponsors

STRATEGIC SPONSORS:
• Beyond Trust
• Crowdstrike
• DarkTrace
• Google Cloud
• Keysight Technologies
• Range Force
• Sentinel One

EDUCATION SEMINAR SPONSORS:
• Cybereason
• Kenna Security
• Onapsis
• Paloalto
• Recorded Future
• Synack

SERIES SPONSORS:
• 2Sec Consulting
• Accellion
• Acensi
• Active Reach
• Acuity
• Agari
• Akamai
• Anomali
• App Gate
• Arcon
• Armor
• Arrow
• Attivo Networks
• Barclaycard
• Bertin
• Beyond Trust
• Bit Defender
• Bit Sight
• Blackfoot
• Blue Cube
• BSecure
• BulletProof
• Bulwark
• Cloud Control
• Pay360
• CCL
• Centrify
• Check Point
• One Payment
• Clearswift
• Cloudflare
• CNS
• Colortokens
• Commissum
• Comsec
• Contrast Security
• Corero
• Cortida
• Crowdstrike
• Cryptomathic
• Cybel Angel
• Cyber Bit
• Cybereason
• Cyber Gate
• Cyberinc
• Cyberknight
• Cyber Sprint
• Cyjax
• Cyclance
• Cymulate
• Cyware
• Cyxtera
• Dark Trace
• Data Divider
• Data Security
• Deep Secure
• Demisto
• Digital Element
• Digital Guardian
• Digital Insights
• Digital Shadows
• Doherty Associates
• Drive Look
• DUO
• Eckoh
• ECSC
• Egress
• Elite AD
• Emt
• Endace
• EQuiniti
• Esentire
• EsEt
• Exabeam
• ExtraHop
• EyeOnID
• Falanx Cyber
• Feedzai
• Fidelis Cybersecurity
• Fire Eye
• Firemon
• Fireware
• Flashpoint
• Forcepoint
• Forescout
• Forseeti
• Fortinet
• Gala Technology
• Garrison
• Gemalto
• Gemserv
• Gigamon
• Glasswall
• Green Method
• Group Labs
• Group IB
• Guardicore
• Hackerone
• Help AG
• Go Anywhere
• IDECSI
• Illumio
• Illusive
• Imperva
• IRM
• Infradata
• Innovative Solutions
• Integrity Scotland
• Intel 471
• Int sights
• Ipswitch
• It Governance
• Jazz Networks
• Juniper
• Kaspersky
• Kenna Security
• Malwarebytes
• Last Pass
• Looking Glass
• Lookout
• Manage Engine
• Mastercard
• McAfee
• Menlo Security
• Micro Focus
• Mimecast
• Mindware
• My1Login
• Netacea
• Netskope
• Nettitude
• Netwrix
• Nominet
• NTT Security
• Nuix
• Okta
• One Login
• One Span
• OneTrust Privacy
• Opswat
• Oracle
• Orange Cyberdefense
• Osirium
• Paladion
• PaloAlto
• Patecco
• PCI Pal
• Pentest People
• Phish Rod
• Pindrop
• PK Ware
• Plural Sight
• Preempt
• Prism Infosec
• Proofpoint
• PGI
• Pulse Secure
• Range Force
• Recorded Future
• Redscan
• Red Sift
• Reversing Labs
• Risk Based Security
• Riskiq
• S21
• Sabsa
• Safer Society Group
• SAI Global
• Sail Point
• Seclore
• Securden
• Secure Works
• Security Metrics
• SRM
• Securrent
• Semafone
• Senseon
• Seven Nine
• Shape
• Shifra
• SI
• Silobreaker
• Silver Lining
• SIRP
• Sophos
• Speik
• Spire
• Splunk
• Stealthbits
• SureCloud
• SVL
• SwimLane
• Synack
• Card Easy
• Sysnet
• Tanium
• Telesoft
• Teneo
• Thales
• The Bunker
• Sans
• Threat Connect
• Lexis Nexis
• Thycotic
• Titus
• Tokenex
• Trapx Security
• Trend Micro
• Tripwire
• Trust wave
• Ultracomms
• Vade Secure
• Vectra
• Venafi
• Veracode
• Verifone
• Virsec
• Wandera
• White Source
• Yubico
• Zimperium
• Zscaler