Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.
Event Date | Tue Dec 1 EST (about 4 years ago) |
Location | Virtual Event |
Region | EMEA |
When the scientific council for Dutch government policy (the WRR) published its report on cyber readiness in September 2019, it concluded that neither the government nor companies nor society as a whole were well-prepared for large-scale cyber attacks.
Indeed, drawing conclusions from an attack which disabled the Dutch emergency phoneline service, they went so far as to say that there was too much "improvisation and gambling" in dealing with cyber attacks and their consequences.
The key issue it identified was the complex, unmapped interdependencies in both public and private sectors, which creates a problem of visibility that undermines efforts to heighten security.
In its response to the WRR report, the government suggested improvements to the exchange of information on threats and countermeasures. To that end, a joint operational platform is being set up for the NCTV, NCSC, AIVD, MIVD, OM and National Police, which will concentrate on analysing cyber-related incidents and threats. Various ministries are making inventories of possible blind spots, as part of the effort to centralise cybersecurity initiatives and visibility.
Elsewhere in the region, the same issues arise, the same vulnerabilities exist and the same solutions are required: better information sharing, better sector-based coordination, and a more strategic approach overall.
For private sector companies, the challenge is not simply how to adopt a broader risk management approach to information security. Just like governments, their internal silos and technology fragmentation are a fundamental impediment to better cybersecurity.
So, according to Verizon's DBIR this year, basic asset management is still a problem. According to the DBIR, half of all companies are present on seven or more networks. Yet getting visibility into your entire asset footprint and understanding your extended attack surface is crucial.
And COVID and its accelerated digitalisation is making things worse. Cloud assets were involved in 24% of breaches this year, with applications a key issue. 40+% of these breaches came from web apps, rapidly overtaking desktop as the top source of breach. These and other third-party vendors present a real and growing problem for organisations in terms of visibility, complexity and security.
The e-Crime & Cybersecurity Benelux Congress will take place online and will look at how cybersecurity teams, risk management functions and boards are tackling the key issues. As digitalisation goes critical, is this finally the moment at which traditional cybersecurity management has to change?
Strengthening identity and access management
• IDAM is still the Achilles heel of many organisations
• Remote working has thrown a spotlight on IDAM policies and the technologies that can help overstretched cybersecurity professionals tighten up
• What have we learned from the past few months? Have any solutions or strategies proved their superiority?
2020 Speakers
Koen van Loo
CIO, Renson
Andrea Foppiani
IT Resilience Manager, Cargill
Johannes Braams
Senior Cybersecurity Advisor, Royal Haskoning DHV
Jeroen Gaiser
Coordinating Cybersecurity Advisor, Rijkswaterstaat
Carol Evrard
Intellectual Property, Technology and Data Protection Associate, Wilson Sonsini Goodrich & Rosati
Wouter Wissink
Senior Principal Risk Engineer Cyber & PI Tech Europe, Chubb
Chris Martin
Security Specialist, Google Cloud Security
Abdelkader Cornelius
Threat Intelligence Analyst, Recorded Future
Rupert Collier
Director of Sales – EMEA and APAC , RangeForce
Jan Tietze
Director Security Strategy EMEA, SentinelOne
Moty Cristal
CEO, NEST
Gal Messinger
Global Head of Security, Signify
Miguel Pieters
Sales Team Leader EMEA, Darktrace
Frederik Weidemann
Chief Technical Evangelist, Onapsis Inc
Ronald Pool
Senior Solutions Engineer, CrowdStrike
Stephen Roostan
VP EMEA, Kenna Security
Dan Burns
Head of Cybersecurity Operations, Next
Justin Shaw-Gray
Account Director, Synack Inc.
Mark Walmsley
CISO, Freshfields Bruckhaus Deringer
Ronald den Braven
SE Manager Prisma Access/SaaS EMEA, Palo Alto Networks
Eva Telecka
Hub Lead for IT Risk Management and Security & Liaison Lead EMEA, Merck & Co.
Daniela Lourenço
Business Information Security Officer, CarNext
2020 Sponsors
STRATEGIC SPONSORS:
• Beyond Trust
• Crowdstrike
• DarkTrace
• Google Cloud
• Keysight Technologies
• Range Force
• Sentinel One
EDUCATION SEMINAR SPONSORS:
• Cybereason
• Kenna Security
• Onapsis
• Paloalto
• Recorded Future
• Synack
SERIES SPONSORS:
• 2Sec Consulting
• Accellion
• Acensi
• Active Reach
• Acuity
• Agari
• Akamai
• Anomali
• App Gate
• Arcon
• Armor
• Arrow
• Attivo Networks
• Barclaycard
• Bertin
• Beyond Trust
• Bit Defender
• Bit Sight
• Blackfoot
• Blue Cube
• BSecure
• BulletProof
• Bulwark
• Cloud Control
• Pay360
• CCL
• Centrify
• Check Point
• One Payment
• Clearswift
• Cloudflare
• CNS
• Colortokens
• Commissum
• Comsec
• Contrast Security
• Corero
• Cortida
• Crowdstrike
• Cryptomathic
• Cybel Angel
• Cyber Bit
• Cybereason
• Cyber Gate
• Cyberinc
• Cyberknight
• Cyber Sprint
• Cyjax
• Cyclance
• Cymulate
• Cyware
• Cyxtera
• Dark Trace
• Data Divider
• Data Security
• Deep Secure
• Demisto
• Digital Element
• Digital Guardian
• Digital Insights
• Digital Shadows
• Doherty Associates
• Drive Look
• DUO
• Eckoh
• ECSC
• Egress
• Elite AD
• Emt
• Endace
• EQuiniti
• Esentire
• EsEt
• Exabeam
• ExtraHop
• EyeOnID
• Falanx Cyber
• Feedzai
• Fidelis Cybersecurity
• Fire Eye
• Firemon
• Fireware
• Flashpoint
• Forcepoint
• Forescout
• Forseeti
• Fortinet
• Gala Technology
• Garrison
• Gemalto
• Gemserv
• Gigamon
• Glasswall
• Green Method
• Group Labs
• Group IB
• Guardicore
• Hackerone
• Help AG
• Go Anywhere
• IDECSI
• Illumio
• Illusive
• Imperva
• IRM
• Infradata
• Innovative Solutions
• Integrity Scotland
• Intel 471
• Int sights
• Ipswitch
• It Governance
• Jazz Networks
• Juniper
• Kaspersky
• Kenna Security
• Malwarebytes
• Last Pass
• Looking Glass
• Lookout
• Manage Engine
• Mastercard
• McAfee
• Menlo Security
• Micro Focus
• Mimecast
• Mindware
• My1Login
• Netacea
• Netskope
• Nettitude
• Netwrix
• Nominet
• NTT Security
• Nuix
• Okta
• One Login
• One Span
• OneTrust Privacy
• Opswat
• Oracle
• Orange Cyberdefense
• Osirium
• Paladion
• PaloAlto
• Patecco
• PCI Pal
• Pentest People
• Phish Rod
• Pindrop
• PK Ware
• Plural Sight
• Preempt
• Prism Infosec
• Proofpoint
• PGI
• Pulse Secure
• Range Force
• Recorded Future
• Redscan
• Red Sift
• Reversing Labs
• Risk Based Security
• Riskiq
• S21
• Sabsa
• Safer Society Group
• SAI Global
• Sail Point
• Seclore
• Securden
• Secure Works
• Security Metrics
• SRM
• Securrent
• Semafone
• Senseon
• Seven Nine
• Shape
• Shifra
• SI
• Silobreaker
• Silver Lining
• SIRP
• Sophos
• Speik
• Spire
• Splunk
• Stealthbits
• SureCloud
• SVL
• SwimLane
• Synack
• Card Easy
• Sysnet
• Tanium
• Telesoft
• Teneo
• Thales
• The Bunker
• Sans
• Threat Connect
• Lexis Nexis
• Thycotic
• Titus
• Tokenex
• Trapx Security
• Trend Micro
• Tripwire
• Trust wave
• Ultracomms
• Vade Secure
• Vectra
• Venafi
• Veracode
• Verifone
• Virsec
• Wandera
• White Source
• Yubico
• Zimperium
• Zscaler