IDC Security Conference 360 degree Security for Real Commercial Impact

In-Person Event | Kamerik | 22 september 2022

overzicht

Bedrijven besteden tegenwoordig extra aandacht aan vertrouwen, resiliency en data sovereiniteit.   

  • Vertrouwen is een belangrijk aspect geworden voor bedrijven en dit is gedeeltelijk te wijden aan de rol van veilgheid en privacy. De rol van de CISO is veranderd naar een ‘Guardin of a Company’s Trust metic’.  
  • Resiliency is een essentieel onderdeel om bestand te zijn tegen verstoringen die van alle kanten kunnen komen (een pandemie, een tekort aan aanbod, inflatie, extreme weeromstandigheden, grootschalige cyberaanvallen) 
  • Data sovereiniteit is belangrijk, met name in Europa en haar lokale wetgeving als ook EU-regelgeving, waar de discussie woedt over onze digitale sovereiniteit.  

Deze drie thema’s zijn van invloed op de security portfolio van leveranciers en hebben een materiele impact op de commerciële en structurele evolutie van platforms, producten en services – met bijvoorbeeld Security-as-a-Service. 

360-graden security is een noodzaak geworden, waarbij de beste bescherming geboden wordt door een multi-layerd approach.  

IDC identificeert Identity, Managed Security Services, OT/IT convergence, Security-as-a-Service, Zero Trust, en Cloud security als belangrijke pijlers die ten grondslag liggen aan een alomvattende strategie.  

Er is ook steeds meer aandacht voor het meten en verminderen van risico’s en het creëren van betrouwbaarheidsmetingen voor supply chain partners en derden. We verwachten nieuwe Europese wetgeving rond third-party security en risk auditing.  

Laat u inspireren en neem deel aan het evenement! 

Neem deel aan IDC's IT Security conferentie om dieper op deze onderwerpen in te gaan, naar interessante keynotes te luisteren en te netwerken met collega’s uit dezelfde sector.  

De conferentie vindt plaats in Buitenplaats Kameryck, te Kamerik op 22 September en hoopt security leaders bijeen te brengen om:  

  • Ervaringen te delen  
  • Nieuwe technieken te leren 
  • Strategieën te upgraden en advanced security technieken te benutten  
  • De mentaliteit te veranderen om zo het level van resilience en digitaal vertrouwen te helpen verhogen  

Programma onderdeel

TIJD Event & Sprekers
9:00

Registratie & Ontbijt

9:30

Welkomstwoord door IDC

Martin Canning

Group VP, Consulting & Research, IDC
9:35

IDC keynote: 360 degree Security for Real Commercial Impact [ENG]

Mark Child

Associate Research Director, IDC European Security, IDC CEMA

IDC’s keynote will provide insights into the top trends in IT Security and share findings from our latest research.

Three main areas are currently demanding businesses attention: Resilience, Trust, and Data Sovereignty. These impact business strategy, in turn driving security vendors to develop their portfolios portfolio and delivery models, with material impact on the commercial and structural evolution of platforms, products, and services – such as with Security-as-a-Service.

We see that 360-degree security has become a necessity with a multi-layered approach offering the best protection. IDC identifies Detection and Response, Identity, Managed Security Services, IT/OT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy. Finally, there is growing attention to managing risk and implementing trust frameworks for supply chain partners and third parties.

 

 

10:00

Detecting and stopping breaches – tooling and techniques to address skills shortages

Mathijs van der Maas

Solution Engineer, Crowdstrike

Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.

10:20

Fireside chat: Why your technology strategy and talent strategy need to be aligned

Marion van Leeuwen-Kemmere

VP Strategic Accounts EMEA, Pluralsight

Mark Child

Associate Research Director, IDC European Security, IDC CEMA
  • Cloud computing and cybersecurity: the largest areas of concern with regards to tech skills 
  • Implementing new technologies requires continual investment in talent and business processes 
  • Become a creator of talent, not just a consumer of talent
10:40

Taking Zero Trust Beyond the User

Joost Hage

Solutions Architect, Zscaler

Zero Trust is not about trusting zero, it's about finding and eradicating implicit trust in our environments. Organisations have focused on the User to App segment, removing trust in networks, and reducing external attack surfaces, but there is more to do. Join our session to hear how to remove the implicit trust from your workloads and even your cloud environments, to continue your journey to a Zero Trust future.

11:00

Koffie- en netwerkpauze

11:30

Presentations parallel sessie

Session #1.1

11:30 - 11:50

Modern cybersecurity beyond boring

Andreas Schneider

Field CISO EMEA, Lacework

Session #1.2

11:30 - 11:50

Next Gen. Risk Assessment & Orchestration

Adem Dilbaz

Senior Software Specialist, Cyberwise
Session #1.1
11:30 - 11:50

Modern cybersecurity beyond boring

Session #1.2
11:30 - 11:50

Next Gen. Risk Assessment & Orchestration

11:55

Presentations parallel sessie

Session #2.1

11:55 - 12:15

Prepare, Don't Panic! How to Build a Resilient Security Posture

Ulrich Wisser

Strategic Solutions Architect, Everbridge

Jan Horsager

Research Director, IDC

Session #2.2

11:55 - 12:15

What DevSecOps can learn from Elon Musk

Frank Tingle

Solution Architect, Sonatype
Session #2.1
11:55 - 12:15

Prepare, Don't Panic! How to Build a Resilient Security Posture

Session #2.2
11:55 - 12:15

What DevSecOps can learn from Elon Musk

12:20

Demystifying SASE for Tech Leaders: Solutions and Strategies for Security Consolidation

Sierra Dasso

Head of Benelux, Cloudflare

SASE is generating tremendous hype, steep expectations, and confusion. Ideally, SASE promises to deliver benefits such as consistent protection, reduced complexity, and scalability. But modern enterprise networks are a maze of complexity including distributed networks, specialized systems, legacy infrastructure, public and private cloud, and dozens of security tools from multiple vendors. While enterprise buyers require a common visibility and policy framework, how can they approach the SASE transformation in a way that best aligns with their security requirements and business goals? In this presentation, Sierra will explore the SASE concept and examine strategies to help IT buyers navigate their SASE journey.

12:40

Lunch & Netwerken

13:40

Beyond Backups: A New Way to Think About Data Protection

Graham Russell

Market Intelligence Director, OwnBackup

With security threats on the rise, protection is no longer about just defending against occasional disasters. Go on offense with a proactive strategy to safeguarding your SaaS data.

14:00

Deepfakes: the most serious AI-crime threat?

Parya Lotfi

Co-founder & CEO, DuckDuckGoose

Mark Evenblij

Co-founder & CFO, DuckDuckGoose

Deepfakes are hyper-realistic images, videos, or sounds that are manipulated or completely generated by applying machine learning. Experts at University College London have ranked deepfakes as the most worrying use of artificial intelligence. The unaided human eye is no longer capable of distinguishing fake audiovisual content from authentic material. The technology to create deepfakes is becoming more and more accessible to everyone. Criminals can use hyper-realistic deepfakes to impersonate someone else and commit identity fraud, e.g., ghost fraud, new account fraud, and synthetic identity fraud. In this presentation, Mark and Parya from DuckDuckGoose explain what deepfakes are, how the technology behind this phenomenon is evolving, what harm deepfakes caused in the past, and what damage they will potentially cause in the future.

DuckDuckGoose is a Netherlands-based startup that develops deepfake detection products by applying explainable AI solutions. The startup is a spin-off of the Delft University of Technology and part of the YES!Delft community. DuckDuckGoose consists of young engineers who rallied around the mission to create a digital environment where we can still believe what we perceive. The team works closely with governmental organizations such as the Netherlands Forensic Institute (Ministry of Justice and Security) and the Dutch National Police to improve the quality of its deepfake detection approach.

14:20

Fireside chat: AI based cyber resilience – deployment with Zero Trust

Menno Rippen

Principal Sales Engineer – Benelux and Nordics, BlackBerry

Jan Horsager

Research Director, IDC

Zero Trust is a verification framework that impacts the whole organization from endpoints to users whereby the balance between technology and people is vital to protect information and remain resilient. Prevention against continuous malware attacks is critical, as is the augmentation of security operations with tools that ensure visibility across the entire estate while deploying prevention-first to safeguard business continuity. We discuss new controls which overcome the ITSEC resource challenges and prove effective in the real world at scale. How can AI and ML be applied to ensure organizational cyber resilience via Zero Trust? How can MDR services be leveraged for further empowerment? We explore a sustainable cyber-future of continuous and integrated protection from malware via Zero Trust in and out of the cloud using AI’s predictive advantage to prevent attacks before they happen.

14:35

Fireside Chat: Security & Privacy: How Zoom Safeguards European Business

Ian Sleebe

Solutions Architect, Zoom

Mark Child

Associate Research Director, IDC European Security, IDC CEMA
14:50

Pools of Identity: Best practices start with personal password behavior

Mark Troyer

Senior Director, Solutions Consulting, LastPass

With the Cybersecurity Awareness Month quickly approaching in October, organizations have an opportunity to create high levels of awareness in their user base on the importance of password hygiene, phishing and common sense security risk mitigation.

This presentation will provide insights on how to protect the IT assets of an organization by focusing on personal password behavior.  Common behavior will be explored and some proposed simple solutions will be recommended.

 

 

 

15:05

Koffie- en netwerkpauze

15:35

Accelerate digital transformation in regulated industries

Robbert van der Pol

Cloud Risk Advisory Director, Deloitte

Sophie Gommers

Cloud Risk Management specialist, Deloitte

Highly regulated industries such as governments and banks often feel constrained when implementing cloud-based solutions. Using an implemented risk and compliance framework, these industries are able to get most out of the cloud while being compliant with their regulatory needs. Get some good advices and learn how to accelerate your transformation to the cloud.

 

16:00

Strengthen the weakest link

Maarten Bevers

Corporate Information Security Officer & Data Protection Officer - CISM - CIPP/E, LeasePlan

In this presentation, Maarten from LeasePlan will talk about how we can reduce the percentage of human involvement in a breach. Currently over 80% of all breaches involve a human element (DBIR 2022). In his presentation he will explore why that is the case, and how we can lower this amount.

16:25

What’s on the legal horizon: regulatory trends and pipeline legislation

Mark Egeler

Lawyer, Freshfields Bruckhaus Deringer

This presentation will provide insights into various data protection regulatory inquiries and proceedings across the EU. The presentation will also touch on some EU legislative proposals and give tips on how to best prepare for what’s on the legal horizon. 

16:50

Samenvatting & Conclusie

Martin Canning

Group Vice President, Consulting, European Region, IDC

Mark Child

Associate Research Director, IDC European Security, IDC CEMA
17:00

Networking & EXPO

partners

Diamond Partner
In-Person
Diamond Partner
In-Person
Diamond Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person

Materials

Om toegang te krijgen tot deze inhoud, voert u het wachtwoord in dat u van IDC hebt ontvangen. Als u geen wachtwoord hebt, neem dan contact op met Jenni Palokas via e-mail op jpalokas@idc.com.

Neem contact met ons op

Jenni Palokas

Conference Specialist, IDC

Camilla Hove Toft

Conference Director

Over IDC

58 Jaren | 1300 Analist | 110 Landen

International Data Corporation (IDC) is 's werelds grootste aanbieder van marktinformatie, adviesdiensten en evenementen voor de markten voor informatietechnologie, telecommunicatie en consumententechnologie. Met meer dan 1.300 analisten wereldwijd biedt IDC wereldwijde, regionale en lokale expertise op het gebied van technologie en industriële kansen en trends in meer dan 110 landen. IDC's analyse en inzicht helpen IT-professionals, bedrijfsleiders en de investeringsgemeenschap om op feiten gebaseerde technologiebeslissingen te nemen en hun belangrijkste bedrijfsdoelstellingen te bereiken. IDC is opgericht in 1964 en is een volledige dochteronderneming van International Data Group (IDG), 's werelds toonaangevende bedrijf voor media-, data- en marketingdiensten. Ga voor meer informatie over IDC naar www.idc.com . "