IDC Security Conference 360 degree Security for Real Commercial Impact

In-Person Event | Kamerik | September 22, 2022

Overview

There are three main themes that businesses are looking at with care and attention: Trust, Resiliency and Data sovereignty.

  • Trust has become a key aspect for businesses to measure and part of this involved security and privacy. The role of the CISO has evolved to becoming the Guardian of a Company's Trust metric.
  • Resiliency is a vital component for being able to withstand disruption, which comes from all directions (pandemic, supply shortage, inflation, extreme weather, massive scale cyber attacks).
  • Data sovereignty is important especially here in Europe with local and EU regulations, and there is an evolving discussion around digital sovereignty.

These three themes impact vendor security portfolio and approaches having a material impact on the commercial and structural evolution of platforms, products, and services - with for example Security-as-a-Service.

360-degree security has become a necessity with multi-layered approached offering the best protection. In terms of specific aeras, IDC identifies Identity, Managed Security Services, OT/IT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy.

There is also growing attention to measuring and reducing risk and creating trustworthiness measurements for supply chains partners and third parties. We expect new European legislation around third-party security and risk auditing.

Join & be inspired! 

Join IDC's IT Security conference to deep dive into these areas with a broad section of industry thought leadership sharing and networking opportunities.

The conference will be held on the 22nd of September 2022, bringing together security leaders to:

  • Share experiences
  • Learn new techniques
  • Upgrade their strategies to exploit the latest innovative and advanced security techniques 
  • Mindset change to help raise levels of resilience and digital trust

 

Agenda

Time Event & Speakers
9:00

Registration & breakfast

9:30

Welcome by IDC

Martin Canning

Group VP, Consulting & Research, IDC
9:35

IDC keynote: 360 degree Security for Real Commercial Impact [ENG]

Mark Child

Associate Research Director, IDC European Security, IDC CEMA

IDC’s keynote will provide insights into the top trends in IT Security and share findings from our latest research.

Three main areas are currently demanding businesses attention: Resilience, Trust, and Data Sovereignty. These impact business strategy, in turn driving security vendors to develop their portfolios portfolio and delivery models, with material impact on the commercial and structural evolution of platforms, products, and services – such as with Security-as-a-Service.

We see that 360-degree security has become a necessity with a multi-layered approach offering the best protection. IDC identifies Detection and Response, Identity, Managed Security Services, IT/OT convergence, Security-as-a-Service, Zero Trust, and Cloud security as key pillars underpinning a comprehensive strategy. Finally, there is growing attention to managing risk and implementing trust frameworks for supply chain partners and third parties.

 

 

10:00

Detecting and stopping breaches – tooling and techniques to address skills shortages

Mathijs van der Maas

Solution Engineer, Crowdstrike

Every senior manager will recognize the struggles of hiring the right people, in a job market where security professionals are a resource in high demand, and supply is severely constrained. With employees increasingly working from home and abroad, the ability to respond to adversaries becomes even more complicated and time critical. Tooling, automation and services are key to getting ahead of attackers and stop breaches, and in this session we discuss how technologies help to address skills shortages in a proactive manner.

10:20

Fireside chat: Why your technology strategy and talent strategy need to be aligned

Marion van Leeuwen-Kemmere

VP Strategic Accounts EMEA, Pluralsight

Mark Child

Associate Research Director, IDC European Security, IDC CEMA
  • Cloud computing and cybersecurity: the largest areas of concern with regards to tech skills 
  • Implementing new technologies requires continual investment in talent and business processes 
  • Become a creator of talent, not just a consumer of talent
10:40

Taking Zero Trust Beyond the User

Joost Hage

Solutions Architect, Zscaler

Zero Trust is not about trusting zero, it's about finding and eradicating implicit trust in our environments. Organisations have focused on the User to App segment, removing trust in networks, and reducing external attack surfaces, but there is more to do. Join our session to hear how to remove the implicit trust from your workloads and even your cloud environments, to continue your journey to a Zero Trust future.

11:00

Coffee break & networking

11:30

Presentations (Parallel Sessions)

Session #1.1

11:30 - 11:50

Modern cybersecurity beyond boring

Andreas Schneider

Field CISO EMEA, Lacework

Session #1.2

11:30 - 11:50

Next Gen. Risk Assessment & Orchestration

Adem Dilbaz

Senior Software Specialist, Cyberwise
Session #1.1
11:30 - 11:50

Modern cybersecurity beyond boring

Session #1.2
11:30 - 11:50

Next Gen. Risk Assessment & Orchestration

11:55

Presentations (Parallel Sessions)

Session #2.1

11:55 - 12:15

Prepare, Don't Panic! How to Build a Resilient Security Posture

Ulrich Wisser

Strategic Solutions Architect, Everbridge

Jan Horsager

Research Director, IDC

Session #2.2

11:55 - 12:15

What DevSecOps can learn from Elon Musk

Frank Tingle

Solution Architect, Sonatype
Session #2.1
11:55 - 12:15

Prepare, Don't Panic! How to Build a Resilient Security Posture

Session #2.2
11:55 - 12:15

What DevSecOps can learn from Elon Musk

12:20

Demystifying SASE for Tech Leaders: Solutions and Strategies for Security Consolidation

Sierra Dasso

Head of Benelux, Cloudflare

SASE is generating tremendous hype, steep expectations, and confusion. Ideally, SASE promises to deliver benefits such as consistent protection, reduced complexity, and scalability. But modern enterprise networks are a maze of complexity including distributed networks, specialized systems, legacy infrastructure, public and private cloud, and dozens of security tools from multiple vendors. While enterprise buyers require a common visibility and policy framework, how can they approach the SASE transformation in a way that best aligns with their security requirements and business goals? In this presentation, Sierra will explore the SASE concept and examine strategies to help IT buyers navigate their SASE journey.

12:40

Lunch & networking

13:40

Beyond Backups: A New Way to Think About Data Protection

Graham Russell

Market Intelligence Director, OwnBackup

With security threats on the rise, protection is no longer about just defending against occasional disasters. Go on offense with a proactive strategy to safeguarding your SaaS data.

14:00

Deepfakes: the most serious AI-crime threat?

Parya Lotfi

Co-founder & CEO, DuckDuckGoose

Mark Evenblij

Co-founder & CFO, DuckDuckGoose

Deepfakes are hyper-realistic images, videos, or sounds that are manipulated or completely generated by applying machine learning. Experts at University College London have ranked deepfakes as the most worrying use of artificial intelligence. The unaided human eye is no longer capable of distinguishing fake audiovisual content from authentic material. The technology to create deepfakes is becoming more and more accessible to everyone. Criminals can use hyper-realistic deepfakes to impersonate someone else and commit identity fraud, e.g., ghost fraud, new account fraud, and synthetic identity fraud. In this presentation, Mark and Parya from DuckDuckGoose explain what deepfakes are, how the technology behind this phenomenon is evolving, what harm deepfakes caused in the past, and what damage they will potentially cause in the future.

DuckDuckGoose is a Netherlands-based startup that develops deepfake detection products by applying explainable AI solutions. The startup is a spin-off of the Delft University of Technology and part of the YES!Delft community. DuckDuckGoose consists of young engineers who rallied around the mission to create a digital environment where we can still believe what we perceive. The team works closely with governmental organizations such as the Netherlands Forensic Institute (Ministry of Justice and Security) and the Dutch National Police to improve the quality of its deepfake detection approach.

14:20

Fireside chat: AI based cyber resilience – deployment with Zero Trust

Menno Rippen

Principal Sales Engineer – Benelux and Nordics, BlackBerry

Jan Horsager

Research Director, IDC

Zero Trust is a verification framework that impacts the whole organization from endpoints to users whereby the balance between technology and people is vital to protect information and remain resilient. Prevention against continuous malware attacks is critical, as is the augmentation of security operations with tools that ensure visibility across the entire estate while deploying prevention-first to safeguard business continuity. We discuss new controls which overcome the ITSEC resource challenges and prove effective in the real world at scale. How can AI and ML be applied to ensure organizational cyber resilience via Zero Trust? How can MDR services be leveraged for further empowerment? We explore a sustainable cyber-future of continuous and integrated protection from malware via Zero Trust in and out of the cloud using AI’s predictive advantage to prevent attacks before they happen.

14:35

Fireside Chat: Security & Privacy: How Zoom Safeguards European Business

Ian Sleebe

Solutions Architect, Zoom

Mark Child

Associate Research Director, IDC European Security, IDC CEMA
14:50

Pools of Identity: Best practices start with personal password behavior

Mark Troyer

Senior Director, Solutions Consulting, LastPass

With the Cybersecurity Awareness Month quickly approaching in October, organizations have an opportunity to create high levels of awareness in their user base on the importance of password hygiene, phishing and common sense security risk mitigation.

This presentation will provide insights on how to protect the IT assets of an organization by focusing on personal password behavior.  Common behavior will be explored and some proposed simple solutions will be recommended.

 

 

 

15:05

Coffee break & networking

15:35

Accelerate digital transformation in regulated industries with Deloitte

Robbert van der Pol

Cloud Risk Advisory Director, Deloitte

Sophie Gommers

Cloud Risk Management specialist, Deloitte

Highly regulated industries such as governments and banks often feel constrained when implementing cloud-based solutions. Using the Deloitte implemented risk and compliance framework, these industries are able to get most out of the cloud while being compliant with their regulatory needs. Learn how Deloitte is working with clients to accelerate their transformation to the cloud.

16:00

Strengthen the weakest link

Maarten Bevers

Corporate Information Security Officer & Data Protection Officer - CISM - CIPP/E, LeasePlan

In this presentation, Maarten from LeasePlan will talk about how we can reduce the percentage of human involvement in a breach. Currently over 80% of all breaches involve a human element (DBIR 2022). In his presentation he will explore why that is the case, and how we can lower this amount.

16:25

What’s on the legal horizon: regulatory trends and pipeline legislation

Mark Egeler

Lawyer, Freshfields Bruckhaus Deringer

This presentation will provide insights into various data protection regulatory inquiries and proceedings across the EU. The presentation will also touch on some EU legislative proposals and give tips on how to best prepare for what’s on the legal horizon. 

16:50

Summary & Conclusion

Martin Canning

Group Vice President, Consulting, European Region, IDC

Mark Child

Associate Research Director, IDC European Security, IDC CEMA
17:00

Networking & EXPO

Partners

Diamond Partner
In-Person
Diamond Partner
In-Person
Diamond Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Platinum Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person
Gold Partner
In-Person

Materials

To access this content, please enter the password you have received from IDC. If you do not have a password, please contact Jenni Palokas via email, at jpalokas@idc.com.

Contact Us

Jenni Palokas

Conference Specialist, IDC

Camilla Hove Toft

Conference Director

About IDC

58 Years | 1300 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.