The Heliview Team welcomes you on the Cyber Security Summit.
The Heliview Team welcomes you on the Cyber Security Summit.
Chairman of the Summit, Erik R. van Zuuren will open the programme. During the opening he will discuss with Danielle Jacobs, General Manager of Beltug, what the Beltug members priorities are in relation to cyber security. By using an opinion poll, the attendees can react on this information and share their insights. Erik and Danielle will also discuss the effects of the European Directive on security of network and information systems (NIS), GDPR et cetera for Belgian companies.
In this session, Head of Europol’s European Cybercrime Centre, will share insights on how we can Fight Against Europe’s Cyber Criminals. Europol assists the 28 EU Member States in their fight against serious international crime and terrorism. Europol set up the European Cybercrime Centre (EC3) in 2013 to strengthen the law enforcement response to cybercrime in the EU and help protect European citizens, businesses and governments from online crime.
In this session we will discover how ENISA is to evolve into Europe’s Cyber Agency and what it is already doing and intends to do to respond to the increasing Cyber Threat.
Moving to the public cloud brings inherent challenges. Multiple areas of the business are procuring cloud services independently without any oversight, strategy or governance – all with best intentions but introducing new risk to the business. Join Symantec to;
In this session Ennio Di Rosa will discuss:
The cloud is a highly dynamic, flexible and infinitely configurable; simple changes to security policies can expose private resources to the world. There are a lot of moving parts - which means there can be oversights and errors. Security in the public cloud is fundamentally different from enterprise datacenter security. It’s essential for IT security pros to have visibility into network architectures and on-system controls to provide better defense against the growing number of malicious attacks and inadvertent credential leaks. In this session Check Point will gain insight in five essential capabilities to secure your vital cloud infrastructure end-to-end.
In this session, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. You will also learn how Artificial Intelligence and Machine Learning play a part in this battle and what role that leaves for analysts and incident responders. In other words, how can we really pair human intellect with technology in order to defeat the adversary?
Cybersecurity can be a world of uncertainty; we’re facing a new wave of sophisticated threats, while still dealing with the same fundamental threats from decades ago (e.g., SQL injection and ransomware). Focusing on a strong perimeter to keep the bad guys out is not working. Now that attackers routinely use stolen credentials or low-tech phishing techniques to enter, and now that data is no longer kept within a perimeter, this outside-in approach is no longer practical. In this session, you’ll learn why organisations are failing at early breach detection and how data-centric security can overcome common threat detection pitfalls to reduce false positives, accelerate investigations, and stop more attacks more quickly.
Following this session will allow you to understand the security risk that a corporate user encounters during the day and how the Symantec Integrated Cyber Defense Technology will protect the user and the organization.
Through example, an insight is given on what advanced techniques are used to attack a user and what current and new technologies are implemented, integrated and used to protect the user against these sophisticated attacks, independent of the user being in the enterprise or roaming.
From ISO31000 (Risk management) we learn to first look at our risks and take measures to protect against hackers. This is the standard approach. Unfortunately hackers do not follow the standard approach. That is what you see in the real life stories like Equifax, Babydump/KPN or Sony hacks. How can you organize your risk management process so that you will be resilient to these real incidents?
This session aims to address the changing skills and competences required for Cyber Security which is shifting more rapidly than ever.
The demand for cybersecurity professionals continues to rise against the backdrop of a job candidate shortage, employers say only half of applicants (or fewer) actually meet the qualifications. (ISACA Report - 2019)
At this session, we won’t state the facts and the current situation only, but also, we will discuss what the different solutions can be for his widening supply&demand at Cybersecurity landscape.
This will include also Information Security Management Education at Solvay Business School where the candidates benefit from an enriching learning experience shared with a diverse audience of high potentials and seasoned professionals with interactive in-class lectures, experienced lecturers from the field and real-life cases.
Join senior Symantec EMEA executives to discuss business challenges with a group of your peers from a cross section of industries. The ethos of this session is on sharing ideas & learning from Symantec and one another. Gain new insights into securing the cloud using a holistic approach.
Within this session Symantec can help you with the any challenges you have about topics such as:
And much more….
Why and how to use flowdata to efficiently spot the cybersecurity-threats in your network? An explanation why detection based on flowdata has the future instead of inspecting all your (customer) data. Insights in NTA tooling and why you might need them on top of all your security measures. Combining NTA with other log related information to enhance the information about a threat in your network.
Colleagues within your own organisation can be the biggest threat to your IT-environment. Aware or unaware actions can result in receiving malicious content or sending out confidential business data to unwanted locations. How to lower the risk of human actions? This session by Mark Cremers, System Engineer at Zscaler, will cover several best practices to handle the human security threat.
The Flemish Data Protection Authority is like any other Data Protection Authority and supervising / monitoring/ advising Flemish Government and related agencies wrt data protection and data privacy. As it is already years in existence, it has collected lots of experience in this field. In this roundtables some of this experience and key lessons learned will be presented and an open discussion can take place on this vast topic.
Digital Transformation is increasingly pushing organisations to Agile or DevOps development methodology. A trend has emerged with a new buzzword - DevSecOps.
Meet our expert Louis Vieille-Cessay, who will talk about the subject. He will explain Micro Focus' approach to embedding enterprise security considerations in the core parts of the software development process. Louis will do this by covering 3 fundamental topics:
This session will give you an overview and challenges of Advanced Persistent Threat and Threat Hunting. What are the needs and the tools to concretely protect companies from cyber attackers.
Paradigma has changed from product to solution several years ago, but when complexity is very high, solutions are not enough! Trainings and Cyber Security Services become a must to make solutions effective. This session will help you to understand how Kaspersky Lab can help you in Threat Management.
Following the political agreement that was reached in December 2018, the EU Cybersecurity Act is finally on the last stretch and it is due for adoption by mid-2019. It is a significant milestone, which is expected to give a new impetus to the European industry while meeting policy requirements at Member States’ level. Under the Act, the key role reserved for ENISA is to assist in the preparation of candidate cybersecurity certification schemes. In doing so, ENISA needs to interact with both the EU Member States and the industry stakeholders, for collecting opinion and advice to feed into candidate schemes. ENISA looks forward to this newly acquired role and the opportunity it represents for cybersecurity in the EU. In this session Slawomir Górniak will point out the role of ENISA in this European Framework for Certification and what it means for (Belgian) industry in the longer term.”
The age of digital transformation is upon us. Cloud, virtualization and containerization are becoming mainstream. With all of the buzzwords and technology hype, it is easy to forget the real business drivers behind this age of innovation. Established industries like finance and healthcare are being disrupted by new and nimble startups who have leap-frogged established players with new technologies that bring tremendous competitive advantage with speed to market, flexibility and resiliency.
But how do organizations secure all of this sensitive information and the applications that store and manage it?
We’re going to talk about these business critical applications and their role in digital transformation. We will illustrate the story with results from an EMEA wide study that CyberArk sponsored that looks into how companies are protecting the apps that their business depends on. And finally we’ll offer steps that you can take to secure your business.
There are many threats and challenges for modern enterprises when it comes to IT security. AND there is always going to be an element of human ignorance, all while there’s always a trade-off between security and ease – nothing new there, but how to overcome these?
While Public key infrastructure (PKI) is not a brand-new technology, it is a highly effective solution for any organization facing the latest cybersecurity threats including ransomware, human factor, financial pretexting, phishing and outside attackers.
This presentation discusses the Human un-security and how to tackle these issues along with the basics of how to understand and where to start with PKI, highlighting the benefits of being crypto-agile for automating digital identity issuance for users and devices. The ability to integrate, automate and manage a scalable PKI infrastructure seems daunting... We will illustrate authentication as a means to meet security and compliance.
When a cyber security incident occurs, what happens in the back-stage of the attacked organization? Take part in ISACA Belgium’s cyber security incident workshop, designed to simulate an attack, where you will be able to test your own capabilities by trying to respond to it!
All the learning will happen by working in a team, later reviewing implications of your own decisions, comparing to how other teams handled the incident and finally, thanks to the expert’s feedback.
After completing this session, you will be able to understand the cyber security incident process, especially how to respond to and communicate during an incident.
In the evolving world of Cyber criminality new trends almost always define new threats to data and infrastructure. This is especially the case with the transition from standard web traffic to more API-driven communication. Criminals have long learned to exploit vulnerabilities in this communication. This breakout session will summarize the latest types of threats and how to fight against them.
The growing number of 3rd parties organizations rely on to deliver their services requires more agile approaches for 3rd party cyber security risk management. During the interactive session several methods will be reviewed and will be explained how RiskRecon’s approach allows organizations to reduce risk through collaboration with their 3rd parties on risk-prioritized findings present within their Internet risk surface.
UZL wants to expose as much data as possible to its users (patients, external caregivers/providers) but do this in a secure way. Being an university hospital and a big software company, means facing a lot of challenges. In this keynote the lead IT architect and CIO of University Hospital Leuven will present their challenges, solutions and insights.
For over a decade, security convergence has been portrayed as the biggest challenge in the corporate security. But is it really the challenge many claim it is? Did the discussion not focus too much on ownership, rather than on outcome? This keynote tells Solvay’s story on how it ended up with an enterprise security risk management philosophy, and the challenges that shaped it’s direction.