Programme

Keynote

CyberResilience - How High Can you Build Your Walls?

This keynote will cover the latest threats and trends in cyberspace and how to respond to these threats with a view to creating a safer and more secure cyberspace. The borderless nature of cybercrime requires a response at scale that involves cross-border cooperation and the pooling of scarce resources. Effective cooperation not only can lead to successful investigations, but also be key to deterrence and prevention. Law enforcement is a key partner in ensuring cyber resilience.

Interactive Session

In this interactive session, we want to provide the audience a view on the challenges companies face with managing cybersecurity-related risk in their organisation. By voting on propositions we will discover where the possible challenges lie and what we can do as a collective to stimulate. This session is moderated by the conference chair and there will be room for discussion. By using an opinion poll, the attendees can react on this information and share their insights.

Round Table (Invitation only)

Roundtable to Discuss the Improved Cooperation between Law Enforcement and Private Sector

During this limited-audience CISO- / CIO-roundtable we target to discuss under “Chatam House rule” recent and known events of eg malware infection and less known events like eg industrial espionage that effectively happened and discuss the effects the events had, how they were recovered from and how in such cases collaboration between police forces and private industry could result into a better overall resilience to such events and how collaboration can help in having a more substantial impact in allowing to go after the bad actors and supporting investigations.

Break-out Session

Hacking Exposed: The speed of modern day hacking tactics & techniques

In this session, Ronald Pool will discuss the speed at which adversaries operate and explain how long you really have in order to detect, analyse and mitigate an incident before it becomes a breach. Based on actual breaches, you will also learn some of the attack vectors currently used by adversaries and how to counter them.

Keynote

SSL Decryption, Privacy and Security, a Balancing Act

SSL/TLS public-key encryption is the industry standard for data protection. Its secure encryption protects privileged data in transit. But it also provides cover for bad actors who exploit SSL/TLS to cloak their activities. In addition to protecting corporate data with SSL/TLS encryption, enterprise IT leaders must employ comprehensive SSL/TLS inspection methodologies to mitigate the risks hidden in encrypted traffic. This session examines the risk posed by SSL-encrypted threats; considers the business, legal, and security implications of managing that risk; and provides constructive measures for countering those threats. In the end, the best way for IT leadership to protect their enterprises, is to ensure the rights of the individual employee are respected by protecting their employees, thereby reducing risk of attacks hidden in SSL/TLS to the organisation.

Keynote

Experiences and Lessons Learned from Swift’s Customer Security Programme to Effectively Combat Cyber Threats

In the world of constantly evolving cyber-threats, SWIFT has years of experience in building and fostering a secure eco-system between financial institutions. As such it has learned that he security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is playing an important role in reinforcing and safeguarding the security of the wider ecosystem and as such has built a Customer Security Programme to assist its partners to keep their systems secure/safe. In this keynote SWIFT will share it experiences and key recommendation with the audience so that it can bring inspiration also outside of the financial sector.

Round Table (Invitation only)

Cyber-resilience, Use of IoT-devices and The Cyber Act

This roundtable intends to discuss what impacts/opportunities the CyberAct has on the Belgian Industry (both users of and suppliers of), especially in context of the growing use of internet connected IoT devices. Indeed, in a world where both the exposure grows due to increase use of IoT-devices as well as the threats (for example recent ransomware-incidents) it becomes more and more vital that any solutions used by, bought by, supplied by… are “certified” providing parties using such devices better reassurance that what they put out there in the field is sufficiently secure. What is the state of play? What will be the impact and/or opportunities for Industry really be?  Come and join the discussions.