09:30
Welkom en registratie met koffie en thee

10:00 – 10:15
Opening

Cybersecurity Summit 2024: Identities are the new vulnerabilities.

Ronald Kingma
Richard Bordes

10:15 – 11:00
Hunters Fireside Chat – The Role Of AI In The Modern SOC

AI and Co-pilots assistance are appearing nowadays in many technologies. During a Fireside chat, Hunters is going to take a look at how AI plays in the modern SOC. We are honored to host three highly experienced Cyber experts, and hear about their experience using AI and the opportunities and risks.

With:

  • Eric Singer – Ex-CISO – Pluxee (part of Sodexho group)
  • Harish Haridasan – Group Product Manager – Group Cyber Defense Services – Booking.com
  • Shahar Vaknin – Field CTO – Hunters
Eric Singer
Harish Haridasan
Shahar Vaknin

11:00 – 11:45
Contextualising Vulnerabilities with Identity and Threat

Risk based vulnerability management has taken huge strides forward from the old days of remediating CVSS 7+ to a modern and threat centric approach, but with so many flaws and attack surfaces still available, we need to contextualise further to focus resources on mitigating exposures. Join Gavin Millard, Tenable’s Deputy CTO and Vice President Of Product Management for VM, as he explores the benefits of contextualising vulnerabilities with identity and other third party information to identify and remove the threat actors next step in the attack path. 

Gavin Millard
Download Presentatie

12:00 – 12:25
API Posture Governance, van strategie naar uitvoering

De enorme wildgroei aan APIs, gestuwd door de opkomst van GenAI, laat veel organisaties achter de feiten aan lopen. Welke APIs heb ik eigenlijk? Wat doen ze? Wat voor data stuur ik naar buiten? En wie helpt me ervoor zorgen dat mijn ontwikkelaars op de juiste manier APIs bouwen en in productie zetten, zonder de deur wagenwijd open te zetten voor hackers? In deze sessie zal Salt Security inzicht geven hoe een solide Posture Governance strategie te implementeren en ook daadwerkelijk uit te voeren, rond het gebruik en beschikbaar stellen van APIs. Waarschuwing; deze sessie bevat live demos!

Martijn Bosschaart
Download Presentatie

12:00 – 12:25
From One-Size-Fits-All to Adaptive Defence: Rethinking Human Centric Cybersecurity

In the world of cybersecurity, a one size fits all approach leaves you with a gaping hole – the human element. Imagine an adaptive defence that considers not just technology, but also the unique behaviours and vulnerabilities of your people. That’s the power of a human centric cybersecurity plan, that leverages AI and the data we have at our finger tips . Join me as we explore why a one-size-fits-all approach falls short, and how to build a robust defence that addresses human risk and safeguards your organization’s critical assets.
Scott Jenner
Download Presentatie

12:00 – 12:25
Beyond the Scoring: How to Manage Your Third- and Fourth-Party Attack Surface

Organisations rely on an increasing number of third parties for business operations. In this session, you will discover how to:

  • Measure security risk consistently
  • Understand the security posture of your entire supply chain
  • Deploy an automated approach to mitigate security incidents
  • Accelerate compliance to standards such as NIS2 and DORA
Charles Clarke

12:25 – 13:15
Networking / Lunch

13:15 – 13:40
CrowdStrike 2024 Global Threat Report: The Year of Stealth

Today’s adversaries are operating with unprecedented stealth. They continue to discover new methods to hide in plain sight, making it difficult for defenders to differentiate between normal user activity and a breach.

Stopping breaches requires an understanding of adversaries’ motivations, techniques and targets. In the latest edition of our CrowdStrike’s 2024 Global Threat Report CrowdStike uncovers notable themes, trends and events across the cyber threat landscape. Learn how Scattered Spider, Bitwise Spider and Cascade Panda hide in plain sight and how to stop breaches!

Issam Aouad Tabet
Download Presentatie

13:15 – 13:40
Fortifying the Digital Citadel: Navigating the Privileged Access Management Maturity Journey for Enhanced Security Posture

Join Delinea as they explore the critical landscape of Privileged Access Management (PAM) Maturity. In a world where cyber threats continually evolve, understanding the journey to fortify your digital citadel becomes paramount.

Gain valuable insights from industry experts, understand the evolving landscape of cybersecurity, and learn practical strategies to enhance your organization’s security posture.

What will you learn?

  • How they reduce your attack surface with Privileged Access Management capabilities
  • How to balance productivity and security with PAM.
  • The framework for continuous improvement.
  • The benefits of extending your PAM program beyond the vault.

Get answers to these important questions: 

  • What should we focus our limited resources on next?
  • How do we integrate policies and limit overprivileged users?
  • How can we take a strategic approach to implementing PAM?

· Beyond Secret Server, what other PAM controls are essential?

Patrick van der Veen
Download Presentatie

13:15 – 13:40
The Human Shield: Why it’s Still Your Ultimate Defense Against Phishing Attacks

The cybersecurity landscape is always evolving, and in 2023 Cofense saw the volume and variety of threat campaigns once again develop exponentially. Join us to take a look at the latest threat tactics developing and why your people are still vital in the protection of your organisation.

Allen Manville

13:50 – 14:35
Identity has become the new ‘zero day’ vulnerability

A lost/stolen credential can be used as a starting point of an attack, leaving traditional preventive capabilities inefficient.  This is where AI driven identity detection and response comes into the picture.

Stijn Rommens
Download Presentatie

14:35 – 15:00
Coffee break

15:00 – 15:45
Hunting mobile threats: Insights, Trends and Mitigation Strategies

Threat actors are targeting mobile devices more aggressively to compromise employee accounts and quietly gain access to your cloud infrastructure – making it critical to understand emerging mobile threats and how tactics are rapidly changing.

In this session, Lookout Security Experts will dissect newly discovered threats, highlight trends across the threat landscape, and explain what you can do to protect your organization. You’ll learn about:

  • Phishing tactics from behind-the-scenes and insights into their operator functionality.
  • The novel tactics used to avoid detection by traditional web analysis tools.
  • Social engineering and AI enable threat actors to build credibility and trust with their victims.
  • Actions you can take to mitigate the risk of your employees falling victim to socially engineered attacks on their mobile devices.
Sascha Spangenberg

15:45 – 16:00
Wrap-up

Ronald en Richard nemen de dag nog eens met je door en gaan kijken of alle vragen beantwoord zijn:

  • Hoe krijg je beter inzicht in waar de kwetsbaarheden liggen binnen jouw organisatie?
  • Wat kun je doen om risico’s te beperken
  • Wat kan je doen om cyberincidenten en dreigingen sneller te detecteren en te voorkomen?
  • Hoe kan Access42 jullie helpen?
Ronald Kingma
Richard Bordes

16:00 – 17:00
Closing talk – Jochem Nooyen – spreker en illusionist

Hoe veilig zijn je gedachten? Jochem Nooyen sluit de Access42 Cybersecurity Summit af. Hij neemt je mee in een wereld waarin privacy een illusie is. Veel mensen zeggen dat ze niks te verbergen hebben, maar wat heb je te beschermen? Alles wat wij online doen is te volgen en te achterhalen maar je gedachten zijn veilig….toch?!

Jochem Nooyen

17:00 – 17:45
Networking / Drinks and snacks

Bestel nu je (gratis) ticket en
kom naar de Cybersecurity Summit
op 6 juni 2024!