Cybersecurity Summit 2025: The Perimeter Has Shifted – Cyber Resilience in a Borderless World
In today’s hyper-connected world, the battle for cybersecurity resilience is not just a technological challenge but a human one. We live in an era defined by complex and rapidly evolving cyber threats and true resilience requires more than just isolated defenses. This talk explores the power of unifying diverse security tools and data streams to achieve a comprehensive, real-time understanding of the threat landscape. We’ll discuss how integrating advanced AI, machine learning, and automated response can break down data silos, reduce detection times, and improve threat hunting efficiency. By adopting an open and collaborative approach, organisations can create a security ecosystem that is not just reactive but proactively resilient, ready to defend against both known and emerging threats. Together, we can build a smarter, more secure digital future where technology and human expertise work in harmony to protect what matters most.
Attackers have shifted their tactics and technics to match modern attack surfaces, and accelerated their ability to successfully target them through perfectly crafted prompts. To keep up, defenders have to also shift their strategies to preempt the new paths the attackers will tread. Join Gavin Millard, VP Product from Tenable, where he’ll talk about the need to know all the different attack surfaces being targeted today, and how through effective contextualisation, organisations can stay ahead and shut down the right attack paths before they are leveraged.
In an digitally advanced yet increasingly regulated environment, IT administrator accounts represent both a critical enabler of innovation and a growing point of risk.
As cyber threats become more sophisticated and regulations like NIS2 and DORA push for demonstrable control, the question is no longer if to secure privileged identities – but how to do it without slowing down the business.
This session will offer a forward-looking perspective on how you can operationalise Identity Security through platform thinking. We’ll explore how IAM and cybersecurity leaders can strike the right balance between control, compliance, and continuity – ensuring privileged users have secure, efficient access while the organisation maintains visibility, accountability, and resilience.
With the DORA and NIS 2 Directives setting new regulatory benchmarks, the pressure on organisations to strengthen their Third-Party Risk Management (TPRM) has never been higher.
But more than a one-time compliance hurdle, the directives are about ensuring long-term resilience. Cyber threats no longer stop at your perimeter—they infiltrate through your vendors, partners, and suppliers.
In this session, we’ll explore actionable strategies to stay ahead:
Today’s attackers aren’t just breaking down the front door. They’re slipping in quietly, moving laterally, and blending in with legitimate activity.
The modern-day attacker is more sophisticated, more patient, and more persistent than ever before.
In this session, we’ll explore how the Access42 Security Operations Center defends against these evolving threats. Not with a single tool or tactic, but through a layered, integrated approach. We’ll map the attacker’s journey using the cyber kill chain, and see how every layer of defense plays a critical role in detecting, analyzing, and responding to modern attacks.
.
What started as a routine penetration test quickly unraveled into full system compromise, exposing a critical vulnerability hiding in plain sight. In this talk, we walk through the discovery of a Remote Code Execution vulnerability in an exposed printer interface, from the initial findings to the behind-the-scenes technical mechanics that made it possible. You’ll get a glimpse of the full discovery and disclosure timeline, how the vendor responded, and what this means for organizations relying on similar web applications.
Nicolas Jeanselme is API Security expert for Salt Security. With over three hundred API penetration tests under his belt, Nicolas is putting his expertise on the limits of legacy security solutions to good use at Salt Security to help organisations implement the most robust API security strategies.
Barend neemt je mee in de wereld van het Team Digitale Opsporing. Wat gebeurt er achter de schermen? En zijn cybercriminelen echt slimmer dan de politie, zoals vaak wordt gezegd?
Ontdek hoe een team van IT-specialisten zich dagelijks inzet om Nederland (digitaal) veiliger te maken. Barend laat zien aan welke onderzoeken zij werken en hoe cybercrime-teams complexe zaken aanpakken. Welke kennis en expertise komt daarbij kijken? Duik mee in de fascinerende wereld van digitale opsporing en cybercriminaliteit!
Employees rely on iOS and Android devices for authentication, communication, and productivity—often while working remotely. As cyberattacks on mobile devices become more common, Lookout research reveals the Tactics, Techniques, and Procedures that threat actors use to target both individuals and enterprises in an effort to breach organizational security.
Join Michael Simpson, Senior Solution Engineer at Lookout, for a real-world look at the threats targeting your mobile fleet and what you can do about them in 2025 and beyond:
Walk away with actionable strategies to stay a step ahead and keep your mobile endpoints secure.
Hoe houd je grip op security in een wereld die continu verandert?
Van e-mail tot endpoint, van privilege tot zichtbaarheid — deze experts nemen geen blad voor de mond.
Laat je bijpraten, uitdagen en inspireren.
For many CISOs and security experts, information security feels like a relentless uphill battle. There’s always another regulation to navigate, another organizational roadblock to overcome, and another technical vulnerability to fix. It’s a world of constant pressure, and for many, it can feel like their work is simply ROT — Regulation, Organization, and Technology — each a source of frustration rather than a force for security.
But why does it have to be this way? Why do those responsible for safeguarding organizations often end up feeling overwhelmed? In my upcoming talk, I will explore the reasons behind this struggle and, more importantly, how we can change it.
We will take a close look at the three pillars of information security:
Regulation: How endless compliance requirements can create more confusion than clarity.
Organization: Why internal resistance and conflicting priorities often undermine security efforts.
Technology: The constant challenge of managing tools, vulnerabilities, and emerging threats.
But this talk is not just about identifying the problems — it’s about finding solutions. I will share practical strategies to help security leaders reclaim control, build resilience, and turn information security from a burden into a strategic advantage.
Join me for a fresh perspective on information security and learn how we can transform ROT into a foundation for security excellence.