Agenda


The TEISS Amsterdam 2019 agenda is below, with more speakers and sessions being added regularly.

08:00 Registration and welcome refreshments

Chair’s welcome and introduction

by Martin Smith MBE, Chairman & Founder, The Security Company Show Profile

09:00

Internet Organised Crime Threat Assessment – trends for 2019 in cyber-dependent crime

Plenary keynote

  • Key findings in the four crime priority areas
  • The convergence of cyber and terrorism
  • Cross-cutting crime factors, including social engineering
  • Future threats and developments

by Steven Wilson, Head of European Cyber Crime Centre, Europol Show Profile

09:10

NIS implementation: How are Competent Authorities assessing the cyber security of Operators of Essential Services

Plenary panel discussion

  • The current state-of-play of the transposition of the NIS Directive across the EU
  • How do Competent Authorities’ responsibilities vary across the bloc?
  • Defining an NIS incident and the relationship between an NIS and a GDPR incident
  • Inspection of Competent Authorities
09:30

Critical Success Factors for Effective Business Information Security and translating the theory into practice

Plenary keynote

  • What are the factors that your organisation can adopt in order to improve your Cyber Security maturity levels?
  • Practical guidance to make your organisation more cyber resilient

by Yuri Bobbert, Global Head of Risk, Security & Compliance, NN Group Show Profile

10:20

The six “critical norms” towards cyber stability – working together to combat intellectual property violations via the Internet, and improving everyone’s Cyber Hygiene

Plenary keynote

  • Building a strengthened multi-stakeholder approach to reduce risks to the stability of cyberspace
  • Enhancing digital cooperation and increase capacity-building efforts by all actors
  • The Paris Call for Trust and Security in Cyberspace and developing common principles for securing cyberspace
  • Responsibilities of key private sector actors in improving trust, security and stability in cyberspace

by Marina Kaljurand, Chair, Global Commission on the Stability of Cyberspace Show Profile

10:40

11:00 Morning refreshments & networking

Successfully implementing a NextGen SIEM: Key tips for success

Roundtable discussion

11:30

Alternative approaches to recruitment: Attracting and retaining talent from non-traditional routes

Roundtable discussion

11:30

Delivering cyber security at pace: Can information security avoid being “the blocker” as the business transforms and grows?

Roundtable discussion

11:30

Is cyber security training a waste of your budget? Where to focus security education to have the greatest impact

Roundtable discussion

11:30

How do you run your hacking and incident response exercises, and how do these replicate “live” threats?

Roundtable discussion

11:30

Workshop 1 Title

Interactive workshop

11:30

12:30 Lunch & networking

What are the barriers to better organisational cyber hygiene, and how to overcome them

Case study presentation

  • How can you connect the need for improved cyber security to a risk appetite in an organisation?
  • Defining a baseline set of practices for managing risk
  • Developing a risk framework to judge the severity of threats
  • Stretching your budget to mitigate critical risks
13:40

Identifying threats in your information supply chain: Do any 3rd party compliance assessments improve your security?

Case study presentation

  • What do compliance checklists really protect?
  • Which compliance questions reveal the biggest security risks with 3rd parties
  • Alternative approaches to identifying risk in the supply chain
  • How to work up and down the supply chain to improve information security

by Victoria van Roosmalen, CISO & DPO, Coosto Show Profile

14:05

How do you measure the impact of your information security and awareness programmes?

Panel discussion

  • The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitative
  • Recognising and reflecting behavioural psychology, cognitive abilities, social attitudes and modern work-environments
  • Definitions and objectives – what do we want the end ‘culture’ to look like, so that we can establish progress against this
  • Can you measure employees’ emotions about organisational security?

by Luisella ten Pierik, CISO, Stedin Show Profile

14:30

Chair’s opening remarks

13:30

Creating a synergy and effectively combining a cybersecurity framework with an Information Security Management System

Case study presentation

by Matthias Muhlert, CISO, HELLA Show Profile

13:40

The Quantum Threat and a three-phase plan to prepare your business today

Case study presentation

  • Bigger keys, QKD, and Post Quantum
  • Being agile when it comes to encryption
  • Quantum key distribution to preserve the integrity and confidentiality of data
  • Post-quantum cryptography for devices, software and networks

by Jaya Baloo, CISO, KPN Show Profile

14:05

External Threats: Emerging trends in 2019, and predictions for 2020 and onwards in cyber criminality

Panel discussion

  • Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter intrusive attacks
  • Managing the nuances of a threat management discipline in a risk management culture
  • The rise of crypto-jacking and the potential of AI for attack
  • Changing geo-political context affecting the threat environment for commerce and industry

by Jaya Baloo, CISO, KPN Show Profile

14:30

15:20 Afternoon refreshments & networking

Leading Organisational Security Change: Tactics for maintaining and measuring an effective programme

Case study presentation

  • Evolving Security from a technology to a business function
  • Making Security measurable through proper KPIs and SLAs
  • Embedding Security targets into the company and employee performance targets
  • Building co-interested Security alliances throughout the company

by Sebastian Avarvarei, Director Advisory Security Services – Europe, Wolters Kluver Show Profile

15:50

How is the CISO role changing, and how do CISOs succeed?

Panel discussion

  • Is the CISO job is a poisoned chalice?
  • What is the average shelf-life of a new CISO, and how to prolong it
  • Setting your scope, boundaries and where value can be added
  • Can CISOs survive a breach?

by Yuri Bobbert, Global Head of Risk, Security & Compliance, NN Group Show Profile

16:15

The updated ePrivacy regulation: What to expect and how to prepare

Legal briefing

  • Current status of the regulation
  • How it will impact your business
  • Best practices to build and implement a compliance plan
  • Adopting privacy-by-design ahead of the regulation

by David Dumont, Counsel, Hunton Andrews Kurth Show Profile

15:50

Data security in cloud operations: Setting, adhering to, and leading an effective data governance strategy that protects your most valuable data

Panel Session

  • Is there a “best method” for data migration?
  • Setting rules to manage different types of business data
  • Balancing risk management with the needs of the stakeholders who access the data
  • Defining the role of your data subject matter experts

by Arnoud Tijssen, Cyber Security Consultant, The Future Group Show Profile

16:15

17:00 Drinks reception & networking

back to top

Copyright © Lyonsdown Ltd. 2018. All rights reserved. TEISS® is a registered trademark of Lyonsdown Limited.