SPEAKERS

SAMPLE OF KEYNOTE SPEAKERS AND THEIR CASE STUDIES

Achim KNEBEL

CISO Digital Industries

CASE STUDY / DAY 1

Zero Trust Adoption with IT and OT Converging

The presentation explains Zero Trust principles and provides first-hand experience of implementation in IT and OT.

  • Zero Trust principles
  • How to slice the adoption
  • Experience on how to implement Zero Trust in environments with legacy application and devices in IT and OT
  • Outlook
CASE STUDY / DAY 1

Hack Your Mind – Better Security by Understanding People

Another day, another breach. It sometimes looks like we are trapped in a cybersecurity hamster wheel… Those pesky users must have clicked on a phishing link again. In this session, we make the claim for a more human-focused, empathetic security organisation. Simpler security, designed and executed by a customer-obsessed team to show that usability and security are not opposites but actually two sides of the same coin. So, no more security awareness for people, but people awareness for security!

  • Examples of bad design and good design (outside of security)
  • What makes something usable? That’s all well and good – but isn’t our field special (spoiler: it’s not)?
  • Let’s explore 3 different security scenarios from beginning to end and see how we can improve them (in every aspect – so not just technology)
    1.Logging in
    2. Dealing with phishing and potentially malicious websites
    3. Sending sensitive information (scenarios might still change)

Summarise into concrete take-aways: what to start doing next day back in the office, next month and next year?

Jelle NIEMANTSVERDRIET

National Security Officer

SUMMIT WILL HOST SPEAKERS FROM THE WORLD’S LEADING COMPANIES

Achim KNEBEL

CISO Digital Industries

CASE STUDY DAY 1

Zero Trust Adoption with IT and OT Converging

The presentation explains Zero Trust principles and provides first-hand experience of implementation in IT and OT.

• Zero Trust principles
• How to slice the adoption
• Experience on how to implement Zero Trust in environments with legacy application and devices in IT and OT
• Outlook

Jelle

NIEMANTSVERDRIET

National Security Officer

CASE STUDY DAY 2

Hack Your Mind – Better Security by Understanding People

Another day, another breach. It sometimes looks like we are trapped in a cybersecurity hamster wheel... Those pesky users must have clicked on a phishing link again. In this session, we make the claim for a more human-focused, empathetic security organisation. Simpler security, designed and executed by a customer-obsessed team to show that usability and security are not opposites but actually two sides of the same coin. So, no more security awareness for people, but people awareness for security!

• Examples of bad design and good design (outside of security)
• What makes something usable? That's all well and good - but isn't our field special (spoiler: it's not)?
• Let's explore 3 different security scenarios from beginning to end and see how we can improve them (in every aspect - so not just technology)
1. Logging in
2. Dealing with phishing and potentially malicious websites
3. Sending sensitive information (scenarios might still change)
Summarise into concrete take-aways: what to start doing next day back in the office, next month and next year?

Guglielmo IOZZIA

Associate Director – Data Science, ML/AI, Computer Vision

CASE STUDY DAY 2

The Dark Side of Deep Generative Models: Could CyberSecurity Ignore It?

Applications of Deep Learning Generative Models in diverse industries
are becoming a reality. While these neural networks have a great potential for good, they are also used to generate fake content (video, audio,
other) with malicious purposes. This presentation is about understanding the good and the evil sides of Generative Models, what’s the state-ofthe-art for them, which risks they add from a cyber-security standpoint
(and not only) and what mitigation (if any) is currently available for these
matters.
• Deep Learning Generative Models 101
• Real-life applications of Generative Models in diverse industries
• Risks associated with them
• Is there any risk mitigation available for deep fakes?

Nitesh KUMAR

RISK ORM - Global Head of Cyber and Payment Systems Risk, Controls Testing and Automation Center

CASE STUDY DAY 1

Managing Skill Gap with Automation for Cyber Defence

There is an exponential increase in the demand for qualified resources to manage and defend the cyber risks.

• Identify Crown Jewels
• Understand The Process/Data Flow
• IT And Business Work Together in Identify Critical Asset
• Define Risk Appetite
• Third Party Dependency

Marc O'REGAN

CTO | EMEA

CASE STUDY DAY 1

Distributed Architecture & Trust for the Information Era

During this talk, Marc will address the Architecture Ecosystem that presents many challenges and many opportunities at organizational, industry and indeed societal level. This is the "Data Decade" and the complexity and dependency on systems to understand, communicate and intercommunicate with each other with trust is enormous. This talk will examine data, threats & trust as we scale workloads and services across the new “Cloud infra” ecosystem.

• Distributed Architecture
• Cyber and other threat posture
• Modern Analytics & Architecture
• The New Infrastructure "Cloud" Model

Guglielmo IOZZIA

Associate Director – Data Science, ML/AI, Computer Vision

CASE STUDY / DAY 2

The Dark Side of Deep Generative Models: Could CyberSecurity Ignore It?

Applications of Deep Learning Generative Models in diverse industries are becoming a reality. While these neural networks have a great potential for good, they are also used to generate fake content (video, audio, other) with malicious purposes. This presentation is about understanding the good and the evil sides of Generative Models, what’s the state-ofthe-art for them, which risks they add from a cyber-security standpoint (and not only) and what mitigation (if any) is currently available for these matters.

  • Deep Learning Generative Models 101
  • Real-life applications of Generative Models in diverse industries
  • Risks associated with them
  • Is there any risk mitigation available for deep fakes?
CASE STUDY / DAY 2

Managing Skill Gap with Automation for Cyber Defence

There is an exponential increase in the demand for qualified resources to manage and defend the cyber risks.

  • Identify Crown Jewels
  • Understand The Process/Data Flow
  • IT And Business Work Together in Identify Critical Asset
  • Define Risk Appetite
  • Third Party Dependency

Nitesh KUMAR

RISK ORM - Global Head of Cyber and Payment Systems Risk, Controls Testing and Automation Center

Marc O'REGAN

CTO | EMEA

CASE STUDY / DAY 2

Distributed Architecture & Trust for the Information Era

During this talk, Marc will address the Architecture Ecosystem that presents many challenges and many opportunities at organizational, industry and indeed societal level. This is the “Data Decade” and the complexity and dependency on systems to understand, communicate and intercommunicate with each other with trust is enormous. This talk will examine data, threats & trust as we scale workloads and services across the new “Cloud infra” ecosystem.

  • Distributed Architecture
  • Cyber and other threat posture
  • Modern Analytics & Architecture
  • The New Infrastructure “Cloud” Model

Great event, very interactive. I liked the quality of presentations and interactions with participants.

– CTO Identity & Access Management, IBM

Event programme

Fill your details in the form and we will
send you the whole brochure filled with all details

Your copy of the brochure is prepared.

Inside you will find

  • What keynote speakers will be taking part in the exclusive speaking panel
  • What Case Studies will be discussed by our senior corporate speakers
  • The minute by minute breakdown of the conference