The Future of IT & Cybersecurity

CIO & CISO Think Tank

October 26, 2023 - Copenhagen, Denmark

VISIONARIES & SPEAKERS

Anders Jaegerskou

Country Manager Mandiant Denmark & Norway

Google Cloud

Think Tank Speaker

Anders is the Country Manager for Mandiant in Denmark and Norway and joined Mandiant in 2016. Anders helps customers with professional advisory within the development of Cyber Security maturity and capabilities. Anders has a background of +20 years in the Cyber Security industry working for Oracle, Dell Trend Micro and Ericsson.

Dado Dizdar

Regional Enterprise Account Manager

KnowBe4

Think Tank Speaker

Dado Dizdar is a seasoned professional with over 8 years of experience in cyber security. As a Enterprise Account Manager he is dedicated to advising organizations on how to build a mature security culture.With the understanding that security awareness training is not a one size fits all, he loves to enable organizations to build their most effective program to create and maintain a secure human layer.Within his role as Enterprise Account Manager he is able to function as a sounding board across multiple regions and industries, gaining valuable insights. He enjoys discussing strategy regarding security awareness and provides his perspective about all facets related to security awareness helping the industry grow even more.

Tom Hornung

Lead Solutions Architect, EMEA

Synack, Inc.

Think Tank Speaker

Thomas Hornung is an IT professional with over 20 years of experience in IT Security, Infrastructure and Service Management. He has been assisting numerous enterprises throughout Europe in understanding, mapping and addressing their requirements, especially in the domains of Vulnerability Management, Endpoint Security, Critical Communications and Privileged Account Management. Today his focus as Lead Solution Architect at Synack is directed towards assisting organisations with the definition and preparation of pentests.

Kristoffer Overgaard

Head of Customer Engineering

Google Cloud

Think Tank Speaker

Kristoffer is leading the Cloud Technology organization in Denmark supporting customers with growth and innovation across all industries Kristoffer joined Google Cloud in 2019. Kristofer has a background of +20 years in the IT industry working for Microsoft, Dell Technologies and HP covering various leadership positions within Solution Sales.

Jason Stutt

CRO

ArmorCode

Think Tank Speaker

As Chief Revenue Officer of ArmorCode, Jason brings with him more than 25 years of go-to-market leadership, while working intimately with Fortune 1000 customers. Previous to ArmorCode, Jason served as Duo Security's SVP Sales, where he helped customers secure access to their assets while building Duo into a unicorn in the marketplace. Jason grew annual sales from just a few million dollars to more than $150 million ARR over a period of four years before their $2.35B acquisition by Cisco Systems. Jason has also held senior executive positions at Abnormal Security and Luminate Security along with investing and participating on several boards for silicon valley start-ups.

Dirk-Jan van Helmond

Director of Solutions Engineering EMEA

Cloudflare

Think Tank Speaker

Dirk-Jan leads the Solutions Architecture group for Cloudflare in EMEA with the main goal to help our customers transform their business and benefit from technological innovations around cloud networking, cloud security and workforce transformation, e.g. with the enablement of work from home with fundamentally secure solutions. Previously, Dirk-Jan was a Technical Sales Leader at Cisco, working with the top 20 Enterprise accounts in the Netherlands.

Neil Thacker

CISO (EMEA) & DPO

Netskope

Think Tank Speaker

Neil Thacker, a cybersecurity executive and co-founder holds over 20 years’ experience in the cybersecurity and technology industry. As Netskope Chief Information Security Officer EMEA, Neil works alongside product and engineering teams to ensure the secure delivery of Netskope technology and services. With a focus on data protection and regulatory compliance, Neil works with Netskope customers to ensure their security programmes are both optimised and can deliver on their strategic requirements in a cloud-first world. Prior to joining Netskope, Neil served at Swiss Re, Deutsche Bank, Camelot Group and Forcepoint. Neil is co-founder and board member of the Security Advisor Alliance (SAA), a not-for-profit organisation formed to both help security leaders in their role and to promote information security and cybersecurity careers to future generations. Neil is Advisory Board member for the Cloud Security Alliance (CSA) EMEA and member of the ENISA Threat Landscape stakeholder group where he contributes to the EU agency program to position the threat landscape, mitigation advice and threat analysis and innovation. Neil is Advisory Board member to NeuroCyber, supporting and coordinating national activity, awareness, knowledge and action on improving neurodiversity and inclusion in cybersecurity. Neil is CISSP, CIPP/E and CEH certified and is a frequent speaker and writer on cybersecurity, data protection and privacy-related topics.

October 26, 2023

Agenda

All times Central European Time

8:30 AM-9:00 AM

Registration


9:00 AM-9:30 AM

Morning Networking


9:30 AM-9:40 AM

Opening Remarks


9:40 AM-10:10 AM

The Promising Future of Artificial Intelligence (AI): Opportunities and Challenges Ahead

The potential of Artificial Intelligence (AI) is vast, as it is now being utilized across all industries. With the combination of machine learning, AI has made significant improvements in the field of cybersecurity. Automated security systems, natural language processing, face detection, and automatic threat detection are some examples of how AI is revolutionizing cybersecurity. However, AI is also being used to create intelligent malware and attacks, which can bypass the most up-to-date security protocols, making it a double-edged sword. On the positive side, AI-enabled threat detection systems have the ability to predict new attacks and immediately notify administrators in case of a data breach


10:10 AM-10:25 AM

Poor Cyber Hygiene

In the digital age, practicing good cyber hygiene is essential to maintaining the security and integrity of personal and business data. However, in 2023, the lack of basic cyber hygiene practices will continue to be a major cause of cyber incidents. Cybercriminals exploit these vulnerabilities to gain unauthorized access to sensitive information, steal data, and launch damaging cyber attacks. It's crucial for individuals and businesses to prioritize basic cyber hygiene practices, such as using strong passwords, regularly updating software, and backing up data. Additionally, individuals and businesses must educate themselves and their employees on cybersecurity best practices and the latest threats to stay ahead of the evolving threat landscape. By taking these proactive steps, individuals and businesses can protect themselves from cybercriminals who prey on poor cyber hygiene practices.


10:30 AM-11:15 AM
Vision Keynote Panel

Bridging the Gap Between IT and the Business

Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.

For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.


11:15 AM-11:40 AM

Networking Break


11:40 AM-11:55 AM
Disruptor

Enable Cloud Innovation at Speed with Continuous Security Testing

Many cloud migration projects struggle to deliver on project objectives, and most cloud migration teams aren’t confident in their security posture during the transition.

Even fewer teams can communicate measurable security metrics and trends from their programs to leadership in a way that creates confidence and trust in the new solution.

Join us for a discussion on leveraging continuous security testing for cloud migration projects, and the challenges and requirements for effective continuous testing. 

In partnership with:

12:00 PM-12:15 PM
Disruptor

The Most Important Shift for Cybersecurity in a Generation

We live in a fully hybrid world. The mix between personal and corporate devices and private and public services is evolving and exposes organisations to both new challenges and new risks. The pressure to converge legacy controls and do “more with less” is now at peak levels. We must therefore approach this challenge with the right strategy that fully optimises our investment in securing web and cloud whilst protecting against new threats and securing sensitive information...whilst ensuring a great user experience for our remote workforce.
Join this session to learn:
- How to build a strong plan for network and security transformation...without adding to the chaos
- Prioritisation and rationalisation tactics that can help quickly reduce and report on risk
- Critical use cases to prioritise that deliver tactical value and efficiency today

In partnership with:

12:15 PM-1:10 PM

Lunch


1:10 PM-1:25 PM
Disruptor

Enhancing the Resilience of Your Organization's Final Barrier: The Human Firewall

In today's digital landscape, social engineering attacks like phishing, Business Email Compromise (BEC), and Ransomware are increasingly prevalent. These cunning tactics rely on manipulating humans to gain unauthorized access to protected systems and sensitive data. As the frequency of such cyber-attacks rises, it is crucial to fortify your organization's last line of defense: the human firewall.

In this session we will look into case studies around:

  • Regular, tailored security awareness training to educate employees about social engineering threats.
  • Foster a reporting culture for prompt identification of suspicious activities.
  • Strengthen password policies and use multi-factor authentication (MFA) to reduce risks.
In partnership with:


2:10 PM-2:55 PM
Panel

Ransomware

Ransomware attacks are becoming increasingly prevalent and sophisticated, affecting businesses and individuals in all sectors. In 2023, these attacks are expected to continue to grow, resulting in significant financial losses, data theft, and reputational damage. Businesses should implement comprehensive security measures, including regular backups, employee training, and endpoint security, to minimize the risk of a ransomware attack. Additionally, it's important to have a response plan in place to minimize the impact of an attack if it does occur.


2:55 PM-3:15 PM

Networking Break


3:15 PM-3:30 PM
Disruptor

Streamlining Vulnerability Management for Faster Risk Reduction

In today's fast-evolving digital landscape, achieving comprehensive control over your organization's cybersecurity vulnerabilities is imperative. This necessitates a holistic approach that consolidates all vulnerability management efforts. By unifying your vulnerability management, you can gain a clear and comprehensive view of all potential security weaknesses across your digital assets. This comprehensive visibility enables you to apply effective risk scoring and prioritization strategies, ensuring that your limited resources are allocated to address the most critical threats first. In turn, this unification allows for more efficient and streamlined remediation processes, accelerating your efforts to reduce risk, bolster security, and safeguard your digital infrastructure from emerging threats.

In partnership with:

3:35 PM-3:50 PM
Disruptor

A Resilient Internet: Stronger, Leaner, Greener, Open and Interconnected

Cloud migration and sustainability goals are intrinsically linked in today's digital landscape. As organisations increasingly transition their IT infrastructure to the cloud, they not only gain operational efficiencies and scalability but can also contribute to a more sustainable future. As businesses are expanding their operations beyond geographical boundaries, global interconnectivity faces significant risks due to legislative actions and policies adopted by various countries. One of the most pressing concerns is the proliferation of data localisation laws, which require companies to store data within the borders of a specific jurisdiction. While such regulations are often enacted for reasons of data sovereignty and national security, they can hinder the smooth flow of information across borders and disrupt global interconnectivity. Compliance with these laws can lead to increased operational costs, data fragmentation, and reduced flexibility for businesses that rely on global cloud services

In partnership with:

3:55 PM-4:30 PM
Fireside Chat

Social Engineering: New in 2023

Social engineering attacks are a growing concern for businesses and individuals alike, as cybercriminals continue to use advanced techniques to trick people into divulging sensitive information or performing actions that can lead to data breaches. In 2023, these attacks are expected to become even more sophisticated, making it increasingly challenging for individuals and businesses to identify and prevent them. To protect themselves, individuals and businesses must be vigilant and aware of these tactics. They must also implement comprehensive security measures, such as security awareness training, anti-phishing software, two-factor authentication, and access controls. Additionally, businesses must establish policies and procedures for responding to social engineering attacks, including incident response plans, data backup and recovery, and regular security assessments. By taking these proactive steps, businesses and individuals can better protect themselves from the risks associated with social engineering attacks in 2023 and beyond.


4:30 PM-4:35 PM

Closing Remarks & Raffle Giveaway


4:35 PM-5:35 PM

Cocktail Hour


IN PARTNERSHIP WITH