Networking Event Wall
Thursday
September 8, 2016
+ -
  • 08:30 AM
  • 09:00 AM
  • 09:30 AM
  • 10:00 AM
  • 10:30 AM
  • 11:00 AM
  • 11:30 AM
  • 12:00 PM
  • 12:30 PM
  • 01:00 PM
  • 01:30 PM
  • 02:00 PM
  • 02:30 PM
  • 03:00 PM
  • 03:30 PM
  • 04:00 PM
  • 04:30 PM
  • 05:00 PM
  • 05:30 PM
  • 06:00 PM
  • 06:30 PM
Auditorium
09:00 AM - 10:00 AM Morning plenary session Welcome Address and Opening Plenary: What You Don’t Know Can Harm You
Image
  • Freddy Dezeure
  • CERT-EU
Image
  • Merike Kaeo
  • Farsight Security
10:00 AM - 10:30 AM Different Steps for Dealing with Cyber Attacks on a Country Level: Do’s and Don’ts … In this presentation, the director of the Center for Cybersecurity Belgium (CCB) will share his real-world experiences in dealing with a major cyberattack. 04:15 PM - 04:45 PM Clearing the Hurdles to Realise the Value of Threat Intelligence: IOCs, TTPs, and Sharing Organizations in Critical Infrastructure ICS-ISAC Chief Executive Officer, will share information on how his organization teamed up to create a platform for critical infrastructure operato... 11:30 AM - 12:00 PM Building an Efficient Incident Response Process Using Threat Intelligence: A Global Enterprise Perspective Thomas Schreck from Siemens CERT will open up by providing an overview of the efforts and challenges experienced while working for a large global company where IT plays a key role in every area. 12:00 PM - 12:30 PM Financial Sector Use Case: Progress on Cyber Threat Information Sharing and Analysis First hand information on how FS-ISAC is helping the financial institutions understand the evolving cyber threats and to prevent, detect and respond more effectively to these threats. 02:00 PM - 02:30 PM If It’s Worth Sharing, It’s Worth Sharing Right―Technical, Policy and Legal Considerations of Cyber Threat Intelligence Sharing This talk is intended to help individuals and organizations that have decided to share cyber threat intelligence do so in as an effective manner. 02:30 PM - 03:45 PM A New Security Dimension Roundtable: Industry Experience Using STIX, TAXII, and CybOX to Accelerate Threat Response STIX, TAXII, CybOX operational implementations and real-world lessons learned from key implementers.
Image
  • Joep Gommers
  • EclecticIQ
Image
  • Mike Small
  • KuppingerCole
Image
  • Daniel Riedel
  • New Context, Inc.
Image
  • Jason Keirstead
  • IBM Security Intelligence
Image
  • Alex Valdivia
  • ThreatConnect, Inc.
Image
  • Frank Lange
  • Anomali
11:00 AM - 11:30 AM Best Practices in Information Sharing Across Governments, SMEs, and Vertical Communities Security incidents are not restricted to specific geographical locations or administrative boundaries.
Image
  • Alexandre Dulaunoy
  • Computer Incident Response Center Luxembourg-CIRCL
04:45 PM - 05:00 PM Conference Chair Closing Remarks
Image
  • Freddy Dezeure
  • CERT-EU
Friday
September 9, 2016
+ -
  • 08:30 AM
  • 09:00 AM
  • 09:30 AM
  • 10:00 AM
  • 10:30 AM
  • 11:00 AM
  • 11:30 AM
  • 12:00 PM
  • 12:30 PM
  • 01:00 PM
  • 01:30 PM
  • 02:00 PM
  • 02:30 PM
  • 03:00 PM
  • 03:30 PM
  • 04:00 PM
  • 04:30 PM
Auditorium
09:00 AM - 10:00 AM Morning plenary session Keynote Address: Recent EU actions on cybersecurity in particular around NIS and the cPPP
Image
  • Freddy Dezeure
  • CERT-EU
Image
  • Andrus Ansip
  • European Commission
10:00 AM - 10:30 AM Breaches & Boardrooms: Bringing cyber to the Board of Directors & C-level and keeping it there Cyber security is not anymore an IT problem, it is a company-wide issue that must be managed across the whole organization.
Image
  • Dirk Lybaert
  • Proximus
11:00 AM - 11:30 AM The Business of Battle Readiness: Over-the-Horizon Threat Management for Companies and Agencies Chief Security Officer for ADP, Roland Cloutier, will provide innovative insights to how companies must utilize over-the-horizon planning, intelligence, and resource alignment to ensure the protect... 02:00 PM - 02:30 PM IT Security @ Volkswagen Ensuring their organization leverage information to establishing sustainable approaches for managing risk and reducing the likelihood of becoming the next breach, is now a primary mandate for CISOs. 11:30 AM - 12:30 PM Cyber Threat Intelligence Information Sharing Collaboration Roundtable: Increasing Awareness of Vulnerabilities, Incidents, & Mitigations Industry leaders offer insight to how they’re navigating threats by identifying vulnerabilities with actionable remediation recommendations and enabling proactive mitigation to exploitable risks.
Image
  • Ian West
  • NATO C&I Agency
Image
  • Paul Timmers
  • European Commission
Image
  • Hans de Vries
  • 'National Cyber Security Centre '
PC
  • Paul Chichester
  • NCSC
02:30 PM - 03:00 PM Can You report to Your Board on Cyber Security with One Single Indicator? Approach for CISOs to Measure and Report Risk & Maturity on a Group Level The speaker will provide his insight from a company operating in different countries with strong local commercial focus and accountability on cyber... 03:00 PM - 03:30 PM Combating Deliberate & Destructive Attacks: Lessons Learned from a Real Event, Unprecedented in the World History of Broadcasting Real world experiences after an unprecedented hack by self-proclaimed Islamic State militants.
Image
  • Alexis Renard
  • TV5Monde
04:00 PM - 05:00 PM Cyber Security and The General Data Protection Regulation – Obligations, Challenges and Solutions Experts discuss how the GDPR includes provisions that will have significant impact on businesses and governments internationally, and bring new obligations and challenges for cybersecurity policy development and operational practices.
Image
  • Wim Nauwelaerts
  • Hunton & Williams
Image
  • Stewart Room
  • PwC Legal
Image
  • Ann Cavoukian
  • Ryerson University
Image
  • Gershon Janssen
  • OASIS Board of Directors