600Minutes Cyber Security Strategies

600Minutes Cyber Security Strategies jumps right into the burning issues of cyber security in the digitazing world and takes a multifaceted approach to threat prevention.

When

September 5, 2017

Where

Spant!

Doctor Abraham Kuyperlaan 3

The Netherlands

Speakers

Rence Damming

Chief Information Security & Privacy Officer
Pon Holdings

Menny Barzilay

Cyber Security Strategist, Former CISO, Israeli Defense Force
Menny Barzilay

Rob Havermans

Manager Security Advisory and deputy CISO
Rabobank

Joseph Mager

Information Security Officer
NS Groep

Joram Teusink

Information Security Officer
wehkamp.nl

Brenno de Winter

Cyber strategist and author
Speaker

Olav Verhoef

Manager Digital Product Development Europe
Pearson

Victor Gevers

Ethical Hacker, Co-Founder
GDI Foundation
DELEGATES

Confirmed attendees

Alliander N.V.
Manager Internal Audit
Vrije Universiteit Amsterdam
CIO
Stern Groep N.V.
ICT Manager
Justiƫle informatiedienst
CISO
wehkamp.nl
Information Security Officer
Detailresult Groep NV
Manager Infrastructure ICT
Handelsbanken AB
Security & BCM Officer
Pearson
Manager Digital Product Development Europe
FrieslandCampina
CISO
CZ
Security Management & IT Compliance Manager
Ministerie van Veiligheid & Justitie
CISO
Menny Barzilay
Cyber Security Strategist, Former CISO, Israeli Defense Force
Philips International B.V.
Risk & Control Officer, Security Platform
Triodos Bank
Information Security Officer a.i.
Ericsson
Head of Security Benelux
Rabobank
Manager Security Advisory and deputy CISO
Red Bull GmbH
Head of Digital Security
Pon Holdings
Chief Information Security & Privacy Officer
NS Groep
Information Security Officer
Speaker
Cyber strategist and author
The Themes

In Discussion

How do you manage security in a continuously changing environment?

Implications of cloud strategy on security: How do you manage security in the entire chain?

Innovations regarding identity and access management

Key focus on data protection to prepare for the European legislation

The strength and weakness of a risk based cyber security approach vs. the day to day reality

The Sponsors

Solution Providers