IN-PERSON

Benelux CIO Executive Summit

4 October 2022 | Hotel Okura, Amsterdam

4 October 2022
Hotel Okura, Amsterdam

Collaborate with your peers

Get together with Benelux's top CIOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CIOs today:

Looking to the future and collaboration of the CIO & CISO roles

Adapting to ever-changing digital business strategies, with security at the forefront

Accelerating high growth & a data first mindset, while empowering talent & protecting the enterprise

Benelux CIO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CIOs, for CIOs.

Governing Body Co-Chairs

Allan Cockriel

Shell
VP and CIO for Global Functions and Information Risk Management, Group CISO

Ing Yan Ong

Heineken
Global CIO

Eelko van Leeuwen

ABN AMRO Clearing Bank NV
Global CIO

What to Expect

Interactive Sessions

Hear from CIO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Benelux CIO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


3 October 2022

18:00 - 21:00  Governing Body Welcome Reception

Governing Body Welcome Reception

This reception is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, speciality cocktails, wine, and lively networking.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

The Role of the CIO and CISO in Becoming the Best Connected Brewer

Ing Yan Ong headshot

Ing Yan Ong

Global CIO

Heineken

Jan Joost Bierhoff headshot

Jan Joost Bierhoff

Global Director Information Security (CISO)

Heineken

Recent times of crisis have demonstrated how swiftly disruptions can arise and push organisations to address them. The CIO and CISO play a crucial part in accelerating and securing digital business, especially in times of uncertainty. This requires strong partnership and communication between CIO and CISO. Join Ing Yan and Jan Joost as they share their combined journey of responding to times of crisis whilst ensuring the security and continued progress of digital business within HEINEKEN. 

Specifically you will hear:

  • How HEINEKEN is becoming the Best Connected Brewer
  • Implications for cyber security approach and culture across the organisation
  • Challenges and learnings and how Ing Yan and Jan Joost collaborate to overcome them

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

The New CIO Leadership Principles for Digital Business Acceleration

VC Gopalratnam headshot

VC Gopalratnam

EVP & Global CIO

Philips

Edward Groen headshot

Edward Groen

Vice President Executive Programs

Gartner

Ben Wishart headshot

Ben Wishart

Global Chief Information Officer

Ahold Delhaize

The pace at which digital business has progressed has meant that IT leaders must evolve their strategies quickly. This doesn’t mean only focusing on the ever changing technical capabilities of digital technologies, but rather how to conduct themselves in these leadership roles, both in their own teams and across the business. IT and Technology leaders must broaden their skillsets beyond technical expertise in order to become true leaders and pioneers of change. 

Join this session for thoughts and insights into:

  • How to build trust and transparency between IT and business partners
  • Building diverse teams and building a culture of ‘giving back’
  • How IT Leaders can leverage influence and leadership with key business units to strengthen their digital transformation vision

**This Session is for CIOs Only**

10:00 - 10:45  Executive Boardroom

The Modern CISO’s API Security Strategy – What’s Next?

Marcel van Leent headshot

Marcel van Leent

Global IT Security & Compliance Manager, CISO

JDE

Dimitri Van Zantvliet Rozemeijer headshot

Dimitri Van Zantvliet Rozemeijer

CISO

Nederlandse Spoorwegen

Filip Verloy headshot

Filip Verloy

Technical Evangelist EMEA

Noname Security

In today’s climate, having a holistic view on API security is key to protecting organisations from the ever-expanding API attack surface. Proactively securing your environment from API security vulnerabilities, misconfigurations, and design flaws are among the biggest challenges that security leaders face. But how can CISOs identify and eliminate attack surfaces before an attack, and actively test APIs for vulnerabilities throughout the lifecycle, in addition to preventing real-time attacks? 

Join this session to discuss:

  • Remediating management and configuration issues before they become a problem
  • Security testing for DevOps that integrates into the tools your team is already using
  • How to build a framework and network architecture to support the rise in remote employees

10:45 - 11:30  Networking Break

10:55 - 11:20  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:30 - 12:15  Breakout Session

Cybersecurity and Digital Risk Management – Communicating the Risk with the Business

Allan Cockriel headshot

Allan Cockriel

VP and CIO for Global Functions and Information Risk Management, Group CISO

Shell

For enterprise priorities, reducing risk maintains its spot as a top priority for IT and Security Leaders. This has never been more apparent in a year faced with uncertainty and global crisis. From the management board and audit and risk committee to external regulators, today’s technology leaders must navigate different tools and methodologies, yet remain confident they’re quantifying risk effectively. Join Allan Cockriel, CIO – Global Functions/IRM and CISO, Shell as he shared his insights and thoughts into communicating risk, as well as managing multiple risks on a global scale. 

Specifically, Allan will share:

  • The metrics CIOs and CISOs should be quantifying risk to the business
  • Stepping up to meet digital business needs in a time where uncertainty has never been more certain
  • Which methodologies and approaches can help transform the security relationship with the business

11:30 - 12:15  Executive Boardroom

Hybrid Work – Winning the War for Talent

Sasa Petrovic headshot

Sasa Petrovic

Digital Strategy Director

Citrix Systems, Inc.

Ray Mennink headshot

Ray Mennink

IT Director

Plukon Food Group

Rene Steenvoorden headshot

Rene Steenvoorden

Chief Digital Officer

Randstad

In fast changing business environments, you need to be agile, be more resilient and become a magnet for top talent. For CIOs, it’s more important than ever to understand your digital capabilities and use them to create a winning culture. But what else can CIOs do, apart from higher salaries to attract top talent into their organisation? 

Join this boardroom to discuss:

  • Rethinking technology and culture in a hybrid work world
  • Providing workspaces that help attract and retail top talent
  • Collaborative strategies to drive meaningful ways of working

11:30 - 12:15  Executive Boardroom

The Importance of Streamlining Security Operations

Justin Broeders headshot

Justin Broeders

CISO

Eneco

Sean McLeod headshot

Sean McLeod

CISO Retail

ING

Roderick Brouwer headshot

Roderick Brouwer

Regional Sales Director Benelux

Hunters

Demand for security roles is constantly increasing and organisations everywhere are facing the same issues time and again – from difficulties hiring and retaining staff to keeping up with security operational challenges. So how can CISOs make their SOCs run more effectively to enhance their security posture and ultimately evolve their security strategy around their workforce?

Join this boardroom to hear more on:

  • Improving data retention through automation and efficient processes
  • Amplifying and correlating the right signals while filtering out the noise
  • Dealing with complex supply chain attacks, insider threats and vulnerabilities

12:15 - 13:15  Lunch Service

13:15 - 13:50  Keynote

Third-Party Cyber Risk — Zero-Day Findings and Mitigation Managing

Dan Vasile headshot

Dan Vasile

Vice President, Cyber Strategy

BlueVoyant

Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers and partners
  • Approaches to identify, prioritise and mitigate active threats and critical/zero-day vulnerabilities
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day

13:50 - 14:00  Break

14:00 - 14:45  Breakout Session

Enterprise Security and Digital Risk – Can You Prepare for Evolving Threat Landscapes?

Oliver Madden headshot

Oliver Madden

Chrome Browser Enterprise Lead

Google Chrome Enterprise

As digital business continues to accelerate and cloud work continues to grow, many enterprise assets live outside the old “walls'' of the organisation. The role of the browser is changing rapidly. It’s now a critical endpoint; a strategic productivity and security layer in the enterprise tech stack. CIOs and CISOs alike must now ensure they have enterprise-grade security, speed and stability to empower the workforce and mitigate the risk of harmful web-based threats. 

Join this session to hear more on:

  • Thinking differently about architecting your environment through business transformation
  • How changing employee behaviours and the rise in flexible working is driving the need for new technology
  • Reconceptualising traditional ideas of how to approach security within the enterprise

14:00 - 14:45  Executive Boardroom

The Changing Face of the Digital CIO

Jens Löhmar headshot

Jens Löhmar

CTO

Workday

Patrick Putman headshot

Patrick Putman

CIO

Manuchar

Wim Vanderpoorten headshot

Wim Vanderpoorten

Global IT Director

Allnex

The focus of the CIO role is now on broader strategic projects and aligning an organisations IT infrastructure with its business goals. Liberated of some “lights on” concerns, today’s CIOs can directly influence product and service development by interacting with internal business partners and customers to better understand their needs. Some IT Leaders have the full backing of the board, and some are still leveraging newly found influence to find their seat at the table. But what are the key skill sets CIOs need to foster to ensure success and adapt at a time where business needs are quickly changing. 

Join this boardroom to discuss:

  • The need for CIOs to shift their mindset to focus on driving true business change and the vital role culture plays in this shift
  • The importance for CIOs to forge stronger relationships across the business
  • Practical steps CIOs can take to make digital journeys take hold, with a focus on harnessing data effectively, and gaining buy-in from other business leaders

14:00 - 14:45  Executive Boardroom

Accounting for Third-Party Risk in Strategic Planning

Mario Beccia headshot

Mario Beccia

Deputy NATO CIO for Cybersecurity

NATO

Kay Behnke headshot

Kay Behnke

CISO

Genmab

Rob Reijnders headshot

Rob Reijnders

CISO

FrieslandCampina

Jarle Eek headshot

Jarle Eek

Regional Director

RiskRecon

Third parties expose businesses to strategic, operational, financial, and compliance risks. Moreover, leaders have less visibility into third parties than into their own businesses. For many organizations, the pandemic exposed the fragility of the organisation’s third-party network and impressed the need to flex quickly to new third and fourth parties in the extended enterprise to meet demand without increasing risk exposure. 

Join this interactive session to discuss:

  • Standardising third-party risk management assessments to be used by business units
  • Maintaining visibility of all ongoing third-party relationships
  • Identifying and mitigating the risks of the third-party network

14:45 - 15:30  Networking Break

14:55 - 15:20  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

15:30 - 16:15  Breakout Session

Security Through a Data Breach Lens - Utilising the DBIR

Phillip Larbey headshot

Phillip Larbey

Managing Principal

Verizon

In the last few years, we have seen an abundance of nefarious events by offenders, both known and unknown, covering over tens of thousands of incidents and breaches. That same catalogue of activities also offers security leaders a first-hand view into current cybercrime trends, and a map towards developing a prosperous and mature security program. So how can IT leaders learn from past breaches to ensure a more secure future for their organisations?

Join this session to hear more on:

  • Key findings of DBIR 2022 embellished with Verizon's own Incident Response experience
  • Using data breach investigations to evolve your security strategy
  • How to respond to security incidents and protect your organisation

15:30 - 16:15  Executive Boardroom

Leveraging Automation to Keep Pace with Threat Detection and Response

Thomas Kinsella headshot

Thomas Kinsella

Co-Founder & Chief Operating Officer

Tines

Andrea Bergamini headshot

Andrea Bergamini

VP, CISO

Orbia

Ariel Lemelson headshot

Ariel Lemelson

Head of Cyber Detection & Response

Booking.com

Security teams are overloaded with alerts and manual tasks that slow down the speed at which they can respond to threats. Detections can take weeks to deploy and tune, and even when they do work, the alerts can still be noisy and tedious to respond to. CISOs are struggling to hire and retain analysts and engineers and want them to work on the most impactful, risk reduction efforts within their own organisation. How are CISOs prioritising high-risk activity and using automation to protect their organisations in real-time without interrupting workforce productivity? 

Join this boardroom to discuss:

  • The current state of Security Operations and continuous adaptation of security policies and access
  • Operational benefits and value driven by adaptive security capabilities with a risk focus
  • How security automation has assisted you in developing your risk mitigation strategy

15:30 - 16:15  Executive Boardroom

Connecting Business, Data, and Technology

Patricia de Lanlay headshot

Patricia de Lanlay

Group CIO

Aliaxis

Erik Yntema headshot

Erik Yntema

CISO

PostNL

Koen Vandaele headshot

Koen Vandaele

CIO

Mediahuis

The task of exploiting the full potential of new data and advanced analytics capabilities at scale typically face numerous challenges including the convergence of data protection and security. As a CIO, it's critical to develop a strong, clear strategy connecting business, technology, and data and analytics to maintain your competitive advantage and mitigate these challenges.

In this interactive session, you’ll discuss:

  • Identifying and defining quick-win opportunities supporting the business data strategy
  • Best practices for data protection and optimisation
  • Weaving cybersecurity through all facets of your approach to technology and data

16:15 - 16:25  Break

16:25 - 17:00  Keynote

The Economic Outlook for CIOs and CISOs – How to Prepare in Times of Crisis

Carsten Brzeski headshot

Carsten Brzeski

Global Head of Macro Research & Chief Economist Eurozone

ING

Recent events in Europe have shaken the expected recovery in the Eurozone and created prolonged periods of uncertainty and times of crisis for organisations and leaders. As turmoil persists, scenario planning can help CIOs and CISOs anticipate disruption in all possible contexts to prepare organisations for likely shifts in consumer trends and operations. Armed with the right information, technology leaders are ideally positioned to inspire customers, employees and fellow executives to pivot their organisations toward new ways of working and revenue streams. 

Join Carsten Brzeski, Global Head of Macro Research and Chief Economist Eurozone at ING as he shares his insights, research and views on:

  • The short-term economic outlook in the Eurozone and globally
  • The longer-term economic implications of current events in Europe on organisations
  • The projected impact on enterprise organisations and their IT and Security functions

17:00 - 18:00  Closing Reception & Prize Drawing

18:00 - 21:00  Governing Body Welcome Reception

Governing Body Welcome Reception

This reception is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, speciality cocktails, wine, and lively networking.

08:00 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

The Role of the CIO and CISO in Becoming the Best Connected Brewer

Ing Yan Ong headshot

Ing Yan Ong

Global CIO

Heineken

Jan Joost Bierhoff headshot

Jan Joost Bierhoff

Global Director Information Security (CISO)

Heineken

Recent times of crisis have demonstrated how swiftly disruptions can arise and push organisations to address them. The CIO and CISO play a crucial part in accelerating and securing digital business, especially in times of uncertainty. This requires strong partnership and communication between CIO and CISO. Join Ing Yan and Jan Joost as they share their combined journey of responding to times of crisis whilst ensuring the security and continued progress of digital business within HEINEKEN. 

Specifically you will hear:

  • How HEINEKEN is becoming the Best Connected Brewer
  • Implications for cyber security approach and culture across the organisation
  • Challenges and learnings and how Ing Yan and Jan Joost collaborate to overcome them

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Zero Trust as a Competitive Advantage

Tony Fergusson headshot

Tony Fergusson

CISO EMEA

Zscaler

How can IT and Security Leaders adapt and enable business agility without compromising security? In the wake of widespread cloud adoption and ubiquitous remote workers, traditional network and security systems have failed to keep pace. Zero Trust can act as a guiding principle for architecting a secure network. But beyond defence, it’s also a great offense: a cloud native zero trust approach, with AI- and ML-driven security, reduces risk that holds back innovation. Join this session to hear how adopting a Zero Trust model can be seen as enabler to reduce cost and complexity, driving agility and, ultimately, gain a competitive edge. 

Specifically, you will learn how others are taking a Zero Trust approach to:

  • Adopting a Zero Trust architecture to reduce costs and complexities across the business
  • Hear examples about AI/ML-driven security to reduce risk and drive innovation
  • Keep things simple and secure to drive competitive advantage in your industry

10:00 - 10:45  Executive Boardroom

The Modern CISO’s API Security Strategy – What’s Next?

Marcel van Leent headshot

Marcel van Leent

Global IT Security & Compliance Manager, CISO

JDE

Dimitri Van Zantvliet Rozemeijer headshot

Dimitri Van Zantvliet Rozemeijer

CISO

Nederlandse Spoorwegen

Filip Verloy headshot

Filip Verloy

Technical Evangelist EMEA

Noname Security

In today’s climate, having a holistic view on API security is key to protecting organisations from the ever-expanding API attack surface. Proactively securing your environment from API security vulnerabilities, misconfigurations, and design flaws are among the biggest challenges that security leaders face. But how can CISOs identify and eliminate attack surfaces before an attack, and actively test APIs for vulnerabilities throughout the lifecycle, in addition to preventing real-time attacks? 

Join this session to discuss:

  • Remediating management and configuration issues before they become a problem
  • Security testing for DevOps that integrates into the tools your team is already using
  • How to build a framework and network architecture to support the rise in remote employees

10:45 - 11:30  Networking Break

10:55 - 11:20  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:30 - 12:15  Breakout Session

Cybersecurity and Digital Risk Management – Communicating the Risk with the Business

Allan Cockriel headshot

Allan Cockriel

VP and CIO for Global Functions and Information Risk Management, Group CISO

Shell

For enterprise priorities, reducing risk maintains its spot as a top priority for IT and Security Leaders. This has never been more apparent in a year faced with uncertainty and global crisis. From the management board and audit and risk committee to external regulators, today’s technology leaders must navigate different tools and methodologies, yet remain confident they’re quantifying risk effectively. Join Allan Cockriel, CIO – Global Functions/IRM and CISO, Shell as he shared his insights and thoughts into communicating risk, as well as managing multiple risks on a global scale. 

Specifically, Allan will share:

  • The metrics CIOs and CISOs should be quantifying risk to the business
  • Stepping up to meet digital business needs in a time where uncertainty has never been more certain
  • Which methodologies and approaches can help transform the security relationship with the business

11:30 - 12:15  Executive Boardroom

Hybrid Work – Winning the War for Talent

Sasa Petrovic headshot

Sasa Petrovic

Digital Strategy Director

Citrix Systems, Inc.

Ray Mennink headshot

Ray Mennink

IT Director

Plukon Food Group

Rene Steenvoorden headshot

Rene Steenvoorden

Chief Digital Officer

Randstad

In fast changing business environments, you need to be agile, be more resilient and become a magnet for top talent. For CIOs, it’s more important than ever to understand your digital capabilities and use them to create a winning culture. But what else can CIOs do, apart from higher salaries to attract top talent into their organisation? 

Join this boardroom to discuss:

  • Rethinking technology and culture in a hybrid work world
  • Providing workspaces that help attract and retail top talent
  • Collaborative strategies to drive meaningful ways of working

11:30 - 12:15  Executive Boardroom

The Importance of Streamlining Security Operations

Justin Broeders headshot

Justin Broeders

CISO

Eneco

Sean McLeod headshot

Sean McLeod

CISO Retail

ING

Roderick Brouwer headshot

Roderick Brouwer

Regional Sales Director Benelux

Hunters

Demand for security roles is constantly increasing and organisations everywhere are facing the same issues time and again – from difficulties hiring and retaining staff to keeping up with security operational challenges. So how can CISOs make their SOCs run more effectively to enhance their security posture and ultimately evolve their security strategy around their workforce?

Join this boardroom to hear more on:

  • Improving data retention through automation and efficient processes
  • Amplifying and correlating the right signals while filtering out the noise
  • Dealing with complex supply chain attacks, insider threats and vulnerabilities

12:15 - 13:15  Lunch Service

13:15 - 13:50  Keynote

Third-Party Cyber Risk — Zero-Day Findings and Mitigation Managing

Dan Vasile headshot

Dan Vasile

Vice President, Cyber Strategy

BlueVoyant

Mitigation of zero-day vulnerabilities is critical as adversaries exploit supply chain entities. This session explores how to identify all third parties impacted by zero-day vulnerabilities and guide their mitigation efforts. Your vendor, supplier and partner ecosystem is now your enterprise attack surface.

Join this session to learn:

  • How to manage distributed risk associated with hundreds and even thousands of vendors, suppliers and partners
  • Approaches to identify, prioritise and mitigate active threats and critical/zero-day vulnerabilities
  • Strategies to reduce supply chain/external ecosystem risk associated with zero-day

13:50 - 14:00  Break

14:00 - 14:45  Breakout Session

Enterprise Security and Digital Risk – Can You Prepare for Evolving Threat Landscapes?

Oliver Madden headshot

Oliver Madden

Chrome Browser Enterprise Lead

Google Chrome Enterprise

As digital business continues to accelerate and cloud work continues to grow, many enterprise assets live outside the old “walls'' of the organisation. The role of the browser is changing rapidly. It’s now a critical endpoint; a strategic productivity and security layer in the enterprise tech stack. CIOs and CISOs alike must now ensure they have enterprise-grade security, speed and stability to empower the workforce and mitigate the risk of harmful web-based threats. 

Join this session to hear more on:

  • Thinking differently about architecting your environment through business transformation
  • How changing employee behaviours and the rise in flexible working is driving the need for new technology
  • Reconceptualising traditional ideas of how to approach security within the enterprise

14:00 - 14:45  Executive Boardroom

The Changing Face of the Digital CIO

Jens Löhmar headshot

Jens Löhmar

CTO

Workday

Patrick Putman headshot

Patrick Putman

CIO

Manuchar

Wim Vanderpoorten headshot

Wim Vanderpoorten

Global IT Director

Allnex

The focus of the CIO role is now on broader strategic projects and aligning an organisations IT infrastructure with its business goals. Liberated of some “lights on” concerns, today’s CIOs can directly influence product and service development by interacting with internal business partners and customers to better understand their needs. Some IT Leaders have the full backing of the board, and some are still leveraging newly found influence to find their seat at the table. But what are the key skill sets CIOs need to foster to ensure success and adapt at a time where business needs are quickly changing. 

Join this boardroom to discuss:

  • The need for CIOs to shift their mindset to focus on driving true business change and the vital role culture plays in this shift
  • The importance for CIOs to forge stronger relationships across the business
  • Practical steps CIOs can take to make digital journeys take hold, with a focus on harnessing data effectively, and gaining buy-in from other business leaders

14:00 - 14:45  Executive Boardroom

Accounting for Third-Party Risk in Strategic Planning

Mario Beccia headshot

Mario Beccia

Deputy NATO CIO for Cybersecurity

NATO

Kay Behnke headshot

Kay Behnke

CISO

Genmab

Rob Reijnders headshot

Rob Reijnders

CISO

FrieslandCampina

Jarle Eek headshot

Jarle Eek

Regional Director

RiskRecon

Third parties expose businesses to strategic, operational, financial, and compliance risks. Moreover, leaders have less visibility into third parties than into their own businesses. For many organizations, the pandemic exposed the fragility of the organisation’s third-party network and impressed the need to flex quickly to new third and fourth parties in the extended enterprise to meet demand without increasing risk exposure. 

Join this interactive session to discuss:

  • Standardising third-party risk management assessments to be used by business units
  • Maintaining visibility of all ongoing third-party relationships
  • Identifying and mitigating the risks of the third-party network

14:45 - 15:30  Networking Break

14:55 - 15:20  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

15:30 - 16:15  Breakout Session

Security Through a Data Breach Lens - Utilising the DBIR

Phillip Larbey headshot

Phillip Larbey

Managing Principal

Verizon

In the last few years, we have seen an abundance of nefarious events by offenders, both known and unknown, covering over tens of thousands of incidents and breaches. That same catalogue of activities also offers security leaders a first-hand view into current cybercrime trends, and a map towards developing a prosperous and mature security program. So how can IT leaders learn from past breaches to ensure a more secure future for their organisations?

Join this session to hear more on:

  • Key findings of DBIR 2022 embellished with Verizon's own Incident Response experience
  • Using data breach investigations to evolve your security strategy
  • How to respond to security incidents and protect your organisation

15:30 - 16:15  Executive Boardroom

Leveraging Automation to Keep Pace with Threat Detection and Response

Thomas Kinsella headshot

Thomas Kinsella

Co-Founder & Chief Operating Officer

Tines

Andrea Bergamini headshot

Andrea Bergamini

VP, CISO

Orbia

Ariel Lemelson headshot

Ariel Lemelson

Head of Cyber Detection & Response

Booking.com

Security teams are overloaded with alerts and manual tasks that slow down the speed at which they can respond to threats. Detections can take weeks to deploy and tune, and even when they do work, the alerts can still be noisy and tedious to respond to. CISOs are struggling to hire and retain analysts and engineers and want them to work on the most impactful, risk reduction efforts within their own organisation. How are CISOs prioritising high-risk activity and using automation to protect their organisations in real-time without interrupting workforce productivity? 

Join this boardroom to discuss:

  • The current state of Security Operations and continuous adaptation of security policies and access
  • Operational benefits and value driven by adaptive security capabilities with a risk focus
  • How security automation has assisted you in developing your risk mitigation strategy

15:30 - 16:15  Executive Boardroom

Connecting Business, Data, and Technology

Patricia de Lanlay headshot

Patricia de Lanlay

Group CIO

Aliaxis

Erik Yntema headshot

Erik Yntema

CISO

PostNL

Koen Vandaele headshot

Koen Vandaele

CIO

Mediahuis

The task of exploiting the full potential of new data and advanced analytics capabilities at scale typically face numerous challenges including the convergence of data protection and security. As a CIO, it's critical to develop a strong, clear strategy connecting business, technology, and data and analytics to maintain your competitive advantage and mitigate these challenges.

In this interactive session, you’ll discuss:

  • Identifying and defining quick-win opportunities supporting the business data strategy
  • Best practices for data protection and optimisation
  • Weaving cybersecurity through all facets of your approach to technology and data

16:15 - 16:25  Break

16:25 - 17:00  Keynote

The Economic Outlook for CIOs and CISOs – How to Prepare in Times of Crisis

Carsten Brzeski headshot

Carsten Brzeski

Global Head of Macro Research & Chief Economist Eurozone

ING

Recent events in Europe have shaken the expected recovery in the Eurozone and created prolonged periods of uncertainty and times of crisis for organisations and leaders. As turmoil persists, scenario planning can help CIOs and CISOs anticipate disruption in all possible contexts to prepare organisations for likely shifts in consumer trends and operations. Armed with the right information, technology leaders are ideally positioned to inspire customers, employees and fellow executives to pivot their organisations toward new ways of working and revenue streams. 

Join Carsten Brzeski, Global Head of Macro Research and Chief Economist Eurozone at ING as he shares his insights, research and views on:

  • The short-term economic outlook in the Eurozone and globally
  • The longer-term economic implications of current events in Europe on organisations
  • The projected impact on enterprise organisations and their IT and Security functions

17:00 - 18:00  Closing Reception & Prize Drawing

3 October 2022

We look forward to seeing you at an upcoming in-person gathering


Location


Venue & Accommodation

Hotel Okura, Amsterdam

Your Community Partners


CIO and CISO Thought Leader
Key Partner
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Dariush Kashani

Community Manager

+44 7542 859489

dariush.kashani@gartner.com