Program

This program is provisional and may be adapted in the future.
For more information about the speaker and his presentation, just click on the title.

During lunch you can join the Round Table Session by Palo Alto Networks:
Cyber Risk as a Business Enabler – Workshop room

Doors open at 8h30. First speaker slot: 9h00. End of speaker slots: 17h00

Central Room

09:00
Opening
Peter Buelens, Brewery of Ideas
09:10
Joining forces against cyber crime
Jan De Blauwe, Cyber Security Coalition Governance & Practices
09:30
Head of Cybersecurity in DG Connect
Despina Spanou, Director of Cyber Security European Commision Governance & Practices
10:00
Anonymous in digital systems
Claudia Diaz, KU Leuven Technology & Innovation
10:30
COFFEE BREAK
11:00
The technopolitics of EU and what the future will bring
Ilias Chantzos, Symantec Governance & Practices
11:30
Stakeholders and domains of competences for Data Protection implementation
Georges Ataya,, Solvay Brussels School, ICT-Control Technology & Innovation
12:00
Computing on Encrypted Data: How to do the impossible
Nigel Smart, KU Leuven Technology & Innovation
12:30
LUNCH BREAK
13:30
Omar Mohout’s speakerslot is canceled due to personal reasons, we apologize for the inconvenience
14:00
Hitchhiker`s Guide to the IoT Galaxy full of Security & Privacy Challenges
Prof. Dr.-Ing. Ahmad-Reza Sadeghi, TU Darmstadt Technology & Innovation
14:30
The Foreshadow Attack: From a Simple Oversight to a Technological Nightmare
Raoul Strackx, KU Leuven Technology & Innovation
15:00
COFFEE BREAK
16:00
Who Left Open The Cookie Jar? A Comprehensive Evaluation of Third-party Cookie Policies
Tom Van Goethem & Gertjan Franken, KU Leuven Technology & Innovation
16:30
The Cybersecurity Industry Nexus
Ulrich Seldeslachts, LSEC
17:00
CLOSING NETWORK DRINK

Riverside Room

10:00
Security in Devops: always-secure software
Sebastien Deleersnyder, Toreon Platforms & Tools
10:30
COFFEE BREAK
11:00
You will be hacked and you know it!
Erik Rutkens, Eurofins Technology & Innovation
12:00
Fake news, the threats to businesses, and what you can do about it
Jamie Collier, Digital Shadows Technology & Innovation
12:30
LUNCH BREAK
13:30
Data protection in multi-cloud environments
Gary Marsden, Gemalto Technology & Innovation
14:00
Cyber Intelligence: What’s new about the threat?
Ivan Fontarensky, Thales Group Technology & Innovation
14:30
15:00
COFFEE BREAK
15:30
Next generation of identity governance
Edwin Grimminck, SailPoint Governance & Practices
16:00
Fighting Phishing in Belgium: our approach & results
Pieter-Jan Moreels, CERT.be & Andries Bosmans, CCB Governance & Practices
16:30
What’s your Score? Quantifying and Visualising your Cyber Risk
Fabrice Wynants, Verizon Platforms & Tools
17:00
CLOSING NETWORK DRINK

Upper Room

10:00
Case study: identity & access governance in practice, in two hospital environments
Frank Jorissen & Rikke Van Puymbroeck, Smart AIM Technology & Innovation
10:30
COFFEE BREAK
11:00
Securing Ecrypted Traffic on a Global Scale
Martin Rehak, Cisco Technology & Innovation
11:30
Is AI the silver bullet in Cyber Security
Christof Jacques, Check Point Technology & Innovation
12:30
LUNCH BREAK
13:30
14:00
AI for preserving privacy in collaborative systems
Prof. Dr. Pinar Yolum, Utrecht University Compliance & Legal
14:30
Low and Slow – Data theft under the radar
Sven Schoenaerts, Varonis Technology & Innovation
15:00
COFFEE BREAK
15:30
DDoS landscape in 2018: Welcome to the Terabit Era
Kirill Kasavchenko, Netscout Arbor Technology & Innovation
17:00
CLOSING NETWORK DRINK

Alcazar Room

14:30
WORKSHOP: Magnifier Behavioral Analytics: Quickly hunt down and stop active attacks in the network
Palo Alto Networks

Workshop Room

11:00
A data breach inspired Role Playing Game 
How I hacked your folder, By Approach
12:30
Lunch Round Table Session
Cyber Risk as a Business Enabler, by Palo Alto Networks
13:30
A data breach inspired Role Playing Game 
How I hacked your folder, By Approach
15:00
A data breach inspired Role Playing Game 
How I hacked your folder, By Approach