ecrimeEurope 2017 Dec. 6, 2017 to Dec. 6, 2017, amsterdam,netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
We are Losing the War on Cyber: What can we do Differently and How can we Win? Simon Jenner Why are we losing?Can new technology change the game?How to deal with resource/talent scarcityWhat should ...
The 2017 Phishing Threat Landscape David Mount High profile leaks and mature malware tools in phishing emails and how this has led ...
Managing Cyber Risk Quantitatively - Experience From the Field Maarten Van Wieren Short introduction into cyber risk quantificationPractical applications of cyber risk managementLessons learned and challenges remaining
Agile Security and Orchestrated Response Bruce Schneier How organizations can thrive in an age of pervasive threatsThe evolution of security incident response ...
Speed Stops Breaches: Find Out How to Build a High-Speed SOC Rob Huikeshoven N/A
How to Respond to Cyber Incidents Faster, Smarter, Better: an Introduction to the Resilient Incident Platform Tycho Schmidt N/A
A Security Risk Management Paradigm Shift Dan Vasile Security as an abstract conceptCalculating and managing risks related to information security under the current ...
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense Ennio Di Rosa How new machine learning and mathematics are automating advanced cyber defenseWhy 100% network visibility allows ...
Bug bounty program, the next level of security testing Stijn Jans , Jean-francois Simons Where does it fit in your security process?What to expect from your program?
Protect Your Mission-Critical Infrastructure in an Open World Stoffel Bos Your network should be closed, but it is mandatory to share informationYour network should be ...
How did Jonah escape the GDPR? Vincent Ossewaarde How PCI-DSS is related to the GDPR and how you can demonstrate GDPR-compliance by doing ...
Threat Approach From Cyber Criminals and How to Tackle Them John Kennedy N/A
Cyber Security Ratings: How External Independent Ratings are Driving Information Security Benchmarking and Vendor Risk Management James Warriner N/A
The Cyber Payment Fraud Threat Landscape Carlo Hopstaken Provide an overview of the current threat actors in the payment landscapeTheir modus operandi to ...
Information Security Regulation and its Implementation Dan Vasile , Cosmin Broasca , Jaap Halfweeg N/A