TEISS 2020 Oct. 27, 2020 to Oct. 29, 2020, Amsterdam, Netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cyber and the Board: Security means Business Steven Durbin Enterprise risk management must be extended to create risk resilienceApproaches to managing the changing technological ...
Panel discussion: Tailoring your security awareness programmes to overcome colleagues’ inbuilt biases Sarah Janes , Zari Haji Rasoul , Daniel Norman The importance of establishing benchmarks before engaging in any change exercise, both qualitative and quantitativeRecognising ...
Current developments in cybersecurity and cybercrime in a post-COVID-19 world Marco Gercke How megatrends such as 5G, AI and Quantum Computing impact the cybersecurity landscapeBeyond “quantity and ...
Panel discussion: Threat trends for 2021 and beyond; Ransomware, data theft and reputational attacks Marco Goettl Meeting the challenge of destructive and disruptive attacks from defence in depth intended to deter ...
Continuous Vulnerability Management – Striving for a 14 Day SLA Chris Goettl When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating ...
Enabling and securing employees in today’s work-from-anywhere world Ross Asquith Is 2020 the beginning of the end for traditional data centre security stacks?What’s the best ...
Panel discussion: Evaluating and minimising information security risks across multi-Cloud estate Martijn Nykerk , Peter Asquith Best practice in identifying, mitigating and managing multi-cloud risks – are there fundamental differences for ...
Reducing the Data Attack Surface: Overcoming barriers to cyber resilience Yves Gheeraert How to securely remove sensitive data at home and on-prem for a remote workforceHow to ...
Measuring your organisation’s information security posture – which metrics help you evaluate your posture? Victoria Gheeraert Overcoming communication challenges around communicating the guidelines for measuring and improving your information security postureData ...
The Infosec Colour Wheel: Blending the skills of Development, Red and Blue Teams for a rainbow of multi-disciplinary Security strengths Sebastian Avarvarei What can Developers (Yellow Team), Attackers (Red Team) and Defenders (Blue Team) learn from each ...
Panel discussion: Challenges and pitfalls in the drive to SOC modernisation Sebastian Avarvarei , Greg Gaast , Matthias Maier Communication and clarity – what is the SOC team responsible for, and for what are ...
Security Secrets: Why leading SOC teams have Cloud-y vision Matthias Maier Why it is key for Security Leaders to understand the business transformation and cloud strategy ...
Combatting cyber risk: enterprise detection and response Ashish Khanna How are SOC’s evolving today and ChallengesInsight on how to deliver a programmatic and structured ...
The changing needs of the CISO: Moving from hard technical skills to a soft skills focus Quentyn Taylor N/A
Panel discussion: Threats in the supply chain: Balancing your internal and the external requirements and competing risk agendas Quentyn Taylor , Jay Moloo , Miguel Pieters Running a risk assurance programme on 3rd party and critical suppliersReviewing supplier risk assessments – ...
Changing Cyber Landscapes: The Battle of Algorithms Miguel Pieters Paradigm shifts in the cyber-threat landscapeAdvancements in offensive AI attack techniquesHow defensive AI can fight ...