Day 2 - 27 September 2023
10:00AM
(CET)
Srinath Panchavati
Cyber Security Officer and Scrum Master
Eindhoven University of Technology

10:00AM - Day 2
View Applied IoT Security: Chairpersons Welcome
Applied IoT Security: Chairpersons Welcome
Chairperson’s welcome and opening remarks.
10:15AM
(CET)
Tiago Teles
Head of Data Insights and Issue Management
ABN AMRO Bank N.V.

10:15AM - Day 2
View Presentation: Examining the Current IoT Security Landscape
Presentation: Examining the Current IoT Security Landscape
- Assessing current measures being used to protect your organization.
- Understanding the key challenges to secure IoT Devices.
- The importance of building valid security models for IoT.
10:45AM
(CET)
Qiang Huang
Senior Director, Product Management
Palo Alto Networks

10:45AM - Day 2
View Keynote Presentation: Zero Trust for IoT – Protecting the Weakest Link in Your Enterprise

04:30PM - Day 1
View Presentation: Never Trust Always Verify! Easily Implement Complete Zero Trust by Securing IoT and OT Devices
Keynote Presentation: Zero Trust for IoT – Protecting the Weakest Link in Your Enterprise
In 2023 we have seen a 41% increase in IoT & OT device attacks per organization across industries of enterprise, healthcare, and industrial OT. As IoT and OT devices rapidly increase in number and diversity, they have become prime targets for cyber attacks. IoT devices often ship with vulnerabilities, run unsupported operating systems, and lack encryption, posing significant security risks. To address these challenges, implementing a Zero Trust security approach for both managed and unmanaged IoT devices is essential.
Join us for this session to discuss the best practices for applying Zero Trust principles to secure IoT devices. In this session you will learn:
1. What the principles of a Zero Trust cybersecurity strategy are and how do they apply to IoT devices?
2. Understand the challenges in securing unmanaged IoT devices and how to properly implement segmentation to limit risk.
3. Best practices for developing a Zero Trust security approach for IoT devices.
Join us to learn how to extend Zero Trust network security to every connected device with AI-powered IoT security solutions and protect your organization from IoT threats.
11:15AM
(CET)
Sylvestre Becker-Babel
AVP Sales and Partnerships, IoT & Data Mobility
Console Connect

11:15AM - Day 2
View Presentation: IoT connectivity, why Internet doesn’t matter anymore?
Presentation: IoT connectivity, why Internet doesn’t matter anymore?
– Security considerations in connecting IoT devices.
– Scalability and ubiquity requirements in IoT device’s connectivity.
– Alternatives to Internet based connectivity.
11:35AM
Networking Break
11:50AM
(CET)
Harold Weffers
Member of NEN Standardization Committee on information security, cyber security, and privacy
NEN
Paulo Lopes
Senior Security Engineer
Spotify

11:50AM - Day 2
View Fireside Chat: Building a Robust Cyber Security Strategy, an IoT Perspective
Qiang Huang
Head of Product Management
Palo Alto Networks

11:50AM - Day 2
View Fireside Chat: Building a Robust Cyber Security Strategy, an IoT Perspective
Fireside Chat: Building a Robust Cyber Security Strategy, an IoT Perspective
- Keeping security at the forefront when developing and deploying IoT innovations and digital solutions.
- Governance, regulation and standards – the need for consistency across industries for what is required/ expected from a cyber perspective.
- Finding the best connectivity to optimise solutions and infrastructures – not a one size fits all approach.
- Strategies for the future – keeping control of systems and devices long term by discussing product lifecycles.
12:30PM
Networking Break & Lunch
02:00PM
(CET)
Alexander Chelyshev
Lead Product Security Engineer
ASML
Chandrashekhar Kachole
Chief Technology Officer
Worldline

02:00PM - Day 2
View Panel: The Ins and Outs of Device Security
Ludwig Nolasco Ruíz
Functional Safety/System Engineer
Inalfa Roof Systems Group

02:00PM - Day 2
View Panel: The Ins and Outs of Device Security
Priya Gupta
Senior R&D Engineer
Vanderlande

02:00PM - Day 2
View Panel: The Ins and Outs of Device Security
Gaurav Lakhwani
Transition Program Manager
Nike

02:00PM - Day 2
View Panel: The Ins and Outs of Device Security
Panel: The Ins and Outs of Device Security
- How does the sheer diversity of IoT devices provide challenges to security teams?
- Understanding the risks associated with the management of IoT devices by disparate teams within the organization.
- Which IoT devices have the highest share of security issues and what makes them so susceptible to these issues?
02:40PM
(CET)
Peter Prjevara
IT Service Officer
TenneT TSO B.V.
Maartje Wijnker
Cyber Broker
Marsh Nederland

02:40PM - Day 2
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy
Tom Rijgersberg
Senior Practice Leader Cyber
Meijers Insurance

02:40PM - Day 2
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy
Linsey van Rijn
Senior Cyber Broker
AON

02:40PM - Day 2
View Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy
Panel: Cyber Insurance – connecting the dots with a Cyber Security Strategy
- Improving your cyber readiness in advance of cyber insurance purchases or renewals.
- Examining the future of the cyber insurance market.
- Demonstrating proactivity in the eyes of a cyber insurance underwriter.