The GREAT ‘Risk’ Reset

This edition is…
The past 2-3 years have been marked by many impactful events or themes that will continue to receive more attention in the coming period, such as corona, further digitalization and climate change. In addition, there are also various themes that are expected to come to the fore in the coming years and will have more impact on our work and our lives, such as the increasingly widespread availability of attack techniques, robotization and deepfakes.
These events and themes also have a (strong) link with information security and thus with the importance of mitigating the risks that come with it and arise from it as much as possible. Think of risks regarding remote working, more complex ransomware attacks, increased dependence on cloud services and more shortages of cybersecurity specialists or resources due to raw material shortages. At the same time, we see that governments and supervisors are further tightening the laws and regulations (including NIS2) to protect society against these risks. All in all, the time is ripe for the third IT Risk Event!
This congress focuses on the contemporary risks that organizations are confronted with.
The program starts with a number of keynotes, and is then divided into the following four main streams:
- IT Risk
- Supplier Risk
- Corporate Risk
- Emerging Risk
Each of the main streams contains various seminars by top speakers and you decide which one you attend! You can find all the names of speakers on the program page.
During the day there is sufficient time to speak to speakers and other participants during the breaks, lunch, drinks and dinner.
The ISACA Risk Event is aimed at (IT) Risk Managers and Risk Consultants, Security/Privacy and Cyber specialists, IT Auditors, CIOs, (Senior) Management, Thought leaders in organizations, Business information managers, Application managers, Project and service managers and Consultants in the IT sector.
Program Details & Links to Presentations
Event Program
Time | Program | |||
08:30 | Arrival, registration, coffee | |||
09:30 | Opening Speaker: Firas Abali Podium I | |||
09:45 | ASML Security Circles of Trust – ASMLs strategy to extend their security strategy beyond the corporate boundary. Why, How, What Speaker: Piet Bel (ASML) Podium I – (English) | |||
10:15 | Busting cyber security myths Speaker:Etay Maor (CATO Networks) Podium I – (English) | |||
10:45 | Coffee Break | |||
Parallel Sessions | The GREAT IT Risk | The GREAT Emerging Risk | The GREAT Corporate Risk | The GREAT Supplier Risk |
Hall | Podium I | Podium II | Podium III | Podium IV |
11:15 | A marriage between DevOps and Security Here are the vows! – Irfaan Santoe (OWASP) (English) | How deepfakes might hurt your business Deepfakes as a corporate risk – Ellen Mok (KPMG) | Algoritmes een bedreiging of een kans? – Dina Boonstra (NV NOM) | Supplier Risk Management bij Defensie – Jan Marko Silvius (Ministerie van Defensie) |
11:45 | Hall change | |||
11:55 | Softwareontwikkeling en risicobeheersing bij de bestrijding van COVID19 – Niels Hatzmann (VM25) | Blockchain and the Metaverse: Emerging Risks in Web 3.0 – Josina Rodrigues (INATBA) (English) | Encryptie als oplossing voor internationale doorgifte-risico’s onder de AVG? – Floor Terra (Privacy Company) | Cybersecurity en bedreigingen vanuit statelijke actoren, wat bedrijven moeten weten als het gaat om China. – Marcel van Kaam (KPMG) |
12:25 | Hall change | |||
12:35 | Cybersecurity – Wat vinden wij veilig genoeg in 2022? -Peter Kornelisse (EY) | The Unexpected Consequences of Digital Currency – Alex de Vries (Digiconomist) (English) | Data Ethics by design @Schiphol – Karen Blanksma & Eline Bijnens (Royal Schiphol Group) | Third Parties are scary! – Vincent Thiele (Darktrace en CSIRT.Global (DiVD) |
13:05 | Lunch | |||
14:15 | The ABN AMRO Road to Microsoft Azure public cloud – Stefan Simenon (ABN AMRO)(English) | Great risks of Ransomware Hoe werken de cybercriminelen – Erwin Maas (Northwave) | Risk in Focus 2023 – Hot topics voor Risicomanagement en Internal Audit – Sam Huibers (IIA) | Security Circles of Trust – Robbert Kramer (ASML) |
14:45 | Hall change | |||
14:55 | Purple team War Stories – Pepijn Vissers (Chapter8) | Herkennen van risico’s in een genetwerkte wereld Een verhaal over cactussen, koekjes en Jackass – André Smulders (TNO) | Managing behavioural risk: the key to sustainable organizational change – Céline Christensen (ING) (English) | National level supply chain risk management – the Israel case – Yigal Unna (Rescana – sponsored by Cert2Connect) (English) |
15:25 | Hall change | |||
15:35 | Insider Threat: Human Risk In The Digital Age – Sunette Runhaar (Uber) (English) | Managing models & their risks – introduction to model risk management framework – Melike Ozunlu en Magdalena Chociej (ING) (English) | The increasing impact of EU law & fundamental rights on corporate risk – Fokke Jan van der Tol (ISACA NL Chapter) | Regulating Artificial Intelligence – Vincent Damen (Protiviti) (English) |
16:05 | Coffee Break | |||
16:35 | Data and AI – The Risk of Inaction Speaker: Egge van der Poel (EggeWel) Podium I – (English) | |||
17:05 | Create a risk-based governance system using COBIT Speaker: Mark Thomas (Escoute) Podium I – (English) | |||
17:35 | Closure by ISACA Netherlands Chapter President | |||
17:45 | Drinks & Dinner |