The  GREAT  ‘Risk’  Reset

weblogo

This edition is…

The past 2-3 years have been marked by many impactful events or themes that will continue to receive more attention in the coming period, such as corona, further digitalization and climate change. In addition, there are also various themes that are expected to come to the fore in the coming years and will have more impact on our work and our lives, such as the increasingly widespread availability of attack techniques, robotization and deepfakes.

These events and themes also have a (strong) link with information security and thus with the importance of mitigating the risks that come with it and arise from it as much as possible. Think of risks regarding remote working, more complex ransomware attacks, increased dependence on cloud services and more shortages of cybersecurity specialists or resources due to raw material shortages. At the same time, we see that governments and supervisors are further tightening the laws and regulations (including NIS2) to protect society against these risks. All in all, the time is ripe for the third IT Risk Event!

This congress focuses on the contemporary risks that organizations are confronted with.

The program starts with a number of keynotes, and is then divided into the following four main streams:

Each of the main streams contains various seminars by top speakers and you decide which one you attend! You can find all the names of speakers on the program page.

During the day there is sufficient time to speak to speakers and other participants during the breaks, lunch, drinks and dinner.

The ISACA Risk Event is aimed at (IT) Risk Managers and Risk Consultants, Security/Privacy and Cyber ​​specialists, IT Auditors, CIOs, (Senior) Management, Thought leaders in organizations, Business information managers, Application managers, Project and service managers and Consultants in the IT sector.

Program Details & Links to Presentations

Event Program

Time Program
08:30Arrival, registration, coffee
09:30Opening
Speaker: Firas Abali
Podium I
09:45ASML Security Circles of Trust – ASMLs strategy to extend their security strategy beyond the corporate boundary. Why, How, What 
Speaker: Piet Bel (ASML)
Podium I – (English)
10:15Busting cyber security myths
Speaker:Etay Maor (CATO Networks)
Podium I – (English)
10:45Coffee Break
Parallel SessionsThe GREAT
IT
Risk
The GREAT
Emerging
Risk
The GREAT
Corporate
Risk
The GREAT
Supplier
Risk
HallPodium IPodium IIPodium IIIPodium IV
11:15A marriage between DevOps and Security Here are the vows!
– Irfaan Santoe (OWASP)
(English)
How deepfakes might hurt your business
Deepfakes as a corporate risk

– Ellen Mok (KPMG)
Algoritmes een bedreiging of een kans?

– Dina Boonstra (NV NOM)
Supplier Risk Management bij Defensie 
– Jan Marko Silvius (Ministerie van Defensie) 
11:45Hall change
11:55Softwareontwikkeling en risicobeheersing bij de bestrijding van COVID19 
– Niels Hatzmann (VM25)
Blockchain and the Metaverse: Emerging Risks in Web 3.0
– Josina Rodrigues
(INATBA)
(English)
Encryptie als oplossing voor internationale doorgifte-risico’s onder de AVG?
– Floor Terra (Privacy Company)
Cybersecurity en bedreigingen vanuit statelijke actoren, wat bedrijven moeten weten als het gaat om China.
– Marcel van Kaam (KPMG) 
12:25Hall change
12:35Cybersecurity – Wat vinden wij veilig genoeg in 2022?
-Peter Kornelisse (EY)
The Unexpected Consequences of Digital Currency
– Alex de Vries (Digiconomist) (English)
Data Ethics by design @Schiphol
– Karen Blanksma & Eline Bijnens (Royal Schiphol Group) 
Third Parties are scary!
– Vincent Thiele (Darktrace en CSIRT.Global (DiVD)
13:05Lunch
14:15The ABN AMRO Road to Microsoft Azure public cloud
– Stefan Simenon (ABN AMRO)(English)
Great risks of Ransomware
Hoe werken de cybercriminelen
– Erwin Maas (Northwave)
Risk in Focus 2023 – Hot topics voor Risicomanagement en Internal Audit
– Sam Huibers (IIA)
Security Circles of Trust
– Robbert Kramer (ASML)
14:45Hall change
14:55Purple team War Stories
– Pepijn Vissers (Chapter8)
Herkennen van risico’s in een genetwerkte wereld
Een verhaal over cactussen, koekjes en Jackass
– André Smulders (TNO)
Managing behavioural risk: the key to sustainable organizational change
– Céline Christensen (ING)
(English)
National level supply chain risk management – the Israel case
– Yigal Unna (Rescana – sponsored by Cert2Connect) 
(English)
15:25Hall change
15:35Insider Threat: Human Risk In The Digital Age
– Sunette Runhaar (Uber)
(English) 
Managing models & their risks – introduction to model risk management framework
– Melike Ozunlu en Magdalena Chociej (ING)
(English)
The increasing impact of EU law & fundamental rights on corporate risk
– Fokke Jan van der Tol (ISACA NL Chapter)
Regulating Artificial Intelligence
– Vincent Damen (Protiviti) 
(English)
16:05Coffee Break
16:35Data and AI – The Risk of Inaction
Speaker: Egge van der Poel (EggeWel)
Podium I – (English)
17:05Create a risk-based governance system using COBIT
Speaker: Mark Thomas (Escoute)
Podium I – (English)
17:35Closure by ISACA Netherlands Chapter President
17:45Drinks & Dinner

After Movie

We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.

Accept All Accept Required Only