1. Events
  2. Infosecurity 2020

Infosecurity 2020

More to Explore

How to manage digital risk across the lifecycle of your business?

New digital technologies offer you the opportunity to further develop and innovate your business. On this journey towards digital evolution, we will encounter plenty of new challenges. Many technologies and solutions are being developed, a lot of choices lie ahead. The advanced complexity and the fragmentation of users and data make it difficult to see the forest for the trees. Cybersecurity has become one of the priorities of the board. It has become essential to draw up, implement and monitor a strategic plan in order to innovate safely and in a controlled manner.

By May 27  and 28, SecureLink will be fully integrated into Orange Cyberdefense. During these days, we want to guide you together through this complex cyber journey. We are happy to share our knowledge and expertise with you during multiple theatre sessions, and demos & presentations at our booth [B100 & B112 – Hall 9].We will focus on OT security, Advanced SOC, Identity and Access Management, and Governance, Risk and Compliance as these are central cybersecurity themes to focus on in your strategic plan.We really hope to see you there. That is why SecureLink is happy to offer you a VIP ticket*GET YOUR VIP TICKET

Please note that by then, we will be fully integrated into Orange Cyberdefense. You will thus find the SecureLink and ZIONSECURITY team at this booth [B100 & B112].

*VIP tickets are reserved for end-users and decision-makers

How to decrease threats and the attack surface in the Industrial Network.

Theatre 5 | 11:00 – 11:30

This presentation explains our strategy and the core foundational controls that are necessary to increase visibility and decrease the risk of cyber threats in the manufacturing network.

How to decrease threats and the attack surface in the Industrial Network.

Theatre 5 | 11:00 – 11:30

How to decrease threats and the attack surface in the Industrial Network.

This presentation explains our strategy and the core foundational controls that are necessary to increase visibility and decrease the risk of cyber threats in the manufacturing network.

Advanced SOC | Tim Vanacker, Head of Services & Innovation

How to leverage the security features you already paid for?

Theatre 7 | 15:30 – 16:00

Over the last decade, numerous new technologies have entered the market – and your network, promising better detection and protection on security events. Start-ups have shown you their resourcefulness, your legacy vendors added security on top of what you already had in place.

Most probably the investments you made in the last years already have security detection mechanisms on board, but are you listening to them? Do you leverage the security controls you already invested in? In today’s’ SOC, the challenge shifts from detecting events to adequately handling them. Do you already converge all your security signals into a security ecosystem?

 

Identity & Access Management | Emmanuel David, Technical Director

How to improve IAM speed-wise and security-wise

Theatre 2 | 14:00-14:30

Identity and Access Management (IAM) has become a critical component for securing your business.

A good IAM:

  • Brings business agility by securing third-party access to your infrastructure and data
  • Speeds up access to new applications, as well as automates the removal of that access when no longer required.

IAM solutions not only help to secure access to applications and data but also provide better user experience by adapting authentication experience or allowing the end-user to use self-services.
Of course, given many data breaches are related to weak IAM, improving those processes and enforcing stronger authentication or more advanced processes where required is key.

Governance, Risk & Compliance | Jan De Bondt, Head of Cybersecurity Advisory Services

Your digital reputation will determine whether you’ll stay relevant or go bankrupt.

Theatre 6 | 11:00 – 11:30

It is vital for your company’s survival to know the answers to these questions:

  • Do you know your current cybersecurity maturity level?
  • Are you aware that a higher score means potentially a higher company valuation?
  • Do you trust your suppliers accessing your crown jewels?

If the answer is triple NO, you are more welcome to attend this session.

Share event