IN-PERSON

Benelux CISO Executive Summit

10 October 2023 | Hotel Okura, Amsterdam

10 October 2023
Hotel Okura, Amsterdam

Collaborate with your peers

Get together with Benelux's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers.

Join your peers to discuss the most critical issues impacting CISOs today:

Amplifying Value Through Digital Ecosystems

Strengthening Cyber Risk's Role as a Driver for Enterprise Decision Making

Accelerating Growth with Agility & Innovation

Benelux CISO Governing Body


The Governing Body Co-Chairs shape the summit agenda, ensuring that all content is driven by CISOs, for CISOs.

Governing Body Co-Chairs

Allan Cockriel

Shell
CIO - Global Functions / IRM, and CISO

Ori Fragman

Hapag-Lloyd AG
CISO

Florence Mottay

Zalando
CISO

Martijn Nykerk

Randstad
CISO

What to Expect

Interactive Sessions

Hear from CISO practitioners and thought leaders on how they're solving critical challenges impacting your role today in Keynote sessions, and join smaller, interactive discussions with your peers in Breakout and Boardroom sessions.

Community Networking

Make new connections and catch up with old friends in casual conversations during dedicated time for networking designed to better acquaint you with your Benelux CISO community.

Peer-to-Peer Meetings

Connect with like-minded peers in a private, one-on-one setting through Evanta's Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

Agenda


9 October 2023

10 October 2023

18:00 - 21:00  Governing Body Welcome Reception

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

08:15 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

The Role of IT and Security Accelerating Digital Business in 2024 and Beyond

Gal Gnainsky headshot

Gal Gnainsky

CSO

Philips

VC Gopalratnam headshot

VC Gopalratnam

EVP & Global CIO

Philips

IT and Security leadership play crucial parts, both independently and in tandem, in accelerating and securing digital businesses, especially in times of uncertainty, heightened competition and a dynamic ever-changing world. Rapid decisions must be balanced with thoughtful considerations of reprioritisation, risk and investments. This requires strong partnership and communication every day between IT and Security.

Join VC Gopalratnam, EVP & Global CIO, Philips and Gal Gnainsky, Chief Security Officer, Philips as they share their insights on:

  • How Philips integrated landscape forms the foundational technological platform in its journey to become the world’s leading health technology company
  • The role and importance of security across a standardised IT architecture
  • The fundamental importance of the collaboration between IT and Security to accelerate digital business

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Closing Digital Skills Gaps — Partnering with the Business for Digital Talent Exploration

Christopher Franskin headshot

Christopher Franskin

IT Director - International EMBA

Solvay

Solvay needed to pivot its Digital & Technology operating model to bring agility and support business in times of change. To support this, having the right talent strategy was and is still a key pillar of success. Through partnerships across the business, Christopher was able to take a unique approach to hiring and retaining talent across Europe.

Join this session to hear:

  • How Solvay is building trust and transparency between IT and business partners
  • How to gain key advantages with a one-team mindset when equipping employees for what comes next
  • How CIOs can leverage newfound influence and leadership to partner with key business units to strengthen their digital transformation vision

10:00 - 10:45  Breakout Session

Communicating Risk to Fuel Data-Driven Security Posture

Phillip Larbey headshot

Phillip Larbey

Managing Principal & Head of Verizon's Threat Research Advisory Center EMEA

Verizon

David Grantges headshot

David Grantges

Senior Manager Data Management & Protection - Enterprise Cyber Services

Verizon

In today’s complex cyber threat landscape, understanding the speed of change and current trends is paramount. Collaboration between CISOs and CIOs and using data to support a threat-based approach to risk management is becoming essential for an effective security posture. By translating risk into a business need, IT and Security teams can enable leadership to make data-driven decisions that strengthen security resilience.

Join this session to learn how CISOs and CIOs can collaborate to:

  • Utilise cyber trend data and quantitative risk metrics to evolve your security strategy and prioritise investments
  • Apply the Cyber Risk Quantification model to manage risk effectively
  • Understand how to translate risk into a business need

10:00 - 10:45  Executive Boardroom

The CIO’s Playbook: Execute Strategy Confidently

Jason Baragry headshot

Jason Baragry

Chief Enterprise Architect and Head of Customer Research

Ardoq

Ipek Ozsuer headshot

Ipek Ozsuer

Chief Digital & Information Officer

DSM

Ron Broeren headshot

Ron Broeren

Head of Global Digital Technology & Data Services

Signify

As a CIO, what are you choosing to prioritise when looking at your IT initiatives? While many may compete for your time – investing in security, innovation or even saving costs – they don’t need to be at odds. CIOs can practically take steps to remove the noise that’s creating decision drag.

Join this boardroom to discuss to learn how to:

  • Filter out the noise that stems from unreliable and volumes of data
  • Get the business and IT collaborating when objectives are (re)prioritsed
  • Tactics that enable CIOs to collaborate in real-time with IT and business stakeholders

10:45 - 11:45  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45 - 12:30  Breakout Session

Championing Strategic IT & Security Business Collaboration Across the Organisation

Jessica Conquet headshot

Jessica Conquet

Global CISO

Randstad

Ad Krikke headshot

Ad Krikke

Leadership Partner

Gartner

Femke Jacobs headshot

Femke Jacobs

Chief Transformation & Technology Officer at NN Bank

Nationale-Nederlanden

Manfred Boudreaux-Dehmer headshot

Manfred Boudreaux-Dehmer

CIO

NATO

Shared responsibility for IT and security strategy will come about when CIOs and CISOs equip the business to actively participate in decision-making without increasing risk. With the adoption of emerging technologies, such as AI, the wider business must be equipped to harvest the opportunities whilst mitigating the potential risks such technologies can bring. How can CIOs and CISOs collaborate and communicate better with the wider organisation to ensure that the business is able to grow without compromising enterprise security? There is no simple answer, and this panel will present examples where enterprise challenges were addressed through close collaboration and ‘meaningful conversations’ between business, IT and security.

Join this Panel discussion for insights into:

  • Equipping the organisation to make risk-informed decisions with autonomy to make the most out of emerging technologies, without compromising the operating environment
  • Enabling the business to embrace a positive mindset around IT and technology, whilst mitigating associated risks
  • Creating ‘win-win’ situations for CIOs/CISOs and the wider organisation to enhance leadership and influence

11:45 - 12:30  Breakout Session

Challenging the Rules of Security – There Has to be a Better Way to Protect the Enterprise!

Oliver Madden headshot

Oliver Madden

Chrome Browser Enterprise Lead

Google Chrome Enterprise

Mark Snel headshot

Mark Snel

CISO

Signify

The threats are constantly growing and so are the costs. Protecting endpoints is one of the many challenges faced by CISOs. Faced with continuously evolving attacks, CISOs must now escape from this quagmire and make game-changing improvements in cybersecurity and administration to prevent cyberattacks and ransomware. Every endpoint could provide an attacker access to the corporate network, but IT organisations today can capitalise on several layers of control to ensure stronger security and operations, whilst ensuring productivity is not compromised. Join this session to discuss:

  • Rethinking your capabilities for strengthening endpoint security and simplifying endpoint management
  • Looking at defence in-depth, securing devices as well as connections, and creating innovative multi-layered defences at different levels
  • Striking the balance between effectively protecting the enterprise without compromising the overall productivity of users

11:45 - 12:30  Executive Boardroom

Strategic Pitfalls in Third-Party Risk Management

Jarle Eek headshot

Jarle Eek

Regional Director

RiskRecon - A MasterCard Company

Bram Van Altena headshot

Bram Van Altena

CISO

KLM Royal Dutch Airlines

Marc Berns headshot

Marc Berns

CISO

Allianz Benelux

Arnaud Wiehe headshot

Arnaud Wiehe

Managing Director Information Security

FedEx

Managing cyber risk across an enterprise IT infrastructure has never been harder. Remote workers, advancing attack methods, and an ever-expanding vendor network are challenging every firm, as total visibility into threats has become nearly impossible. As digital business strategy matures, more organisations are becoming dependent on the cyber posture and protection of third parties. Third-party risks present a unique challenge because you are depending on vendors and partners to operate securely to keep your data and information safe. How are you mitigating the associated risks and demonstrating this to the business to ensure effective security programs?

Join our session to hear about:

  • Common failings across TPRM programs that led to breach events
  • How executives can provide strategic direction for third-party risk teams
  • Key practices being implemented by leading vendor risk firms to maintain strong supply chain risk management

11:45 - 12:30  Executive Boardroom

Building a Secure Unstructured Data Strategy in the Age of AI

Lotta Gunnarsson headshot

Lotta Gunnarsson

CIO

Odido (Formerly T-Mobile NL)

Mark Wayland headshot

Mark Wayland

CRO

Box

Your unstructured data is incredibly valuable. It’s the product roadmap, financial spreadsheets, customer surveys, and employee records that make your business unique. To get the most leverage out of this data, you need a comprehensive unstructured data strategy – including security & compliance considerations, powering external collaboration, and (especially recently) incorporating artificial intelligence.

Join a group of your peers to discuss how to:

  • Identify unstructured data sources and tools in your organisation
  • Develop a strategy to secure this data – for both internal and external use
  • Leverage artificial intelligence to make your unstructured data even more useful


12:30 - 13:30  Lunch Service

13:30 - 14:00  Keynote

Zero Trust Evolution and the Need for Negative Trust

Tony Fergusson headshot

Tony Fergusson

CISO EMEA

Zscaler

Learn about the zero trust evolution and how zero trust architecture secures users, workloads, and IoT/OT devices by addressing critical security shortcomings of legacy network architecture. This session covers key steps in a phased zero trust transformation journey, as well as advanced techniques like “negative trust” deception technology. Active defence on top of zero trust architecture can help organisations become more resilient against advanced attacks and human-led ransomware or supply chain threats.

Join this session and learn to:

  • Identify initial steps and key phases of zero trust transformation
  • Mitigate advanced attacks with zero trust and negative trust (active defence)
  • Demystify zero trust architecture for business leaders

14:00 - 14:15  Break

14:15 - 15:00  Breakout Session

Attack From Hell – The Anatomy of a High-Impact Attack

Azeem Aleem headshot

Azeem Aleem

Managing Director, Northern Europe

Sygnia

Yonatan Lipschitz headshot

Yonatan Lipschitz

Senior Manager Cyber Security Services, EMEA

Sygnia

In recent years, the Sygnia Incident Response Team has handled numerous nation-state attacks that employed unique attack techniques and posed new challenges to security leaders and incident responders.

In this talk, we will guide you through the anatomy of a real-world attack we recently responded to, including attacker TTPs and effective response procedures. This case study will highlight the common pitfalls and key opportunities when defending against even the most sophisticated attacks.

You will come away with:

  • A deeper understanding of current attack trends
  • Actionable insights into the risks and vulnerabilities exploited by attackers targeting highly complex environments
  • Effective defence strategies employed by leading organisations worldwide

14:15 - 15:00  Executive Boardroom

Harnessing the Power of AI to Improve Cyber Resilience

Jesper Olsen headshot

Jesper Olsen

Chief Security Officer (EMEA North)

Palo Alto Networks

Patrick Putman headshot

Patrick Putman

CIO

Manuchar

Martijn Nykerk headshot

Martijn Nykerk

CISO

Randstad

Iman Koster headshot

Iman Koster

Director Covetrus Technology Group Europe

Covetrus

Artificial intelligence has the potential to drive efficiency and technological innovation. Yet taking advantage of this opportunity in the wrong way can have serious security consequences for the organisation. IT and Security leaders need to anticipate and prepare to mitigate potential risks as data is increasingly accessed and analysed in increasingly different ways. For business stakeholders to secure investment, how can CIOs and CISOs demonstrate the benefits of these technologies? Join this session to learn about:

  • How AI plays a role in sophisticated attacks today and how to prepare
  • Examples of how to leverage AI to process and analyse large volumes of data quickly...and safely
  • How leaders can use AI capabilities to enhance cybersecurity and demonstrate value to the business

14:15 - 15:00  Executive Boardroom

Aligning IT and Business with a Connected and Responsive Data Strategy

Ansh Kanwar headshot

Ansh Kanwar

SVP, Technology

Reltio

Candice Dillon headshot

Candice Dillon

CIO

VodafoneZiggo

Bas Meeuwis headshot

Bas Meeuwis

CIO

Nouryon

Bram Mommers headshot

Bram Mommers

Global Technology Officer

Arcadis

As business cycles shorten and the velocity of data increases, CIOs are at the forefront of developing strategies to harness data assets in support of growth strategies. However, the highly dynamic, increasingly complex nature of data is creating headwinds that hold organisations back from fully delivering on its impact.

Join this boardroom to discuss:

  • Data as a strategic capability to enhance customer experiences and drive growth
  • Empowering teams across your organisation with trusted and connected data for real-time engagement and business decision-making
  • Collaborating with key stakeholders to design an enterprise-wide data strategy that’s highly responsive to changing business needs

14:15 - 15:00  Executive Boardroom

Project to Product: How to Survive and Thrive in the Age of Digital Disruption

Sridhar Jayaraman headshot

Sridhar Jayaraman

Associate Vice President, Digital

HCLTech

Chris Groenewegen headshot

Chris Groenewegen

CIO

Lumileds

As businesses attempt to reinvent themselves through IT, many CIOs need to transform their current delivery from a project model into a product-centric model, building cross-functional product-aligned teams that are faster, more iterative and more responsive to business demands However, as a CIO, this presents operational challenges that sit squarely with you, and other business leaders, to ensure that new delivery and operating models are structured to maximise business impact and efficiency. Driving transformation requires an alignment between business and IT across value chains to develop shared priorities. Join this boardroom to discuss:

  • Identifying and prioritising technology development in alignment with business objectives
  • Aligning funding with the organisation's priorities
  • Emphasizing outcomes rather than focus on projects and tasks

15:00 - 15:30  Networking Break

15:30 - 16:15  Breakout Session

Leading with Digital Sustainability – A Strategy Led by Technology

Alex Lancee headshot

Alex Lancee

Chrome OS Lead Benelux

Google Chrome Enterprise

Pascal Pauwels headshot

Pascal Pauwels

CTO

Inter IKEA Group

Enterprises are under pressure to address multiple challenges impacting the planet, their people and profitability. This is all happening while a recession is looming, quiet quitting is real and climate change is a top concern. Now is the time to position technology leaders as key partners in tackling these issues to maximise sustainable value across the business.

Join this session to explore sustainable strategies for:

  • Reducing efforts in the negative impact your company and products have on the planet (environmental sustainability)
  • How to best champion and manage the impact on your people (social sustainability)
  • Managing the business' fiscal health and future profitability (financial sustainability)

15:30 - 16:15  Executive Boardroom

Viewing Endpoint Management Through a Security Lens

Erik Yntema headshot

Erik Yntema

CISO

PostNL

Nick Ebels headshot

Nick Ebels

CIO

PGGM

Sapan Talwar headshot

Sapan Talwar

CISO

Perfetti Van Melle

Many cybersecurity incidents result from well-known vulnerabilities that went unpatched. Delays in remediation can lead to a cascade effect of higher security risks, breaches and attacks. What strategies and tools are CISOs and CIOs using to identify, prioritize and remediate security vulnerabilities across every computing device?

Join this boardroom to discuss:

  • Significantly compressing the time between discovery and remediation
  • Better leveraging threat intel to more aggressively reduce vectors of attack
  • Efficiently managing the ever-expanding number and types of devices needing protection

15:30 - 16:15  Executive Boardroom

Navigating the Digital Future to Accelerate Transformation

Edward Groen headshot

Edward Groen

Vice President Executive Programs

Gartner

Philip Van Der Zande headshot

Philip Van Der Zande

CIO

Stedin

**Exclusively for Gartner EXP Clients**

In order to stay current and competitive in the digital world, CIOs need to ensure primary business goals are aligned with organisational digital priorities. Those forging this path are constantly revaluating their strategy of doing more with less by increasing operational efficiencies to ensure ROI.

In this session, CIOs will discuss:

  • Creating a strategic vision to drive financial company growth through digital initiatives
  • Ensure your digital strategy aligns with business goals to keep you on track in a changing environment
  • Develop executive leadership and transformation through culture and talent

16:15 - 16:25  Break

16:25 - 17:00  Keynote

If You Have a Brain, You Have Bias – The Neuroscience of Decision Making

Marcia Goddard headshot

Marcia Goddard

Chief Culture Officer, The Contentment Foundation

Guest Speaker

As IT and Security leaders within your organisation, making the optimal decisions based on the data and metrics available is imperative to accelerate digital initiatives and ensure the ongoing security of the business. However, the impact our unconscious biases have in the decisions we make may well affect the overall outcome, as well as the performance of your teams. Join Marcia Goddard as she shares how to address your internal biases to make better decisions in your role.

Specifically, Marcia will cover:

  • How to overcome unconscious bias within your teams to make better-informed, data-driven decisions
  • Addressing biases in recruitment to ensure diverse, effective IT and Security teams
  • Building a sustainable high-performance culture to enable digital business

17:00 - 18:00  Closing Reception & Prize Drawing

18:00 - 21:00  Governing Body Welcome Reception

Governing Body Welcome Reception

Exclusive to Governing Body members and select guests, this dinner is a can’t-miss opportunity to connect with your peers prior to tomorrow’s Executive Summit. Please join your colleagues for an evening of good food, wine, and lively networking.

08:15 - 09:00  Registration & Breakfast

09:00 - 09:45  Keynote

The Role of IT and Security Accelerating Digital Business in 2024 and Beyond

Gal Gnainsky headshot

Gal Gnainsky

CSO

Philips

VC Gopalratnam headshot

VC Gopalratnam

EVP & Global CIO

Philips

IT and Security leadership play crucial parts, both independently and in tandem, in accelerating and securing digital businesses, especially in times of uncertainty, heightened competition and a dynamic ever-changing world. Rapid decisions must be balanced with thoughtful considerations of reprioritisation, risk and investments. This requires strong partnership and communication every day between IT and Security.

Join VC Gopalratnam, EVP & Global CIO, Philips and Gal Gnainsky, Chief Security Officer, Philips as they share their insights on:

  • How Philips integrated landscape forms the foundational technological platform in its journey to become the world’s leading health technology company
  • The role and importance of security across a standardised IT architecture
  • The fundamental importance of the collaboration between IT and Security to accelerate digital business

09:45 - 10:00  Break

10:00 - 10:45  Breakout Session

Closing Digital Skills Gaps — Partnering with the Business for Digital Talent Exploration

Christopher Franskin headshot

Christopher Franskin

IT Director - International EMBA

Solvay

Solvay needed to pivot its Digital & Technology operating model to bring agility and support business in times of change. To support this, having the right talent strategy was and is still a key pillar of success. Through partnerships across the business, Christopher was able to take a unique approach to hiring and retaining talent across Europe.

Join this session to hear:

  • How Solvay is building trust and transparency between IT and business partners
  • How to gain key advantages with a one-team mindset when equipping employees for what comes next
  • How CIOs can leverage newfound influence and leadership to partner with key business units to strengthen their digital transformation vision

10:00 - 10:45  Breakout Session

Communicating Risk to Fuel Data-Driven Security Posture

Phillip Larbey headshot

Phillip Larbey

Managing Principal & Head of Verizon's Threat Research Advisory Center EMEA

Verizon

David Grantges headshot

David Grantges

Senior Manager Data Management & Protection - Enterprise Cyber Services

Verizon

In today’s complex cyber threat landscape, understanding the speed of change and current trends is paramount. Collaboration between CISOs and CIOs and using data to support a threat-based approach to risk management is becoming essential for an effective security posture. By translating risk into a business need, IT and Security teams can enable leadership to make data-driven decisions that strengthen security resilience.

Join this session to learn how CISOs and CIOs can collaborate to:

  • Utilise cyber trend data and quantitative risk metrics to evolve your security strategy and prioritise investments
  • Apply the Cyber Risk Quantification model to manage risk effectively
  • Understand how to translate risk into a business need

10:00 - 10:45  Executive Boardroom

The CIO’s Playbook: Execute Strategy Confidently

Jason Baragry headshot

Jason Baragry

Chief Enterprise Architect and Head of Customer Research

Ardoq

Ipek Ozsuer headshot

Ipek Ozsuer

Chief Digital & Information Officer

DSM

Ron Broeren headshot

Ron Broeren

Head of Global Digital Technology & Data Services

Signify

As a CIO, what are you choosing to prioritise when looking at your IT initiatives? While many may compete for your time – investing in security, innovation or even saving costs – they don’t need to be at odds. CIOs can practically take steps to remove the noise that’s creating decision drag.

Join this boardroom to discuss to learn how to:

  • Filter out the noise that stems from unreliable and volumes of data
  • Get the business and IT collaborating when objectives are (re)prioritsed
  • Tactics that enable CIOs to collaborate in real-time with IT and business stakeholders

10:45 - 11:45  Networking Break

10:55 - 11:40  Peer-to-Peer Meetings

Peer-to-Peer Meetings

Connect with like-minded peers in a one-on-one setting through Evanta’s Peer-to-Peer Meetings. You will be matched with peers in your community based on your shared interests and priorities.

11:45 - 12:30  Breakout Session

Championing Strategic IT & Security Business Collaboration Across the Organisation

Jessica Conquet headshot

Jessica Conquet

Global CISO

Randstad

Ad Krikke headshot

Ad Krikke

Leadership Partner

Gartner

Femke Jacobs headshot

Femke Jacobs

Chief Transformation & Technology Officer at NN Bank

Nationale-Nederlanden

Manfred Boudreaux-Dehmer headshot

Manfred Boudreaux-Dehmer

CIO

NATO

Shared responsibility for IT and security strategy will come about when CIOs and CISOs equip the business to actively participate in decision-making without increasing risk. With the adoption of emerging technologies, such as AI, the wider business must be equipped to harvest the opportunities whilst mitigating the potential risks such technologies can bring. How can CIOs and CISOs collaborate and communicate better with the wider organisation to ensure that the business is able to grow without compromising enterprise security? There is no simple answer, and this panel will present examples where enterprise challenges were addressed through close collaboration and ‘meaningful conversations’ between business, IT and security.

Join this Panel discussion for insights into:

  • Equipping the organisation to make risk-informed decisions with autonomy to make the most out of emerging technologies, without compromising the operating environment
  • Enabling the business to embrace a positive mindset around IT and technology, whilst mitigating associated risks
  • Creating ‘win-win’ situations for CIOs/CISOs and the wider organisation to enhance leadership and influence

11:45 - 12:30  Breakout Session

Challenging the Rules of Security – There Has to be a Better Way to Protect the Enterprise!

Oliver Madden headshot

Oliver Madden

Chrome Browser Enterprise Lead

Google Chrome Enterprise

Mark Snel headshot

Mark Snel

CISO

Signify

The threats are constantly growing and so are the costs. Protecting endpoints is one of the many challenges faced by CISOs. Faced with continuously evolving attacks, CISOs must now escape from this quagmire and make game-changing improvements in cybersecurity and administration to prevent cyberattacks and ransomware. Every endpoint could provide an attacker access to the corporate network, but IT organisations today can capitalise on several layers of control to ensure stronger security and operations, whilst ensuring productivity is not compromised. Join this session to discuss:

  • Rethinking your capabilities for strengthening endpoint security and simplifying endpoint management
  • Looking at defence in-depth, securing devices as well as connections, and creating innovative multi-layered defences at different levels
  • Striking the balance between effectively protecting the enterprise without compromising the overall productivity of users

11:45 - 12:30  Executive Boardroom

Strategic Pitfalls in Third-Party Risk Management

Jarle Eek headshot

Jarle Eek

Regional Director

RiskRecon - A MasterCard Company

Bram Van Altena headshot

Bram Van Altena

CISO

KLM Royal Dutch Airlines

Marc Berns headshot

Marc Berns

CISO

Allianz Benelux

Arnaud Wiehe headshot

Arnaud Wiehe

Managing Director Information Security

FedEx

Managing cyber risk across an enterprise IT infrastructure has never been harder. Remote workers, advancing attack methods, and an ever-expanding vendor network are challenging every firm, as total visibility into threats has become nearly impossible. As digital business strategy matures, more organisations are becoming dependent on the cyber posture and protection of third parties. Third-party risks present a unique challenge because you are depending on vendors and partners to operate securely to keep your data and information safe. How are you mitigating the associated risks and demonstrating this to the business to ensure effective security programs?

Join our session to hear about:

  • Common failings across TPRM programs that led to breach events
  • How executives can provide strategic direction for third-party risk teams
  • Key practices being implemented by leading vendor risk firms to maintain strong supply chain risk management

11:45 - 12:30  Executive Boardroom

Building a Secure Unstructured Data Strategy in the Age of AI

Lotta Gunnarsson headshot

Lotta Gunnarsson

CIO

Odido (Formerly T-Mobile NL)

Mark Wayland headshot

Mark Wayland

CRO

Box

Your unstructured data is incredibly valuable. It’s the product roadmap, financial spreadsheets, customer surveys, and employee records that make your business unique. To get the most leverage out of this data, you need a comprehensive unstructured data strategy – including security & compliance considerations, powering external collaboration, and (especially recently) incorporating artificial intelligence.

Join a group of your peers to discuss how to:

  • Identify unstructured data sources and tools in your organisation
  • Develop a strategy to secure this data – for both internal and external use
  • Leverage artificial intelligence to make your unstructured data even more useful


12:30 - 13:30  Lunch Service

13:30 - 14:00  Keynote

Zero Trust Evolution and the Need for Negative Trust

Tony Fergusson headshot

Tony Fergusson

CISO EMEA

Zscaler

Learn about the zero trust evolution and how zero trust architecture secures users, workloads, and IoT/OT devices by addressing critical security shortcomings of legacy network architecture. This session covers key steps in a phased zero trust transformation journey, as well as advanced techniques like “negative trust” deception technology. Active defence on top of zero trust architecture can help organisations become more resilient against advanced attacks and human-led ransomware or supply chain threats.

Join this session and learn to:

  • Identify initial steps and key phases of zero trust transformation
  • Mitigate advanced attacks with zero trust and negative trust (active defence)
  • Demystify zero trust architecture for business leaders

14:00 - 14:15  Break

14:15 - 15:00  Breakout Session

Attack From Hell – The Anatomy of a High-Impact Attack

Azeem Aleem headshot

Azeem Aleem

Managing Director, Northern Europe

Sygnia

Yonatan Lipschitz headshot

Yonatan Lipschitz

Senior Manager Cyber Security Services, EMEA

Sygnia

In recent years, the Sygnia Incident Response Team has handled numerous nation-state attacks that employed unique attack techniques and posed new challenges to security leaders and incident responders.

In this talk, we will guide you through the anatomy of a real-world attack we recently responded to, including attacker TTPs and effective response procedures. This case study will highlight the common pitfalls and key opportunities when defending against even the most sophisticated attacks.

You will come away with:

  • A deeper understanding of current attack trends
  • Actionable insights into the risks and vulnerabilities exploited by attackers targeting highly complex environments
  • Effective defence strategies employed by leading organisations worldwide

14:15 - 15:00  Executive Boardroom

Harnessing the Power of AI to Improve Cyber Resilience

Jesper Olsen headshot

Jesper Olsen

Chief Security Officer (EMEA North)

Palo Alto Networks

Patrick Putman headshot

Patrick Putman

CIO

Manuchar

Martijn Nykerk headshot

Martijn Nykerk

CISO

Randstad

Iman Koster headshot

Iman Koster

Director Covetrus Technology Group Europe

Covetrus

Artificial intelligence has the potential to drive efficiency and technological innovation. Yet taking advantage of this opportunity in the wrong way can have serious security consequences for the organisation. IT and Security leaders need to anticipate and prepare to mitigate potential risks as data is increasingly accessed and analysed in increasingly different ways. For business stakeholders to secure investment, how can CIOs and CISOs demonstrate the benefits of these technologies? Join this session to learn about:

  • How AI plays a role in sophisticated attacks today and how to prepare
  • Examples of how to leverage AI to process and analyse large volumes of data quickly...and safely
  • How leaders can use AI capabilities to enhance cybersecurity and demonstrate value to the business

14:15 - 15:00  Executive Boardroom

Aligning IT and Business with a Connected and Responsive Data Strategy

Ansh Kanwar headshot

Ansh Kanwar

SVP, Technology

Reltio

Candice Dillon headshot

Candice Dillon

CIO

VodafoneZiggo

Bas Meeuwis headshot

Bas Meeuwis

CIO

Nouryon

Bram Mommers headshot

Bram Mommers

Global Technology Officer

Arcadis

As business cycles shorten and the velocity of data increases, CIOs are at the forefront of developing strategies to harness data assets in support of growth strategies. However, the highly dynamic, increasingly complex nature of data is creating headwinds that hold organisations back from fully delivering on its impact.

Join this boardroom to discuss:

  • Data as a strategic capability to enhance customer experiences and drive growth
  • Empowering teams across your organisation with trusted and connected data for real-time engagement and business decision-making
  • Collaborating with key stakeholders to design an enterprise-wide data strategy that’s highly responsive to changing business needs

14:15 - 15:00  Executive Boardroom

Project to Product: How to Survive and Thrive in the Age of Digital Disruption

Sridhar Jayaraman headshot

Sridhar Jayaraman

Associate Vice President, Digital

HCLTech

Chris Groenewegen headshot

Chris Groenewegen

CIO

Lumileds

As businesses attempt to reinvent themselves through IT, many CIOs need to transform their current delivery from a project model into a product-centric model, building cross-functional product-aligned teams that are faster, more iterative and more responsive to business demands However, as a CIO, this presents operational challenges that sit squarely with you, and other business leaders, to ensure that new delivery and operating models are structured to maximise business impact and efficiency. Driving transformation requires an alignment between business and IT across value chains to develop shared priorities. Join this boardroom to discuss:

  • Identifying and prioritising technology development in alignment with business objectives
  • Aligning funding with the organisation's priorities
  • Emphasizing outcomes rather than focus on projects and tasks

15:00 - 15:30  Networking Break

15:30 - 16:15  Breakout Session

Leading with Digital Sustainability – A Strategy Led by Technology

Alex Lancee headshot

Alex Lancee

Chrome OS Lead Benelux

Google Chrome Enterprise

Pascal Pauwels headshot

Pascal Pauwels

CTO

Inter IKEA Group

Enterprises are under pressure to address multiple challenges impacting the planet, their people and profitability. This is all happening while a recession is looming, quiet quitting is real and climate change is a top concern. Now is the time to position technology leaders as key partners in tackling these issues to maximise sustainable value across the business.

Join this session to explore sustainable strategies for:

  • Reducing efforts in the negative impact your company and products have on the planet (environmental sustainability)
  • How to best champion and manage the impact on your people (social sustainability)
  • Managing the business' fiscal health and future profitability (financial sustainability)

15:30 - 16:15  Executive Boardroom

Viewing Endpoint Management Through a Security Lens

Erik Yntema headshot

Erik Yntema

CISO

PostNL

Nick Ebels headshot

Nick Ebels

CIO

PGGM

Sapan Talwar headshot

Sapan Talwar

CISO

Perfetti Van Melle

Many cybersecurity incidents result from well-known vulnerabilities that went unpatched. Delays in remediation can lead to a cascade effect of higher security risks, breaches and attacks. What strategies and tools are CISOs and CIOs using to identify, prioritize and remediate security vulnerabilities across every computing device?

Join this boardroom to discuss:

  • Significantly compressing the time between discovery and remediation
  • Better leveraging threat intel to more aggressively reduce vectors of attack
  • Efficiently managing the ever-expanding number and types of devices needing protection

15:30 - 16:15  Executive Boardroom

Navigating the Digital Future to Accelerate Transformation

Edward Groen headshot

Edward Groen

Vice President Executive Programs

Gartner

Philip Van Der Zande headshot

Philip Van Der Zande

CIO

Stedin

**Exclusively for Gartner EXP Clients**

In order to stay current and competitive in the digital world, CIOs need to ensure primary business goals are aligned with organisational digital priorities. Those forging this path are constantly revaluating their strategy of doing more with less by increasing operational efficiencies to ensure ROI.

In this session, CIOs will discuss:

  • Creating a strategic vision to drive financial company growth through digital initiatives
  • Ensure your digital strategy aligns with business goals to keep you on track in a changing environment
  • Develop executive leadership and transformation through culture and talent

16:15 - 16:25  Break

16:25 - 17:00  Keynote

If You Have a Brain, You Have Bias – The Neuroscience of Decision Making

Marcia Goddard headshot

Marcia Goddard

Chief Culture Officer, The Contentment Foundation

Guest Speaker

As IT and Security leaders within your organisation, making the optimal decisions based on the data and metrics available is imperative to accelerate digital initiatives and ensure the ongoing security of the business. However, the impact our unconscious biases have in the decisions we make may well affect the overall outcome, as well as the performance of your teams. Join Marcia Goddard as she shares how to address your internal biases to make better decisions in your role.

Specifically, Marcia will cover:

  • How to overcome unconscious bias within your teams to make better-informed, data-driven decisions
  • Addressing biases in recruitment to ensure diverse, effective IT and Security teams
  • Building a sustainable high-performance culture to enable digital business

17:00 - 18:00  Closing Reception & Prize Drawing

9 October 2023

10 October 2023

We look forward to seeing you at an upcoming in-person gathering


Evanta cares about the health and safety of our community. Please review the following recommendations prior to attending the gathering.

Location


Venue & Accommodation

Hotel Okura, Amsterdam

A block of rooms has been reserved at the Hotel Okura, Amsterdam at a reduced conference rate. Reservations should be made online or by calling +31 20 678 7111. Please mention EvantaCXO23 to ensure the appropriate room rate.

Deadline to book using the discounted room rate of €312 EUR (plus tax) is 10 September 2023.

Your Community Partners


Global Thought Leaders
CISO Thought Leaders
Key Partner
Program Partners

Community Programme Manager


For inquiries related to this community, please reach out to your dedicated contact.

Dariush Kashani

Community Programme Manager

+44 7542 859489

dariush.kashani@gartner.com