Netherlands

Events

Did you install the last updates yet?
Date: 05 Mar 2018

The Ministry of Justice and Security will launch a media campaign (radio and social media) in March to raise awareness among the general public about the importance of digital safety. The key message is to always promptly update the operating system on your computer, phone and tablet or of any application you use, as soon as an update becomes available. These updates often include security updates to patch known vulnerabilities. On the campaign website we explain how to do this and provide other tips to enhance your online safety.

The campaign website (see url) will contain a toolbox with all our campaign material which can be used by private partners who support (or intent to support) campaign.

Compliance with the NIS Directive via IEC 62443
Date: 10 Apr 2018

In May 2018, the Network & Information Security (NIS) Directive will be implemented into law in all EU member states. The directive is a pioneer initiative in the European Union and aims to increase the levels of cyber security across sectors deemed vital for the economy and for society in general. No doubt 2018 will be a challenging year for operators of critical infrastructures and services. On the brink of implementation, there are still uncertainties as to how compliance can be achieved, making this a pressing issue for asset owners, system integrators and product suppliers involved in industrial automation and control systems (IACS). If your business qualifies as an operator in the value chain of essential services, chances are compliance with the IEC 62443 series of standards is the way to go. On April 10, DEKRA and Applied Risk will show you how.

12.00 - 13.00 Welcome and registration
13.00 - 13.20 Introduction
13.20 - 14.20 Context and contents of the IEC 62443 standards (Auke Huistra, Applied Risk)
14.20 - 14.35 Coffee break and networking
14.35 - 15.45 Certification requirements (Beat Kreuter, DEKRA)
- Operational documents, administrative documents and additional considerations
- Assessment of supporting evidence or security capabilities applied to processes, products and solutions (and application thereof) by asset owners, service providers, and product suppliers
- Types of certificates
- Scope
- Assessment
- Types of evidence
- Functional areas & architecture
- Submittals
15.45 - 16.00 Q&A Session
16.00 - 18.00 Drinks & networking

Unleashing Innovation in Cyber Security
Date: 25 Oct 2018

Join us in Amsterdam as we address many of the critical cyber and info security challenges and issues for 2018-19 and beyond. Our summit will help you identify strategies to push innovation whilst managing risks, vulnerabilities and threats to information, data security and privacy.

This is your invitation to hear from world-leading experts in cybersecurity! Join us for fantastic cross-industry presentations across two intensive days during European Cybersecurity Month.

Not only will you be hearing from people who have been there and done it all, but you will be hearing from those at the forefront of their fields today. Our program has a rich focus on actual case studies, challenges faced and lessons learned, so the knowledge you’ll receive is practical and evidence-based. Position yourself as an expert active in your industry, and contribute to the conversation with finance leaders.

Summit themes:
• Cyber threats and attacks: digital business capabilities are accessed anywhere, by anyone from any device at any time, while attackers continue to innovate
• The Internet of Things: addressing vulnerabilities whilst meeting customers’ high expectations of login and connectivity
• Smart and resilient infrastructure: maintaining and securing legacy systems and harnessing new security platform opportunities
• From blockchain to supply chain: diagnosing, monitoring and managing third party risks to protect company assets as the supply chain extends
• Cyberthreats against customers: how to protect the business against fraud and abuse from fake social media accounts, malvertising, phishing and malicious bots
• Cloud risks and opportunities: monitoring and controlling cloud computing for the best business outcomes

Panel discussions:
• The evolving regulatory landscape: agile responses that balance data sharing and transparency with privacy, security and governance, especially in the context of the GDP
• The InfoSec professional of the future: identifying the critical skillsets required, developing your staff, and positioning yourself as a leader

Get in touch with Katy if you have any questions or would like to take part: katy.barbier-greenland@unleash-cyber.com

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information