Don't miss these insightful keynotes and round table discussions with your peers!



Extenda Retail - Keeping the store open no matter what's thrown at you

Retail is one of the most exposed industries to cyber-attacks. How does Extenda Retail keep the store open no matter what's thrown at you and how do they prepare to recover from breaches?

How do hackers work

For the next 50 minutes, wear a hacker’s hoody, put yourself in front of a monitor and take a journey into a hacker’s mind and world. Today is the day when you hack the hacker’s mind! We will share with you how hackers think and how we can stop them:

- Open Source Intelligence (OSINT)

- Ransomware-as-a-Service

- The 4 steps of cybersecurity defence: Detect. Block. Mitigate. Improve

OSINT: how a cyber attacker sees your infrastructure

By the time an attacker has sent a packet to a company’s infrastructure, it could be too late to prevent damage. This is the value of Open Source Intelligence (OSINT), the first step in successfully defending against hackers.

This session will explore various scenarios, tools and techniques and will highlight the importance of discovering vulnerabilities before the hackers do.

Ransomware-as-a-Service: The new danger on the dark web

A deep dive into one of the fastest growing cybersecurity risks on the dark web, Ransomware-as-a-Service (RaaS).

This session will explore the nature of the RaaS threat, including the targeting phase, the points of entries and the post-exploitation phase, illustrated with real case studies to ensure that together we can create a safer businesses environment.

The 4 steps of cybersecurity defence: Detect. Block. Mitigate. Improve

Every day we hear about financial losses and data breaches as more and more companies and institutions are hacked. At the same time, the victims of these attacks say they have invested sufficiently in security. How is that possible? How could you improve that state of security in your organization?

This session will outline how to take some important – and all too often overlooked – first steps…

Breakout sessions

This is an opportunity to discuss with your peers and learn from the other participants. The two main questions for this discussion are:

  1. How do you organise your security operations?
  2. What are the key components of your Cyberdefence strategy?

in collaboration with

Not a CIONET member yet?

We'd love to welcome you as the newest member of our CIONET community where Digital Leaders unite.