Room 1 | Room 2 | Room 3 | Room 4 | Room 5 | Room 6 | Room 7 | |
14:00 – 14:20 | FORESCOUT Sales/strategic 360-degree asset visibility and continuous automated security across your digital terrain – Forescout Continuum (Jörn Dierks) |
THALES Technical How to secure O365 & Outlook with Encryption solutions by Thales (Frank Asoh) |
F5 Sales/strategic How to secure modern apps in distributed environments (Eric Limborg) |
JUNIPER Technical Our Network Does its Own Troubleshooting (Bart Gebruers) |
SENTINELONE – Sales/Strategic “One goal, One mission- XDR” Smarter. stronger, faster, Autonomous (Peter Magez) |
AXONIUS – Technical Helping you cross the CAASM (David Bradley) |
VECTRA – Sales/Strategic Delivering SOC efficiency with Attack Signal Intelligence (Marijn Joosten) |
14:25 – 14:45 | FORTINET – Sales/strategic Extend Threat Intelligence Outside the Perimeter (Jerco Veltjens) |
PALO ALTO NETWORKS – Technical Zero Trust Network Access with Zero Exceptions |
INFOBLOX – Sales/strategic How to catch threats where they are born |
NETSKOPE – Technical Zero Trust: The Data Protection edition (Andy Quaeyhaegens) |
SILVERFORT – Sales/Strategic ITDR – Solving the blind spots of MFA & Service Accounts (Jasper Lounio) |
DATACORE – Technical Shield Your Data Against Ransomware and Other Cybersecurity Threats with object storage (Pieter van de Burg) |
WASABI – Sales/Strategic How to Fight Ransomware with Immutable Cloud Storage (Eric Peters) |
14:50 – 15:10 | FORESCOUT – Technical OT:ICS Networks – Secured with Forescout Continuum (Denis Ratz) |
THALES – Sales/strategic Thales & Microsoft, Passwordless authentication with Fast Identity Online (Michiel Linders) |
F5 – Technical Enterprise-class security for cloud applications – a real-time demo |
JUNIPER – Sales/strategic Public cloud experience with your hybrid/private datacenter (Ronald Vervest) |
SENTINELONE – Technical SentinelOne Singularity XDR: Best of Both Worlds (Christof Jacques) |
AXONIUS – Sales/Strategic What is CAASM and why does your organisation need it (Tapio Vaaramaki) |
VECTRA – Technical Detecting the Unknown in practical terms (Wim Vandebroeck) |
15:15 – 15:35 | FORTINET – Technical How to SASE, ZTNA and SD-WAN? Leading the Evolution of Networking and Security (Bram De Blander) |
PALO ALTO NETWORKS – Sales/strategic Zero Trust Network Access with Zero Exceptions |
INFOBLOX – Technical DNS in the Cyber Kill Chain |
NETSKOPE – Sales/Strategic Ready for a real conversation about Zero Trust? (Frederik Jans) |
SILVERFORT – Technical ITDR – Realtime protection with Identity Security policies & Service Accounts fencing (Davy De Mits) |
DATACORE – Sales/Strategic Expand your business by incorporating DataCore Software-Defined Storage Solutions into your portfolio |
WASABI – Technical the foundation for a multi-cloud architecture |
15:35 – 15:55 | Power Break | ||||||
15:55 – 16:15 | FORESCOUT – Sales/strategic Forescout multifactor risk score – Leverage the Continuum Platform for Multifactor Cyber Risk Analysis (Jörn Dierks) |
THALES – Technical How to secure O365 & Outlook with Encryption solutions by Thales (Frank Asoh) |
F5 – Sales/strategic How to secure modern apps in distributed environments (Eric Limborg |
JUNIPER – Technical Our Network Does its Own Troubleshooting (Bart Gebruers) |
SENTINELONE – Sales/Strategic “One goal, One mission- XDR” Smarter. stronger, faster, Autonomous (Peter Magez) |
AXONIUS – Technical Helping you cross the CAASM (David Bradley) |
VECTRA – Sales/Strategic Delivering SOC efficiency with Attack Signal Intelligence (Marijn Joosten) |
16:20 – 16:40 | FORTINET – Sales/strategic Extend Threat Intelligence Outside the Perimeter (Jerco Veltjens) |
PALO ALTO NETWORKS – Technical Zero Trust Network Access with Zero Exceptions |
INFOBLOX – Sales/strategic How to catch threats where they are born |
NETSKOPE – Technical Zero Trust: The Data Protection edition (Andy Quaeyhaegens) |
SILVERFORT – Sales/Strategic ITDR – Solving the blind spots of MFA & Service Accounts (Jasper Lounio) |
DATACORE – Technical Shield Your Data Against Ransomware and Other Cybersecurity Threats with object storage (Pieter van de Burg) |
WASABI – Sales/Strategic How to Fight Ransomware with Immutable Cloud Storage (Eric Peters) |
16:45 – 17:05 | FORESCOUT – Technical Cyber Security Workflow Automation: Incident response & Security Orchestration with the Forescout Continuum Platform (Denis Ratz) |
THALES – Sales/strategic Thales OneWelcome, ONE PLATFORM FOR EVERY IDENTITY (Sandra Wauters) |
F5 – Technical Enterprise-class security for cloud applications – a real-time demo |
JUNIPER – Sales/strategic Public cloud experience with your hybrid/private datacenter (Ronald Vervest) |
SENTINELONE – Technical SentinelOne Singularity XDR: Best of Both Worlds (Christof Jacques) |
AXONIUS – Sales/Strategic What is CAASM and why does your organisation need it (Tapio Vaaramaki) |
VECTRA – Technical Detecting the Unknown in practical terms (Wim Vandebroeck) |
17:10 – 17:30 | FORTINET – Technical How to SASE, ZTNA and SD-WAN? Leading the Evolution of Networking and Security (Bram De Blander) |
PALO ALTO NETWORKS – Sales/strategic Zero Trust Network Access with Zero Exceptions |
INFOBLOX – Technical The roll of IPAM in a security event |
NETSKOPE – Sales/Strategic Ready for a real conversation about Zero Trust? (Frederik Jans) |
SILVERFORT – Technical ITDR – Realtime protection with Identity Security policies & Service Accounts fencing (Davy De Mits) |
DATACORE – Sales/Strategic Expand your business by incorporating DataCore Software-Defined Storage Solutions into your portfolio |
WASABI – Technical the foundation for a multi-cloud architecture |