It’s more than likely these are not the business challenges you are facing today, but our digital world is changing with warp speed and so following business questions should be addressed within every organization:
♦ What security risks are we willing to take and do we take enough measures to counter the risks we don’t want to take?
♦ Do we have the right infrastructure to handle the changing business models and support us for the next 5 to 10 years?
♦ Is my IT staff equipped with all the necessary knowledge to handle the vast security and infrastructure complexity?
As an IT professional there’s no doubt you’re passionate about the latest evolutions and trends within the digital transformation. You’ll see this evolution is taking us beyond the Earth. At the Checkup Seminar you’re at the right place to learn more and be inspired.
We call these short demo sessions the ‘Technology Test Flights’ and you can choose between various topics and technologies, depending on your interest.
Next to these practical demos we’re presenting 2 inspiring Break-out sessions & 5 Key Note sessions ‘recharging’ you for another exciting year! For the techies amongst you: you can even follow a Hacking Workshop!
10.15 | Introduction Speech | Frank Staut | Managing Partner SecureLink 10.30 | Key Note 1 | Alexander De Croo | Minister of Development Cooperation, Digital Agenda,Telecom and Postal Services 11.10 | Technology Test Flights Round 1 11.40 | Break out session | SECURITY AS A SERVICE | Peter Beerten (SecureLink) HACKING WORKSHOP | Ronald Kingma (SecureLabs) 12.10 | Lunch 13.10 | Key Note 2 | Bas Lansdorp | M.Sc., Co-Founder & CEO 13.50 | Technology Test Flights Round 2 15.00 | Technology Test Flights Round 3 15.30 | Key Note 4 | Niels van de Wall | Director IT operations @ Bol.com 16.10 | Technology Test Flights Round 4 16.40 | Key Note 5 | Stijn Meuris | Musician, Director & Journalist 17.40 | Apero 18.15 | Walking Dinner
10.15 | Introduction Speech | Frank Staut | Managing Partner SecureLink
10.30 | Key Note 1 | Alexander De Croo | Minister of Development Cooperation, Digital Agenda,Telecom and Postal Services
11.10 | Technology Test Flights Round 1
11.40 | Break out session |
SECURITY AS A SERVICE | Peter Beerten (SecureLink)
HACKING WORKSHOP | Ronald Kingma (SecureLabs)
12.10 | Lunch
13.10 | Key Note 2 | Bas Lansdorp | M.Sc., Co-Founder & CEO
13.50 | Technology Test Flights Round 2
15.00 | Technology Test Flights Round 3
15.30 | Key Note 4 | Niels van de Wall | Director IT operations @ Bol.com
16.10 | Technology Test Flights Round 4
16.40 | Key Note 5 | Stijn Meuris | Musician, Director & Journalist
17.40 | Apero
18.15 | Walking Dinner
Frank will explain his views on the evolution of our industry, starting with the birth of SecureLink more than 12 years ago. It is crystal clear that our industry evolved tremendously: At the time the adoption of concepts like ‘the cloud’ and ‘software defined’ was zero to none and there was a low prevalence of advanced security threats. Things have changed! Gaining insight in the digital transformation enables us to have a sneak peak to the future.
Frank Staut is co-founder & Managing partner of SecureLink and has always been involved in building the vision of the company. Portfolio management is an important part of his role. Frank is actively involved at customer side technology discussions and regularly speaks at public events.
Mars One is a not for profit foundation with the goal of establishing a permanent human settlement on Mars. To prepare for this settlement the first unmanned mission is scheduled to depart in 2020. Crews will depart for their one-way journey to Mars starting in 2026; subsequent crews will depart every 26 months after the initial crew has left for Mars. Mars One is a global initiative aiming to make this everyone’s mission to Mars, including yours.
Bas Lansdorp has never been one to let bold ventures intimidate him. A born entrepreneur, he sees potential and opportunity where others shy away. Gifted with an articulate vision and genuine enthusiasm, he moves people with his passion for science and the human mission to Mars.
Lansdorp received his Master of Science in Mechanical Engineering from Twente University in 2003. For five years Lansdorp worked at Delft University of Technology and in 2008 founded Ampyx Power in order to develop a new, viable method of generating wind energy. Lansdorp sold his majority interest in Ampyx in 2011 in order to launch Mars One, Lansdorp’s dream for many years.
Alexander De Croo (born 3 November 1975) is a Flemish liberal politician, economist and businessman. Rising to political fame as the son of the prominent politician Herman De Croo, he currently holds the office of Deputy Prime Minister of Belgium and Minister of Development Cooperation, Digital Agenda, Telecom and Postal Services.
Closing your eyes for threats & today’s complexity will not make you secure. Security as a Service minimizes your risks.
The security landscape is changing at lightning speed. What was working and effective yesterday is easily bypassed tomorrow. You need to actively monitor for new threats and adapt your systems quickly to detect and stop them.
Ask yourself the question: will I invest in technology and people to try to stay ahead of the attackers or should I rely on a trusted and skilled partner and enjoy a good night’s rest ?
Peter Beerten is business developer managed services, he joined SecureLink at the start of 2015, before he worked for two of world’s largest managed security providers. During his career he built a broad experience in protecting customer networks from advanced threats.
The SecureLabs Hacking Challenge! Can you discover the weakest link?
Learn from an experienced pen tester and find out yourself! SecureLabs is joining our Checkup Seminar and organized a real Hacking / Pen testing Challenge!
This break out session is for techies that want to test their hacking skills during a Hands-on Workshop.
The Challenge is set up for different skill levels. An experienced coach will guide you through different scenarios, but it’s up to you to find the weakest link in the security design.
Important note: You can only participate in the Hacking Challenge on BYOD basis. Meaning: bring your own device (laptop probably) and ‘prep’ it upfront. Provide your equipment in advance with the most recent patches, antivirus software, hackers toolkit and remove all your personal and business information from the laptop or work from a sandbox environment.
And be fast: Only 40 seats available for this workshop! First come, first served.
SecureLabs was founded in 2007 (formerly known as ISSX) with IT infrastructure and application security as background. SecureLabs is a fast growing company with a primary focus on (technical) information security. SecureLabs focuses on research and security for all segments by using its own knowledge and innovation. Financial institutions, healthcare, industry, manufacturing and government are important customers from the start.
You want to bet that you will be thinking of Stijn Meuris, next time you take a look at the stars? Stijn Meuris is larger than live. He is a singer & a songwriter (Noordkaap, Monza and Meuris), a columnist and a writer. And on top of that, hey is a big fan of the universe, ever since he was a little kid. In his keynote, he will guide you through his favourite space. The trip begins on earth and it will take you beyond our solar system, towards the borders of space and the beginning of time.
It is science. It is philosophy. It is humour. It is Meuris!
Refreshing the complete bol.com infrastructure, the IT OPS team and the processes without layoffs.
The largest online retailer in the Netherlands generates an annual growth of 20% per year. There is no say the agile data center infrastructure plays a crucial role! Experiences, specifications and challenges related to the (DC) infrastructure will be shared with you during this exciting customer case. The different building blocks of the architecture, their role and impact on the deployment of new services will be discussed. Obviously, extensive automation is a critical feature for this dynamic environment.
Over the years bol.com has grown fast and steadily. The IT department has been a powerful driver of innovation: all functionality & tooling for customers, suppliers, partners and employees is developed and runned 24/7 in an agile way. Niels will explain the journey that bol.com made so far to grow and stay agile in their web operations and share the challenges ahead.
Niels van de Wall is Director IT Operations of bol.com and has been building and leading devops teams with strong operational, metric driven focus resulting in high available and performing web services for customers.
You’ll see you are facing similar challenges!
Digital technology is changing. Internet is no longer something separated from the real world, a different “cyberspace”. It is becoming closely embedded, woven into the fabric of our daily lives. Internet is becoming more and more like electricity. This changes behavior of people, and companies should adapt and respond to this changed behavior.
Bart De Waele shares 6 tactical trends to use in digital as a company.
Bart De Waele | Chief Energizing Officer van Wijs, digital agency
Cloud services are on the rise. The initiators typically are outside the IT organization; the user and business line managers with their own budget go first. Also these services should be secure for businesses employees to use confidently, without any blind spots.
Like with any new technology, there are pros and cons. The biggest advantage of cloud services is go to market, agility and accessibility. The challenges mostly are related to sensitive data loss.
Over the years, we all have put a huge amount of security tools in place; firewalls, ips, proxies, av, apt, … All of them are blind to cloud services since either they don’t understand the context and behavior of SaaS or they simply don’t see the data streams.
Yet there’s hope since Elastica provides a simple CloudSOC, reimagining cloud security with the application of advanced data science and machine learning, finding threats to your company sensitive data.
We will start our Technology Test Flight by profiling the current use of SaaS and by classifying this with risk acceptance levels. A SaaS audit will allow the organization to define a ‘roadmap’ to SaaS which should include different steps, ranging from identity management, application sanctioning to security on SaaS.
The next step is to screen corporate sanctioned SaaS apps and data in cloud services. The screening process is to detect threats; ranging from user errors over insider threats and external attacks.
The actions could be in the form of ‘ids’, focusing on incident handling or ‘ips’, by also blocking access to compromised services.
Speaker | Stijn Rommens
Today’s CISOs are fighting fires on several fronts to keep their organizations safe. They’re being asked with less resources to defend against a barrage of increasingly sophisticated, targeted attacks while their organization’s attack surface is growing all the time, thanks partly to an explosion in mobile device usage, cloud services and newly-discovered software vulnerabilities.
To effectively counter today’s evolving threat landscape, you need a full threat defense platform consisting of 4 integrated elements across the entire threat lifecycle:
- Prevent: Assess vulnerabilities to potential threats and proactively protect endpoints, servers and applications.
- Detect: Spot advanced malware not detected and blocked by the first stage.
- Analyze: Assess risks and determine impact of threats.
- Respond: Delivers signatures and updates to prevent future attacks.
Unfortunately, many organizations don’t have a fully-integrated platform with centralized control across all four quadrants. This means threats can squeeze between the gaps and infiltrate the corporate network, causing destructive damage to hard drives, or hugely harmful loss of customer data and/or IP.
In today’s threat landscape, the stakes have been raised as high as they can go for CISOs. Not only do you need security solutions in place that cover each of the four quadrants of the threat lifecycle as mentioned, but they need to integrate tightly with one another and be manageable from a single pane of glass.
The most effective way of Securing your business will be shown during our Technology Test Flight @ the Trend Micro Booth.
Speaker | Frederik Van Roosendael – SE Trend Micro
HOW TO BEAT ADVANCED THREATS WITH AN INTEGRATED APPROACH TO SECURITY VISIBILITY, ANALYTICS, THREAT INTELLIGENCE AND ENFORCEMENT?
A new breed of hackers are perpetrating increasingly sophisticated, targeted, and effective exploits on enterprises. This shift in the threat landscape requires a new defense that combines prevention with more effective attack detection, preparedness and response. Encrypted channels are also becoming more and more common as infiltration point in and out the network. Organisations need to maintain visibility while making sure resources can be allocated to investigate relevant alarms to their environment, keeping cost under control and avoiding the so called car alarm syndrome.
Learn during our demo session how Blue Coat can automate advanced threat protection to fortify your network against unknown and advanced malware. Our combination of static, dynamic, and reputational analysis techniques expose zero-day threats and unknown malware. By decrypting once and feeding to many, we will also demonstrate how Blue Coat can eliminate the encrypted traffic blindspot for your third-party security tools, without compromise, with privacy in mind, protecting investments already made and higher your Return on Investment. The net result: your business can move beyond fear and start focusing on possibilities.
Speaker | Erik Engberg | Advanced Threat Protection Specialist – Nordics and Benelux
During this demo we give you a short impression of using Okta’s IDAAS service;
• End user experience, SSO for all your cloud applications from your desktop to your mobile including MFA
• Integrate your AD infrastructure with Okta for a Hybride setup
• Demonstration of Provisioning and Deprovisioning off cloud appliactions on the fly
• Demonstration of Okta Mobile Management
• We show how easily you can add new cloud applications to your users
Speaker | Joshua Kroeze | Sales Engineer Benelux
THE MOST TRANSFORMATIVE TECHNOLOGIES ARE OFTEN THE ONES WE DON’T EVEN THINK ABOUT
Several independent studies have reported that major datacenter issues inefficiencies are caused by friction between IT silos, IT Security, day-to-day management challenges and reduction of cost.
In todays IT landscape, these are key issues that IT organisations want to resolve in order to become more agile, efficient and lean on their path to dynamic cloud delivery models.
The Invisible Infrastructure vision of Nutanix, powered by our Xtreme Computing Platform, elevates IT to focus on the business, and in this session we will take you on a powerful trip through the Xtreme Computing Platform capabilities.
Why do you need to attend our session? We will show you how Nutanix is unique and enables you to :
• radically simplify IT
• become predictable and truly agile
• and deliver business services & applications with lower TCO.
Presenter | Steven Duckaert
Each day applications get breached, databases with full users info, including usernames and passwords are shared over the internet. “123456” was the most used password in the 90’s, today it’s still the same. People use the same passwords for multiple applications, but what if one of those applications got breached? Are you changing your passwords from time to time? Do you like filling in all those forms to create a new account on the next cool application?
As application owner, Have you ever asked yourself how many authentications where not the right user from the total amount of successful authentications?
It’s time to change the way we manage and share our identity, it’s time to give users the ability to protect their accounts, it’s time to manage it yourself !
MYDIGIPASS.Com is an international cloud based strong authentication service from VASCO Data Security for Web and mobile applications.
MYDIGIPASS.COM has been approved and licensed by the Belgian government so it can be used to guarantee authentications towards the Federal Egoverment applications, next to the existing authentication methods like Connected eID, citizen token.
MYDIGIPASS.COM supports different authentication methods from DIGIPASS hardware, Intel IPT, MYDIGIPASS native app, SMS, connected eID, unconnected eID even existing Bank card readers. Users can choose the DIGIPASS they prefer in their day to day authentication towards applications. The most preferred authentication method is the MYDIGIPASS native app which gives access by just scanning a QR-Code after entering your PIN. Very easy, secure and convenient since you even don’t have to touch your keyboard anymore to enter credentials.
During the Vasco Technology Test Flight you’ll learn how easy you can manage and share your digital identity with different web and mobile applications secured with banking level security.
Speaker: Tom Vleeracker
Modernization of the network topology – Using automation and Orchestration to activate Virtualization of network & services
Looking at the requirements for the Data Center today and in the future, we see that these environment need the right underlay network, the right technology to interconnect multiple DC’s and automate processes in place to provide a future proof network that can handle the combined VLAN-based and Overlay based requirements.
In this Juniper test-case we will use Juniper Switching, Security and Routing components and show how the seamlessly work together to solve the new challenges in the Data Center.
We will show how to automate the deployment of a NFV function in your data Center and show this in conjunction with Vmware Orchestration and automation.
Speaker | Alain Levens | Sr. Sales Engineer
Enterprises are increasingly building private clouds to deliver agile, low-cost IT services to their line of business (LOB) stakeholders. While much of the storage and compute management for private clouds is automated, delivery of critical network services is still performed manually. In this demo we will show how Infoblox can automate this last piece of the puzzle.
Speaker | Erik Peeters | Systems Engineer Infoblox
As you move towards the cloud what steps are you taking to ensure your applications and data are secure? Palo Alto Networks has established a rich history of helping IT organizations secure its users, applications and data by providing superior visibility and control across the network. Now we are offering you the tools to extend your visibility and control towards cloud-based applications, be it in a public, private or hybrid model.
During our Technology Test Flight we will demonstrate how you can easily extend your existing security policy into cloud environments and protect your corporate applications and data regardless of their location. Additionally, we will discuss advantages of virtual firewalls and GlobalProtect deployed in a cloud-based on-demand service model to protect roaming users at any time. Finally, we will focus on the importance of App-ID and User-ID to detect and control the use of public and private SaaS applications.
Speaker | Tim de Boeck
At the heart of Pulse Secure’s Access Solutions is Pulse One. Pulse One makes box-by-box management a thing of the past. Administrators can now use its intuitive, role-based web console to centrally manage remote, mobile and campus access policies, report on appliance health and endpoint compliance, and update appliances by group.
Pulse One is a cloud-based management platform designed to streamline access management of enterprise services and applications in the datacenter and the cloud. The seamless IT admin experience of Pulse One unifies access policies for on-premise and cloud deployments while also addressing the management nuances of enterprise mobile security.
So, rather than deploying a new enterprise mobility management (EMM) platform, you can simply activate the EMM capabilities of your existing virtual private network (VPN).
Pulse Secure makes it easy to support mobile apps, BYOD, and any iOS or Android device securely. The Pulse One management console enables enterprises to deploy mobile apps and auto-provision enterprise services from the same console they use to manage enterprise access.
Pulse Secure Workspace is the perfect container for “bring your down device” (BYOD), with security that separates enterprise and employee data, supports enterprise wipe, and can be used with any mobile app. Together, they provide a holistic solution that is user-friendly as well as easy to deploy and administer.
Speaker | Jonas Gyllenhammar | Sr Consulting engineer
The new Virtual Volumes (aka VVOLs) feature is a major new release for VMware and subsequently supporting storage vendors, and thus full support will take time across the industry. ALL Nimble Storage arrays will be supported with VVOLs, and the first glimpse of this feature will fall under a new concept of a “Tech Preview” mode in the new 2.3 feature release of NimbleOS. We will explain you how you can setup vVols in Nimble Storage with a few clicks and see the benefits immediately.
Presenter | Walter Van Hoolst | Senior System Engineer Nimble Storage
Distributed Denial-of-Service attacks are top of mind for organisations. Attackers are exploiting amplification techniques for volumetric attacks while also increasing the sophistication of their application level attacks. Organisations must focus on designing the right DDoS protection architecture to effectively mitigate sophisticated multi-layer attacks. And for many this means employing a hybrid model of on premise equipment and cloud solutions to defend against attacks. In this session you will learn how the right architecture can mitigate modern DDoS attacks, from ICMP fragmentation grenades to the latest in SSL brute force key exchange attacks.
Speaker | Philippe Bogaerts
Venues come to life with location-aware mobile apps that provide indoor turn-by turn navigation, contextual marketing, and a personalized guest experience.
There are over a billion smartphones in the world today, which enable users to access the web wherever they happen to be – retail stores, hospitals, resort hotels, airports, stadiums and convention centers. The impact of anywhere, anytime access to the Internet can have a considerable and lucrative impact on indoor enterprise venues.
The Aruba Networks Mobile Engagement Solution integrates best-in-class enterprise Wi-Fi and Aruba Location Services with self-service device onboarding and mobile app platforms into one integrated solution that’s quick and easy to deploy. We’ll demonstrate the possibilities of the Meridian platform allowing you to boost location intelligence and the interaction between your organization and your customer or patient.
Businesses can leverage user, device, location, and other contextual data to engage visitors in relevant and meaningful ways, encourage brand loyalty, increase revenue, and create a memorable guest experience by offering more personalized services.
Speaker | Gert De Wever
Avaya Fabric Orchestrator is an appliance based next generation management solution. It is a comprehensive, highly available, yet modular platform on which, all of Avaya’s current management applications like COM, VPFM, IPFM etc. will reside. The extensibility of this architecture provides an ability to plug in value added services there by increasing the customer value and at the same time preserving their investment. To discover @ the Avaya booth @ the Checkup Seminar!
Speaker | Claude Lepoivre
SecureLink can help you with a range of your data center challenges by delivering a completely new operational model for networking. This model based on the Vmware NSX breaks through current physical network barriers and exposes a complete suite of simplified logical networking elements and services including logical switches, routers, firewalls, load balancers, VPN, QoS, monitoring, and security. Also a substantial advantage of the NSX is that virtual networks are deployed non-disruptively over any existing network and on any hypervisor. This new approach allows data center operators to treat their physical network as a pool of transport capacity that can be consumed and repurposed on demand.
This network virtualization platform offers a platform to insert other vendor services. Integrated software and hardware partner products can range from network gateway services, application delivery services, and network security platforms to security services. To secure your SDDC, Palo Alto Networks and Trend Micro solutions offer a seamless integration with your ‘reproduction of your physical network in software’.
The network virtualization platform and how to secure it (with Palo Alto Networks and Trend Micro Deep Security) will be demonstrated during the Technology Test Flight @ the SecureLink booth!
Speaker | Bart Jansens
Deliver applications and desktops through a single virtual desktop infrastructure (VDI) platform to streamline management, easily entitle end users and quickly deliver the Windows resources end users need, at the speed they require. Support printing, USB drives, smart cards, scanners and even HTML access to virtual desktops and hosted applications and desktops across more devices, including Google Chromebooks.
We will demonstrate how the VMware Horizon 6 platform is built with the Raido’s Taskflow Software on top of Nutanix Hardware.
Speaker : Jan Hosselaer / Stijn Maes