Brief Agenda

ZTS & Identity Forum

8 May, 2025

09:00

09:05

10:05

09:05 – 10:05

  • What is the current state of security and fraud across industries?
  • What are the top cybersecurity threats organizations are facing today?
  • How are threat vectors evolving, and what new strategies are attackers leveraging?
  • How are security professionals preparing for the next generation of cyberattacks?
  • What is the current state of security and fraud in banking and financial services?
  • How are fraud tactics evolving in financial services, and what countermeasures are most effective?
  • How can Zero Trust principles strengthen financial cybersecurity in a digital-first world?
  • How do GDPR, NIS2, and financial regulations (PSD2, DORA) intersect to enhance data protection?
  • How does AI enhance fraud detection and risk management while avoiding over-reliance?
  • What challenges do legacy banking systems pose to Zero Trust implementation, and how can they be modernized?
  • How can financial institutions measure the ROI of Zero Trust adoption and cybersecurity investments?
  • What inefficiencies exist in current defense security consulting contracts?
  • How can defense organizations future-proof their internal cybersecurity capabilities?
  • How do geopolitical tensions and cyber warfare impact national and financial security?
  • Should nations invest in sovereign cloud solutions to protect critical defense and intelligence data?
  • How does SASE enhance cybersecurity beyond traditional Zero Trust models in defense and government agencies?
  • Cyber Resilience: From Theory to Reality
  • Leveraging real-world loss data to make informed security decisions.
  • Beyond Zero Trust: The Evolving Role of Cyber Resilience in Modern Enterprises
  • Why Insurance, Resilience & Security Must Work Together

10:00

10:05

10:30

10:05 – 10:30

  • Learn how to use identity as the core of your Zero Trust strategy to prevent attacks before they happen.
  • Understand how Silverfort’s approach provides continuous, real-time visibility across on-prem and cloud environments.
  • Discover practical ways to enforce least-privilege access and apply Zero Trust across every resource access attempt.
  • Get insights from real attacks, like the Colonial Pipeline incident, and how Zero Trust can help prevent similar threats in your organization.

10:30

10:50

10:30 – 10:50

In this session, Ivo van Nimwegen will explore how Siemens is implementing a Zero Trust approach to mitigate these challenges. He will discuss key risks associated with IT/OT convergence, strategies for securing critical infrastructure, and the role of continuous verification in preventing cyber threats. This session will provide practical takeaways for organizations looking to strengthen their Zero Trust security posture.

10:50

11:10

10:50 – 11:10

The Firewall Is Dead. Long Live Zero Trust with Cloudflare:

In this session, Cloudflare will highlight why traditional firewalls are no longer effective and how Zero Trust offers a modern, scalable approach to securing users, applications, and data. Expect practical insights into reducing attack surfaces, verifying access continuously, and enhancing security without compromising performance.

11:00

11:35

12:20

11:40- 12:20

  • How can organizations stay ahead of evolving compliance mandates?
  • What’s the missing link between data governance and enterprise security strategies?
  • How can businesses embed privacy into everyday data operations?
  • Can security and seamless data sharing coexist under strict privacy laws?
  • Is least-privilege access enough to prevent data breaches?
  • How can automation strengthen real-time threat detection?
  • What role does AI play in strengthening SASE-driven security?
  • What’s the best approach for securing remote and hybrid workforces?
  • Can quantum computing impact SASE frameworks in the future?
  • Are today’s monitoring tools keeping up with increasingly sophisticated cyberattacks?
  • How can legacy systems be adapted to meet today’s compliance and security demands?
  • Can AI-driven security keep pace with changing privacy laws and ethical concerns?
  • How can organizations ensure secure multi-cloud connectivity with SASE?
  • As cyber threats evolve, which risk indicators truly measure an organization’s security strength?
  • The next frontier: What’s the role of quantum computing in securing sensitive data?
  • As supply chain attacks surge, what’s the best approach to vendor security?
  • How can businesses ensure real accountability in third-party security partnerships?
  • Is blockchain the missing piece for strengthening data integrity and trust?
  • What’s next in regulatory compliance, and how will it reshape security priorities?

12:00

12:20

12:40

12:20 – 12:40

Cybersecurity audits are essential in today’s digital world, especially for industries like banking and retail. This session will explore the evolving role of internal auditors in assessing IT and cybersecurity resilience, focusing on emerging risks, compliance, and data protection strategies. Key areas like AI, IoT, and third-party vendor risks will also be discussed, giving practical insights for improving audit practices.

12:40

13:00

AI is rapidly evolving cyber threats, making traditional defenses ineffective. This session explores how Zero Trust architecture and AI-driven decision-making transform cyber defense into dynamic strategies. Organizations can outsmart attackers by continuously validating trust and treating every access request as critical, based on real-world tactics and kill chain models. It also highlights AI’s role in threat detection, access control, and swift defense strategies against cyber-attacks.

12:40 – 13:00

13:00

14:00

14:00

14:45

14:00 – 14:45

  • What is the current state of cybersecurity and fraud across industries, including manufacturing and supply chains?
  • What are the top cybersecurity threats organizations are facing today, and how are attackers evolving their tactics?
  • How are security professionals preparing for the next generation of cyberattacks and building cyber resilience?
  • What is the current state of fraud in banking and financial services, and how are tactics evolving?
  • How does AI enhance fraud detection and risk management in financial services while avoiding over-reliance?
  • How can Zero Trust and SASE principles strengthen cybersecurity across finance, defense, and critical infrastructure?
  • What challenges do legacy systems pose to Zero Trust implementation, and how can modernization be approached?
  • How can organizations measure the ROI of Zero Trust and cybersecurity investments effectively?
  • How do GDPR, NIS2, PSD2, and DORA intersect to drive stronger data protection and compliance?
  • What inefficiencies exist in defense cybersecurity consulting contracts and procurement processes?
  • How can defense organizations future-proof their internal cybersecurity capabilities?
  • How do geopolitical tensions and cyber warfare impact national and financial security strategies?
  • Should nations invest in sovereign cloud solutions to safeguard defense and intelligence data?

14:45

15:00

14:45 – 15:00

  • Identifying the most serious AI-driven security traps threatening your infrastructure.
  • Practical strategies to avoid falling into these traps and strengthen your AI security posture.

15:00

15:00

15:20

15:00 – 15:20

  • Emerging threat trends in OT environments and critical infrastructure
  • Intelligence-driven response strategies and mitigation frameworks
  • Real-world examples of threat actor tactics, techniques, and procedures (TTPs)

15:20

15:30

15:20 – 15:30

15:30

15:45

15:30 – 15:45

In today’s fast-paced digital landscape, artificial intelligence is revolutionizing the way we build, deploy, and secure applications.
But with innovation comes new risks:

  • How do we safeguard our applications in a world where AI is both a tool and a threat?
  • How is AI changing the landscape of application security, both in terms of threats and defense mechanisms?
  • With AI-generated code and automated development processes on the rise, how can companies ensure security remains a priority without slowing down innovation?
  • Franco Lavicka

    THALES

15:45

16:05

15:45 – 16:05

  • From past lessons to future resilience—how is automotive security transforming?
  • Biggest security threats for connected and autonomous vehicles today
  • How do you see quantum computing impacting automotive security in the near future?
  • NIS2, GDPR, and DORA—how can businesses avoid compliance fatigue?
  • How does SASE help with compliance frameworks like DORA & NIS2?
  • How will automotive cybersecurity strategies evolve over the next five years?

16:00

16:05

16:50

16:05 – 16:50

  • How are cloud-native security architectures boosting flexibility and risk management?
  • What role do CASBs play in securing SaaS and cloud data?
  • How is adaptive authentication changing the future of MFA?
  • What’s the future of cross-device authentication with FIDO2 and WebAuthn?
  • How will quantum computing impact cryptography?
  • What role does Zero Trust play within a SASE framework?
  • How does ZTNA defend against threats like ransomware and supply chain attacks?
  • How can organizations balance cloud security with evolving compliance rules?
  • How does automation make security frameworks more scalable?
  • What’s the biggest challenge in managing security across multiple regulations?
  • What are the biggest compliance risks introduced by automation in cybersecurity?
  • Could decentralized identity solutions integrate with SASE for enhanced security?
  • How can organizations align security automation with evolving regulatory requirements?
  • What cyber threats should we be ready for by 2030?
  • What are the key compliance challenges in securing global supply chains?
  • Aligning rules, data, and technology to build resilient and ethical cybersecurity strategies
  • Competence & Collaboration: Developing skilled teams and fostering cross-functional cooperation between security, compliance, IT, and business units
  • Communication & Creativity: Ensuring transparency in cybersecurity efforts while driving innovation to address emerging threats
  • Conscience: Embedding ethical responsibility in cybersecurity practices and AI-driven decisions
  • Workplace journey to Zero Trust at a large bank (from on-prem to cloud-native to ZTNA)
  • Insights into the choices made at ING for implementing Zero Trust in their workplace

16:50

16:55

16:50 – 16:55

16:55

17:55

16:55 – 17:55

Close of Zero Trust Security & Identity Forum, 2025. See you next year!

    FILL THE FORM FOR SPONSORSHIP PACKAGES


    [anr_nocaptcha g-recaptcha-response]