Beltug

When creating your security strategy, start with the end(point) in mind. VIRTUAL MEETING


Date:28/04/2020
Time:13:30
Location:virtual meeting


 

In this hyperconnected world - and especially now, with so many people working from home - simply centralising your security approach is often not good enough.  IoT, 5G, mobile devices, wearables, edge computing, etc. are vital technologies in your infrastructure. Therefore, they need to be part of a solid, all-embracing endpoint security strategy.

 

During this session, we zoom in on the world of endpoints, and have a look at how to include them in your approach. We’ll start with insights from Orange Cyberdefense on the evolutions and options now available for endpoint security, and how it all fits into your security architecture. Then, we’ll hear two real life cases: how Kinepolis is taking a holistic approach to security that goes beyond the component level, and how AholdDelhaize developed a clear protection strategy that includes its risk perspective. Afterwards we’ll have time to discuss your own experiences and questions.

 


28/04/2020

 
13:30-15:30
 
 
This event will be held as a virtual meeting. The link will be provided in the Confirmation email.


 

 

 

Agenda

 

13:30 Introduction

 

Ann Guinée, Communication Manager, Beltug (English)

 

13:40 What is the role of endpoint security in your current security strategy?

 

In this presentation, we’ll get a look at recent evolutions in the endpoint security market, with a guided tour through the options. Plus, we’ll hear insights on the role of endpoint in a global security architecture.

 

Emmanuel David, Technical Director, Orange Cyberdefense (English)

 

14:10 Case: Stepping away from security silos towards business security at Kinepolis

 

The employee is the most important link in the security chain - as we see more than ever in these days of the corona crisis. In a cloud-native, ‘bring-your-own-device’ era, we have to wonder whether to focus on individual security components, or to immediately look at the overall ‘business security’. The reality is that a cyber attack cannot be stopped by a single component. This means we must approach security from a holistic perspective, in order to enable a wide range of protective measures that meet the challenges of the digital era. The remote workspace (teleworking) is an important part of this.

 

Kevin Bollengier, IT Security & Compliance Officer, Kinepolis (English)

 

14:40 Case: Risk-based, endpoint protection strategy at Delhaize

By defining the function and business value of our endpoints, as well as our appetite for risk, we can create a clear protection strategy that will provide the insights needed to implement the correct (technical) solutions. Let’s have a look at a few practical examples of how to determine our strategy for the different types of endpoints from a (business) risk perspective, and from there, deduce what we need (rather than what we want).

 

Bing Van Seghbroeck, Information Security GCA Country Leader, AholdDelhaize (English)

 

15:10 Q&A: Your questions, your experience

 

15:30 Wrap up & End