The future of privacy & security › Campus Groningen

The future of privacy & security

The future of privacy & security

The future of privacy & security

Zet in mijn agenda
Thu, 18 April 2024
13:30 hour until 17:00 hour
Fletcher Familiehotel, Paterswolde

Privacy and security are indispensable safeguards in an increasingly digitizing world. During this event by Cooperation North, we look ahead and sideways: how do we protect the future?

Step into our time machine and journey to a future with positive cyber resilience, the next major cyber incident, opportunities and risks of AI, hidden processing of personal data, and much more! Featuring an insightful keynote by Bert Hubert, founder of PowerDNS and former member of the Oversight Committee for the Use of Powers by Intelligence and Security Services.

Program

1:00 PM Registration

1:30 PM Opening

1:35 PM Keynote by Bert Hubert

Presented by Bert Hubert

Bert is the founder of PowerDNS, software that powers a large part of the Internet in Europe. Additionally, he worked for the AIVD. Nowadays, Bert conducts DNA research and until recently was a member of the Oversight Committee for the Use of Powers by Intelligence and Security Services. Currently, he is a part-time technical advisor to the Electoral Council. In this keynote, Bert will share his vision on data slurpers, unchecked outsourcing of services, and his hope for the future.

2:15 PM Breakout Session 1:

1. Insights from practice-oriented research on behavior and positive cyber resilience

Presented by Jurjen Jansen & Sander Ebbers (NHL Stenden)

Target audience: (C)ISOs, Security Managers, Security (Awareness) Professionals

Level: No prior knowledge required

Over the past few months, NHL Stenden University of Applied Sciences and Saxion University of Applied Sciences conducted practice-oriented research on a positive approach to cyber resilience: how can we learn from what goes well in organizations in addition to learning from cyber incidents and risks? And what role does the end user play in this approach? These insights have been translated into practical tools for security professionals. In this workshop, NHL Stenden provides a sneak preview of the results and a glimpse into next steps.

2. Peek into the (cyber) future: can you predict the next major cyber incident?

Presented by the National Cyber Security Center (NCSC) & Digital Trust Center (DTC)

Target audience: Anyone dealing with digital security in their daily (work) life

Level: Some knowledge of cybersecurity/digitalization required

The pace at which developments in the digital world unfold makes looking ahead challenging but no less relevant. In this workshop, we will explore the future using the cybersecurity radar, a method for exploring the future. Using the radar methodology, we will look two years ahead in terms of cybersecurity. This methodology is also suitable for other fields. Want to experience how this works? Physically step into the cybersecurity radar and test your view of the future. Who knows, you might predict the next Stuxnet!

3. Examination of English with AI in vocational education. Are we ready?

Presented by Helma de Boer (SURF)

Target audience: Privacy professionals, DPOs, information managers, executives

Level: Some familiarity with the GDPR due to terminology

The use of AI in processes involving the processing of personal data—and often also reused for further training of the system—is exciting. This is not only because of the requirements of the GDPR; other laws and regulations are also important, not to mention the organization's own objectives. Reasoning from functionality wishes can quickly overlook essential considerations. In this session, we zoom in on what makes examination with AI so exciting, from the perspective of data protection and privacy. By examining the details, you get a better sense of the bigger picture, i.e., how choices at other levels in the organization can have an impact. The lessons from this session are also applicable outside of education.

4. Do you log or do I? Everyone logs!

Presented by: Mr. Regina Valk (Frijlande)

Target audience: Privacy and security professionals, IT project leaders, IT managers, IT (policy) advisors, etc.

Level: No prior knowledge required

Logging often occurs as a security measure. There are many aspects to this logging that often go unnoticed. For example, when starting logging, necessary considerations to log lawfully under the GDPR are often overlooked. Yet logging information increasingly serves as input for data-driven organizations and AI algorithms. Logging is usually carried out quietly. But it is only during incidents that we check if there is logging, and in the best case, we wonder if a certain log file may be used for inspection. Do you want to receive tips for better control over this topic and be well-prepared for future issues? Then come to this workshop.

3:00 PM Break & Networking

3:35 PM Breakout Session 2:

1. What can and may municipalities do in online research for public order and safety?

Presented by Willem Bantema (NHL Stenden)

Target audience: Anyone involved in, or interested in, maintaining public order and safety in the digital domain

Level: No prior knowledge required

Municipalities are increasingly faced with a challenging task in maintaining public order. The interconnection between the digital and physical worlds is growing. For example, a disturbance of public order in the physical world may originate in the digital world. Sometimes online research is necessary to prevent such incidents. Municipalities lack clear frameworks on how online research can be conducted in publicly accessible sources. In the autumn of 2023, the Ministry of the Interior and Kingdom Relations developed a guide with action perspectives for municipalities. Together with participants, we will look at the background and consequences of this new guide.

2. The future of security through the eyes of Microsoft

Presented by Microsoft Netherlands

Target audience: Privacy and security professionals, IT (policy) advisors, IT managers

Level: Affinity with cybersecurity

As one of the largest providers of IT services globally, Microsoft faces the latest cyber threats. Security is therefore an important aspect, not only of internal operations but also in service delivery. In this session, Microsoft will share its vision on security in the future.

3. Shadows and treasures: the opportunities and risks of AI for Security

Presented by Cegeka

Target audience: Privacy and security professionals, IT project leaders, IT managers, IT (policy) advisors interested in understanding the risks and opportunities of AI for security

Level: No prior knowledge required

AI is here to stay. This presents both new opportunities and threats, which is often agreed upon. But what does that mean in practice for security? In this interactive session, both the dark side and the possibilities that AI offers for organizational security will be highlighted using imaginative examples. Additionally, there will be room for discussion based on provocative statements. The insights from this session will help you, as a privacy or security professional, to engage in well-prepared conversations about AI in your organization.

4:20 PM Plenary Feedback & Conclusion

Having trouble choosing? No problem, during the conclusion, we will briefly reflect on the key insights from the breakout sessions and answer the question: what is the future of privacy & security?

5:00 PM Drinks and Networking