18th May 2016 | Sheraton Hotel | Porto

Register Now   GET UPDATES

Platinum Sponsors


Companies and organisations worldwide are facing advanced cyber threats by all types of adversaries. Ransomware, Advanced Persistent Threats, and the leak of sensitive information are amongst the top threats. This year´s conference will gather CEOs, CIOs, IT Directors, CISOs and other security profiles from large organizations and companies. A full day conference to discuss case studies, best practices, and to hear from the worlds leading solution providers about innovative ways to prevent/mitigate advanced cyber threats targeting their organizations.

8:3060 MinWelcome Coffee & Reception
09:3030 MinConference Opening
10:00 30 Min Zero Day Attacks/Sandbox Fortinet Hugo Pernicha - Systems Engineer The objective of this session is to discuss what is Zero Day, how to detect this vulnerability and which tools are the most effective to intervene/react with.
10:30 20 Min The new Perimeter is in Your Pocket. Securing Apps Effectively Without Pain HP Steve Lamb - EMEA Product Marketing Manager In today’s fast moving World the time to market for applications is shorter than ever yet we rely upon them ever more. Few application developers receive good information security training. Our comprehensive customer research show that 84% of breaches are due to vulnerabilities in applications. This session will look at practical ways application developers and operation security teams can quickly and easily assess the security quality of their code, fix vulnerabilities and protect applications via virtual patching where appropriate.
10:50 20 Min Benchmarking Security Performance with Industry Security Ratings BitSight Francisco Fonseca - CEO da AnubisNetworks Benchmarking has been a cornerstone of business for years. So why not benchmark your company's IT security performance? We'll explain why organizations need continuous, objective metrics in order to truly understand their security posture. Find out what BitSight Security Ratings are and how they are developed, why security performance varies across different industries, and what you have to gain by measuring your security performance.
11:10 20 Min Cyberthreats: Benefits of Security Operations Center IP Telecom Nassri Abokhalaf - Business Development
Rui Ribeiro - Administrador Delegado
Everyday our digital infrastructures is subject to different kind of Threats that come in many forms and shapes. The art and form of this Threats evolve from single to multiple vectors, reaching from waves to bursts, evolving in shape and size. In this environment, visibility is critical to analyze and respond in the most correct and effective way to this Threats. The concept of An information security operations center (ISOC) as Central point of monitoring and Incident response center is essential to keep up with todays requirements regarding infrastructure availability and SLA Compliance. Organizations that have the Visibility of their Threats, gain the awareness and the ability to react in a more effective manner, enabling them to minimize or neutralize this threats in a much shorter time with minimal loss.
11:30 20 Min Coffee Break
11:50 30 Min Creating Trust in the Digital World EY Anna Aquilina - Director, EMEIA Information Security Center of Excellence The content will focus on the top level c-suite concerns – understanding the business reasons why cybersecurity is ultimately their responsibility, and what they need to know. Talk through some recent incidents and the impact these had on the organizations, emphasizing how much depends upon their ability to respond effectively, and with the accountability (to the public, to shareholders) sitting with the CEO/Board, not with the CIO or CISO. How well do they know their organizations? Do they have confidence that they have set the correct risk appetite? Do they understand the threat environment, how they are vulnerable, and what they should be doing to minimize risk?
12:20 20 Min Ransomware, the new Cyber Criminals Weapon CHECK POINT Gadi Naveh - Advanced Threat Prevention Evangelist During this session, we will demonstrate the graph trend of Crypto Ransomware taking the place of online banking malware and go over the reasons for this shift and what we expect to see in the future.
12:40 20 Min Cyber Insurance – Your Company's Safe Harbour AON Andreia Teixeira - Portugal Cyber Champion
Pedro Pereira - Portugal Cyber Champion - Financial Lines
As in a cat and mouse game, cyber criminals are always one step ahead of the good guys. In this session you will learn what is cyber insurance, and how it can play an important role in your risk management strategy.
13:001:30 HourLunch
14:30 40 Min Round Table - Cyber Threats in Government Critical Infrastructures
Instituto de Informática
Rui Esteves (Segurança de Informacão) - Instituto de Informática
Secretaria-Geral MAI
Francisco Baptista - Chefe de Equipa Multidisciplinar de Sistemas e Produção (EMSP)
ESPAP - Entidade de Serviços Partilhados da Administração Publica, I.P.
José Louro Pereira - Coordenador do Nucleo de Segurança, CPD e Comunicações
Short presentation and round table debate regarding cyber threats in government critical infrastructures.
15:10 20 Min DNS Role in Cybersecurity ecosystem: The next security layer Infoblox Joaquín Gomez - Systems Engineer Infoblox Iberia In order to address security threats in cyberspace, DNS is key to detect malware infections, cyberespionage tactics, and data breaches. Through an advanced behaviour analysis system on DNS usage, we will see how it is possible to detect and face these new infection methods, and how a collaborative approach with other security solutions creates an ecosystem of effective security to face new and future cyberspace threats.
15:30 20 Min Bridging the Gap with Advanced Monitoring Services to detect Cyber Threats Symantec Carlos Fernandez - CyberSecurity Services Tech Lead Iberia We are constantly seeing thousands of new attacks everyday that target our network, users, systems and sensitive information. These attacks have different objectives, from the disruption of an infrastructure or communications, to the encryption of corporate information that will become available again after paying a ransom. In this talk we will show some examples of recent attacks and how new advanced systems can complement existing traditional security technologies.
15:5030 MinCoffee Break
16:20 20 Min Security Monitoring: How to do more than the best Effort DELL / Horizon Eric Soares - Sales Director Central EMEA Dell SecureWorks Sérgio Sá - Partner Horizon You need the right instrumentation, information and experience to combat today's cyber security threats. While it may sound simple, it requires precise orchestration. Security staff must sift through mountains of data to identify and respond to actual threats. Most organizations don't have the time, money or personnel to maintain a finely-tuned security program 24x7x365.
16:40 20 Min Cybersecurity as a Business Enabler CISCO Eutimio Fernández - Security Director Cisco Portugal, Network Visibility to fight the Advanced Threats In a world of great digital disruption, organisations have to look to cybersecurity in a different way, not just in a defensive way. Organisations must be prepared to face cybersecurity threats as a way to assure the competitiveness in a digital era.
17:00 20 Min The Importance of Automated Malware Analysis and Response in your Cybersecurity Strategy Palo Alto Networks Marc Sarrias – Regional Sales Manager In this session, we will review current security landscape situation were traditional security solutions have been struggling to keep pace with new emerging threats and sophisticated Cyberattacks. Many traditional technologies in our organisation have a key role in a modern defence strategy, but need to be updated with new feeds coming directly from Automated Malware Analysis solutions that are exposing thousands of new malicious behaviours every day. Trying to do this at the required scale without automation is a lost battle. We will have a look at the problem we are facing and how we can provide an effective solution.
17:20 10 Min Challenges for Cybersecurity in Portugal Centro Nacional de Cibersegurança Professor Doutor Pedro Veiga - Coordenador do Centro Nacional de Cibersegurança
17:3010 MinFinal conclusions of the day

VENUE - PORTO - Sheraton Porto Hotel & Spa

This conference will be held at the Sheraton Hotel in Porto. The Hotel is located in a central area of the city and provides a pleasant and appropriate areas for the conference.


Sheraton Porto Hotel & Spa - Rua Tenente Valadim 146, 4100-476 Porto
Phone: +351 22 0404123 | Web Site


If you use your own car you may take advantage of using the car park provided by the hotel.

How to get by train

Take a train to Porto-Campanhã and then take a taxi to Hotel Sheraton Porto (~10KM / 10 minutes). You can also take the metro line B,C,E or F, leave at Francos (~12 minutes) and then take a walk to the hotel (~10 minutes).

How to get by plane

Take a flight to Porto (Aeroporto Francisco Sá Carneiro) and then take a taxi to Hotel Sheraton Porto (~14KM / 15 minutes). You can also take the metro line E, leave at Francos (~20 minutes) and then take a walk to the hotel (~10 minutes).


  • Billing Information / Additional Notes
    Registration fee standard 75€ / Registration fee standard with lunch 110€
    taxes included

  • A payment reference will be generated and sent by email



Special Session




Event Organizer