A ‘just-too-late’ perspective on security: Secure business strategy at Intergamma

October 6, 2022

Gijs will provide insight into his approach at Intergamma to ensure that the security of new code and infrastructure is sufficiently guaranteed, without involving an excess of tooling and processes. He will address the aspects of the organization that make the above strategy for Intergamma an adequate choice versus a secure-by-design.

  • Small scaled peer session
  • Open dialogue by means of the Chatham House Rule

Gijs Zijderveld, Intergamma

Sign up
speaker
Gijs Zijderveld

CISO

Gijs Zijderveld has a broad background in cybersecurity, in which he spent five years working for Deloitte in the Cyber Risk department, among others. He now has final responsibility for cybersecurity at Intergamma. Here he always looks for the right balance between security and efficiency in the development of business strategies. In addition to this role, Gijs is also active as a volunteer in the debt assistance.

Company
Intergamma

Information
Topic

In recent years, there has been an increasing focus on DevSecOps in the cybersecurity field. The goal is to resolve as many vulnerabilities as possible before code and infrastructure are put live. But how do you keep the balance with flexibility and time-to-market? This raises questions such as: are we overdoing it in the number of tools and processes that we impose on our developers? Isn't our risk tolerance secretly greater than we assume? These kinds of questions underlie the security strategy at Intergamma, which also includes the choice of a 'just-too-late' approach.

Program

17:00 - 20:30

Location: Utrecht region

Audience

CISOs and IT & Security Directors

Voertaal

English

Conditions

  • Participants have to meet the previously described target audience.
  • If applicable, our partners will be presented with every application.
  • During all our sessions, the Chatham House Rule applies. This means that the participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed. This means that no report, no photos and no recordings are made of the meeting. The presentation will also not be distributed to the participants afterwards.
Partners
Related sessions

Contact information

Agenda

Do you wish to be informed about our upcoming sessions? Subscribe to our monthly agenda!