Jeremy D'Hoinne

Jeremy D'Hoinne

VP Analyst
As a Research VP for security operations and infrastructure protection, Jeremy D'Hoinne assists chief information security officers and their teams to develop strategies to protect against advanced threats. Mr. D'Hoinne's research includes exposure management and how to run a continuous threat exposure management (CTEM) programme, but also how covers the related technologies, such as breach and attack simulation (BAS).
He also focuses on infrastructure protection, especially
access (VPN, ZTNA), network detection and response, web application and API protection,and network and micro-segmentation. He also monitors the progresses of AI uses for cybersecurity and participates in the AI TriSM coverage.
Read More Read Less
Monday, 18 May, 2020 / 08:00 AM - 08:45 AM CEST
Tutorial: The Role of Network Detection and Response in 2020 Advanced Threat Defense Programs

This session will give an overview of how network detection and response can play a role in improving an advanced threat detection program:
- What did we learn about evaluating and deploying the technology from hundreds of client inquiries?
- What are the trends in the NDR vendor landscape?
- How to decide if it is worth the purchase?

Monday, 18 May, 2020 / 10:15 AM - 11:00 AM CEST
Outlook for Network Security 2020

The cloud era is forcing network security professionals to adapt on several fronts. Enterprises are spending more on cloud-based security services, as a replacement for physical appliances in private data centers. Also, as enterprises move workloads to IaaS clouds, they are turning to micro-segmentation to secure key assets. This session will deliver key insights into these important trends.

Tuesday, 19 May, 2020 / 01:45 PM - 02:30 PM CEST
Ask the Expert: Sharing Best Practices on Tools Selection for Red Teams

Breach and attack simulation tools are maturing and provide an interesting alternative to automated penetration testing tools when automating security posture assessments.
This session will give an opportunity to attendees to ask question about the emerging attack simulation and the rejuvenating automated penetration testing markets , and tips on how to evaluate the vendors and best benefit from the technology.

Meet the experts face to face.