Event Agenda
3rd – 4th November 2026 // Amsterdam
x
3rd – 4th November 2026 // Amsterdam
We are currently working on the 2026 agenda and will be updating it soon. In the meantime, take a look at the topics and themes discussed as part of the 2025 agenda:
| Day 1 // 4th November 2025 08:00 – 17:50 (CET) |
|
![]() |
08:00 Registration & Coffee |
![]() |
08:50 Opening Address: Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM) |
![]() |
09:00Panel Discussion: Tackling Cyber Security Threats Amid Geopolitical Instability and Global Tensions
– Moderator: Jeroen Van Eyck, Senior Officer, Belgian Defence |
![]() |
09:40Presentation: DNB’s Cyber Strategy for the Netherlands Jeroen van Kesteren, The Dutch Central Bank (DNB) will outline its cyber strategy for safeguarding the stability and integrity of the Dutch financial system. In an era of growing digital dependence and increasingly complex cyber threats, DNB’s strategy focuses on building resilience, enhancing oversight, and driving sector-wide preparedness. This session will explore DNB’s strategic priorities, including proactive supervision, improved incident response capabilities, and the integration of European and national regulatory frameworks. Attendees will gain a clear view of how DNB aims to strengthen cyber resilience through guidance, collaboration, and innovation—ensuring that the Dutch financial sector remains secure, adaptive, and future-proof. Importantly, this strategy reflects a shift in mindset: security is no longer a barrier to progress, but a key enabler of responsible innovation and sustainable growth. By embedding security into business processes and digital transformation initiatives, DNB supports the sector in moving forward with confidence. . – Jeroen van Kesteren, CISO/ Head of Department Digital Security Services, De Nederlandsche Bank . |
![]() |
10:10Presentation: Agentic AI in Security: From Triage to Response Leveraging AI agents to accelerate threat detection and response is about more than speed – it’s about precision, trust, and control. Success depends on ensuring these agents have access to the right data, operate within your governance and compliance standards, and can be deployed flexibly across the environments that matter most to you. This session will discuss how organisations can harness AI responsibly and effectively, creating a security ecosystem that is adaptive, resilient, and future-ready. . – Tim Brophy, International Strategic SA, Elastic . |
![]() |
10:50Break & Networking |
![]() |
11:30Presentation: From Alerts to Answers: Digital Forensics in Modern IR An alert tells you that something happened, but DFIR solutions and methods reveal the full chain of events. It’s the key to understanding how an attack started, how far it spread, what actions the adversary took, and what it will take to respond and recover effectively. In this presentation, Niels Renken, Solutions Consultant, will walk through a business email compromise (BEC) investigation to demonstrate how Magnet’s solutions enable DFIR teams to move from initial alerts to uncovering the truth with triage to deep dive forensic capabilities. . – Niels Renken, Solutions Consultant, Magnet Forensics . |
![]() |
12:00Case Study: Breach to Recovery: How to Respond to a Targeted Cyber Attack This session will explore how we responded to and recovered from a successful cyber attack. We will examine the critical steps taken during crisis management such as containing the threat, coordinating teams, and restoring operations under pressure. Explore how we dealt with executive decision-making and communication as well as delving into how the incident became a catalyst to strengthen defences, as well as drive for cultural change across the organisation. . – Johan Huijgen, Group Cyber Security & IT Director, VEON . |
![]() |
12:30Presentation: Awareness to Action: How to Reduce Human Risk with AI Human error remains the leading cause of security incidents—but most security awareness training (SAT) programs were built for compliance, not resilience. Most programs are static, generic, and fail to drive measurable behavior change. Security leaders are rethinking their approach, shifting from “awareness” to “human risk management.” Security awareness is no longer about knowledge alone. . – Frank Benus, Senior Solutions Engineer, Abnormal AI . |
![]() |
13:00Lunch Hosted by Elastic |
![]() |
14:00Presentation: Identity is the New Perimeter: Combine Prevention and Recovery to Ensure Organisational Survivability During and After an Attack Data & Identity Focus: How to implement robust cyber-recovery and threat containment across your data and identity estate Beyond prevention: Ensure rapid response and recovery to minimise downtime and business disruption Stay operational under attack: How zero-trust architecture helps you maintain control and protect critical data – even during ransomware events . – Jerry Rijnbeek, Area Vice President EMEA & APJ – Identity & AI Technology, Rubrik . |
![]() |
14:30Spotlight Presentation: Three Mistakes you are Making in your Security Awareness Program - Simple Changes to Maximize Return Cybersecurity has been a top priority for businesses for years, yet the risks continue to grow. Attackers have shifted from technical exploits to targeting your employees, turning them into unwitting accomplices. And while many organisations have recognised that technical solutions alone are not enough, their efforts to address people-centric risks often fall short and fail to make a significant impact. Discover practical strategies to transform your employees from points of potential vulnerability into a robust first line of defence. . – Kim de Wit, CyberSecurity Awareness Expert, SoSafe . |
![]() |
14:40Case Study: Securing the Cloud: Data Breaches in the Age of Automation What if a cloud breach, caused by a seemingly minor misconfiguration, led to significant disruption and financial loss? In this case study session, we’ll explore how such an incident might unfold, how a simple oversight could open the door to attackers, how AI-driven tools can rapidly escalate the threat, and the overlooked security gaps that could allow it to happen. We’ll examine the key takeaways, from common missteps in cloud security to effective response strategies that could help contain the damage and restore trust. This session will examine prominent data breaches, how quickly things can spiral without the right safeguards and the proactive measures organizations can take to stay protected. . – George Schizas, CISO EMEA, NEP Group Inc. . |
![]() |
15:10Presentation: Identity is the New Perimeter: Time Is the Enemy: Outpacing AI-Powered Threats The increasing speed and sophistication of adversarial automation have made time the most critical factor in cyber defense. This session, brought to you by Kudelski Security and Recorded Future, presents a unified strategy to confront evolving AI-powered threats. Kudelski Security shares its deep expertise in proactive security operations, detailing the intelligence-driven methodologies that are proven to significantly compress the crucial window between threat detection and effective response. Recorded Future simultaneously provides its insights into the evolving AI threat landscape, equipping security leaders with the necessary context to neutralise sophisticated attacks before they have an impact. Discover how this powerful fusion of expert security management and automated threat intelligence empowers your organization to regain the initiative and decisively beat the clock. . – Jan Knoops, Advisory Services Expert, Kudelski Security – Julius Nicklasson, Solution Engineer, Recorded Future |
![]() |
15:40Break & Networking |
![]() |
16:10Roundtables: Choose 1 of the 3 Following Discussions T1: Securing the Future: AppSec Challenges and Strategies in the AI Era – Arthur Kemme, Senior Account Executive, OpenText . T2:From Standing Privilege to Zero Standing Privilege: A Practical Discussion – Alexandra Krasnitskaya, Cyber Security Expert, Delinea – Rogier Jansen, Cyber Security Expert, Delinea . T3: Cyber Resilience Without Boundaries: From Recovery to Continuity – Maurice Franken, Cyber Security Expert, Zerto . |
![]() |
16:50Panel Discussion: Behind the Firewall: The Mental Toll of Security Leadership
– Moderator: George Schizas, CISO EMEA, NEP Group Inc. |
![]() |
17:30Closing Remarks: Elian Habra, CISO,Agence pour le Développement de l’Emploi (ADEM) |
![]() |
17:40 Drinks Reception |
| Day 2 // 5th November 2025 08:15 – 16:10 (CET) |
|
![]() |
08:15 Registration & Coffee |
![]() |
08:50Opening Address: Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM) |
![]() |
09:00Panel Discussion: Bridging the Regulatory Compliance Gap Across Emerging Cyber and AI Frameworks
– Moderator: Fred Pintchman, IT Security Programme Manager, DHL Express |
![]() |
09:40Presentation: Building Momentum: Reflections and Forward Strategy from the Centre for Cybersecurity Belgium Over the past year, CCB’s key focus has been implementing NIS2, enabling the delivery of services that support ‘Active Cyber Protection’. By integrating cyber emergency response, threat intelligence, and routine monitoring, we’ve strengthened the protection of Belgian entities and fostered continuous improvement in cybersecurity resilience. Our CyberFundamentals framework is increasingly recognized internationally, helping organizations prioritize implementation over compliance. This year also marked the completion of our previous strategy cycle aimed at making Belgium one of the least vulnerable countries. Building on this success, our new strategy “detect better to protect better” will enhance detection capabilities and focus on initiatives such as collective anti-fraud actions and SME support. These steps lay the groundwork for safer digital environments and stronger national cyber resilience. . – Johan Klykens, Director Cybersecurity Certification Authority, Centre for Cybersecurity Belgium . |
![]() |
10:10 Break & Networking |
![]() |
10:50Presentation: From Darwin to Cyber Security: Why IT Diversity is Crucial for Survival How can evolutionary biology be used to improve our cyber defenses? Using the Susceptible-Infected-Susceptible model, this session puts powerful insights from epidemics in the context of cybersecurity. Specifically: why cyber threats continue to increase, why uniform systems are more vulnerable, and how diversity reduces the impact of cyber threats. . – Henk-Jan van der Molen, Senior Information Security Advisor, Ministerie van Binnenlandse Zaken en Koninkrijksrelaties . |
![]() |
11:20Presentation: Turning Intelligence Into Action: Staying Ahead in a Fast-Moving Threat Landscape Discover how to best use threat intelligence in order for you to stay proactive in the face of rapidly evolving cyber threats. You will learn how to gather, prioritise, and apply threat data to improve detection, guide response, and support strategic decision-making. Discover proven and effective practices in building an effective threat intelligence capability whilst integrating intel into day-to-day operations, ensuring your team can act on insights in real time. . – Holger Spohn, CISO/Head of Operations IT, Candriam . |
![]() |
11:50Case Study: Bridging the Divide: Securing IT-OT Convergence Across Nederlandse Spoorwegen This session displays the security and operational challenges of IT-OT convergence we face. Explore the pitfalls we encountered to align digital systems and operational environments without compromising performance, availability, or security. Discover practical insights into our approach to managing shared risks, and strengthening cyber resilience across traditionally separate environments. . – Joseph Mager, Information Security Officer, Nederlandse Spoorwegen – Erwin Kooi, Security Officer for Train Digitisation, Nederlandse Spoorwegen . |
![]() |
12:20Lunch hosted by KnowBe4 |
![]() |
13:20Presentation: A Human Factor Approach to Cyber Defence Take a deep dive into the effectiveness of a human factor approach in mitigating cyber threats. Uncover insights into how principles from behavioral science, psychology, and related disciplines are being applied to create more robust security systems. . – Gal Messinger, Head of Global Security, Signify . |
![]() |
13:50Fireside Chat: The Chain Reaction: Strengthening Cyber Resilience Across Your Supply Network
– Moderator: Muyiwa Olufon, CISO, Flutterwave |
![]() |
14:20Case Study: Operationalising NIS2: Building Resilience and Earning Trust Through Compliance at Forvis Mazars The NIS2 Directive will take effect in the Netherlands in 2026, raising the bar for digital resilience, executive accountability, and supply chain security. Yet many organisations, especially at the leadership level are not fully prepared. ISO27001 alone won’t close the compliance gap, and the new rules place direct responsibility on CEOs. At the same time, supply chain risks remain largely unaddressed. This session will explore what NIS2 really demands, where the gaps are, and how to take action now, before compliance becomes a crisis. . – Jeffrey De Bruijn, Director Cyber Security & Privacy, Forvis Mazars . |
![]() |
14:50Break & Networking |
![]() |
15:20Case Study: Governing AI: Embedding Safety, Accountability, and Compliance in AI Adoption In this session, through real world examples explore how you can deploy AI safely and effectively while preparing for upcoming regulatory obligations, including the EU AI Act. Examine how governance frameworks, risk assessments, and internal policies were effectively put in place to guide AI development and usage. Discover how to identify and manage highly effective yet high-risk AI systems and embed security protocols from design to deployment in relation to regulatory developments seen via the EU AI Act. . – Siegfried Moyo, Director, Cyber & IT Security, Americold Logistics LLC . |
![]() |
15:50Case Study: AI in the Cyber Arena: Risks to Manage, Opportunities to Seize - Heineken’s Approach AI is reshaping the cybersecurity battlefield. In this session, Gustavo Maniá – Regional CISO at HEINEKEN and AI/automation enthusiast explores real-world cyber risks from GenAI, agentic AI, phishing automation, deepfake threats, and cybercrime innovation. He shares HEINEKEN’s approach to managing these risks and highlights how AI can also strengthen defence. Attendees will learn how to help their organisations embrace AI securely and strategically. . – Gustavo Mania, Information Security Risk Manager (Regional CISO), Heineken . |
![]() |
16:20Closing Remarks: Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM) |
![]() |
16:30End of Conference |