Event Agenda

3rd – 4th November 2026 // Amsterdam

Register Now

We are currently working on the 2026 agenda and will be updating it soon. In the meantime, take a look at the topics and themes discussed as part of the 2025 agenda:

Day 1 // 4th November 2025
08:00 – 17:50 (CET)
08:00 Registration & Coffee
08:50 Opening Address: Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM)
09:00Panel Discussion: Tackling Cyber Security Threats Amid Geopolitical Instability and Global Tensions

  • What ways are rising geopolitical tensions redefining the cyber security threat landscape?
  • What insights can be drawn from recent nation-state cyber attacks, and how can we enhance their resilience to such threats?
  • How can we anticipate and respond to the growing use of cyber operations as tools of geopolitical conflict?
  • What role do hacktivist groups play in this evolving threat environment, and how should we respond to ideologically motivated cyber activity?

Moderator: Jeroen Van Eyck, Senior Officer, Belgian Defence
Holger Spohn, CISO/Head of Operations IT, Candriam
Vas Nevjadomskis, Regional CISO, Kraft Heinz
Donal O’Brien, CISO, Versuni
Pieter Van Goethem, CISO, Delen Private Bank
.

09:40Presentation: DNB’s Cyber Strategy for the Netherlands

Jeroen van Kesteren, The Dutch Central Bank (DNB) will outline its cyber strategy for safeguarding the stability and integrity of the Dutch financial system. In an era of growing digital dependence and increasingly complex cyber threats, DNB’s strategy focuses on building resilience, enhancing oversight, and driving sector-wide preparedness.
This session will explore DNB’s strategic priorities, including proactive supervision, improved incident response capabilities, and the integration of European and national regulatory frameworks. Attendees will gain a clear view of how DNB aims to strengthen cyber resilience through guidance, collaboration, and innovation—ensuring that the Dutch financial sector remains secure, adaptive, and future-proof. Importantly, this strategy reflects a shift in mindset: security is no longer a barrier to progress, but a key enabler of responsible innovation and sustainable growth. By embedding security into business processes and digital transformation initiatives, DNB supports the sector in moving forward with confidence.
.
Jeroen van Kesteren, CISO/ Head of Department Digital Security Services, De Nederlandsche Bank
.
10:10Presentation: Agentic AI in Security: From Triage to Response

Leveraging AI agents to accelerate threat detection and response is about more than speed – it’s about precision, trust, and control. Success depends on ensuring these agents have access to the right data, operate within your governance and compliance standards, and can be deployed flexibly across the environments that matter most to you. This session will discuss how organisations can harness AI responsibly and effectively, creating a security ecosystem that is adaptive, resilient, and future-ready.
.
Tim Brophy, International Strategic SA, Elastic
.
10:50Break & Networking
11:30Presentation: From Alerts to Answers: Digital Forensics in Modern IR

An alert tells you that something happened, but DFIR solutions and methods reveal the full chain of events. It’s the key to understanding how an attack started, how far it spread, what actions the adversary took, and what it will take to respond and recover effectively. In this presentation, Niels Renken, Solutions Consultant, will walk through a business email compromise (BEC) investigation to demonstrate how Magnet’s solutions enable DFIR teams to move from initial alerts to uncovering the truth with triage to deep dive forensic capabilities.
.
Niels Renken, Solutions Consultant, Magnet Forensics
.
12:00Case Study: Breach to Recovery: How to Respond to a Targeted Cyber Attack

This session will explore how we responded to and recovered from a successful cyber attack. We will examine the critical steps taken during crisis management such as containing the threat, coordinating teams, and restoring operations under pressure. Explore how we dealt with executive decision-making and communication as well as delving into how the incident became a catalyst to strengthen defences, as well as drive for cultural change across the organisation.
.
Johan Huijgen, Group Cyber Security & IT Director, VEON
.
12:30Presentation: Awareness to Action: How to Reduce Human Risk with AI

Human error remains the leading cause of security incidents—but most security awareness training (SAT) programs were built for compliance, not resilience. Most programs are static, generic, and fail to drive measurable behavior change. Security leaders are rethinking their approach, shifting from “awareness” to “human risk management.” Security awareness is no longer about knowledge alone.
.
Frank Benus, Senior Solutions Engineer, Abnormal AI
.
13:00Lunch Hosted by Elastic
14:00Presentation: Identity is the New Perimeter: Combine Prevention and Recovery to Ensure Organisational Survivability During and After an Attack

Data & Identity Focus: How to implement robust cyber-recovery and threat containment across your data and identity estate
Beyond prevention: Ensure rapid response and recovery to minimise downtime and business disruption
Stay operational under attack: How zero-trust architecture helps you maintain control and protect critical data – even during ransomware events
.
Jerry Rijnbeek, Area Vice President EMEA & APJ – Identity & AI Technology, Rubrik
.
14:30Spotlight Presentation: Three Mistakes you are Making in your Security Awareness Program - Simple Changes to Maximize Return

Cybersecurity has been a top priority for businesses for years, yet the risks continue to grow. Attackers have shifted from technical exploits to targeting your employees, turning them into unwitting accomplices. And while many organisations have recognised that technical solutions alone are not enough, their efforts to address people-centric risks often fall short and fail to make a significant impact. Discover practical strategies to transform your employees from points of potential vulnerability into a robust first line of defence.
.
Kim de Wit, CyberSecurity Awareness Expert, SoSafe
.
14:40Case Study: Securing the Cloud: Data Breaches in the Age of Automation

What if a cloud breach, caused by a seemingly minor misconfiguration, led to significant disruption and financial loss? In this case study session, we’ll explore how such an incident might unfold, how a simple oversight could open the door to attackers, how AI-driven tools can rapidly escalate the threat, and the overlooked security gaps that could allow it to happen. We’ll examine the key takeaways, from common missteps in cloud security to effective response strategies that could help contain the damage and restore trust. This session will examine prominent data breaches, how quickly things can spiral without the right safeguards and the proactive measures organizations can take to stay protected.
.
George Schizas, CISO EMEA, NEP Group Inc.
.
15:10Presentation: Identity is the New Perimeter: Time Is the Enemy: Outpacing AI-Powered Threats

The increasing speed and sophistication of adversarial automation have made time the most critical factor in cyber defense. This session, brought to you by Kudelski Security and Recorded Future, presents a unified strategy to confront evolving AI-powered threats. Kudelski Security shares its deep expertise in proactive security operations, detailing the intelligence-driven methodologies that are proven to significantly compress the crucial window between threat detection and effective response. Recorded Future simultaneously provides its insights into the evolving AI threat landscape, equipping security leaders with the necessary context to neutralise sophisticated attacks before they have an impact. Discover how this powerful fusion of expert security management and automated threat intelligence empowers your organization to regain the initiative and decisively beat the clock.
.
Jan Knoops, Advisory Services Expert, Kudelski Security
Julius Nicklasson, Solution Engineer, Recorded Future
15:40Break & Networking
16:10Roundtables: Choose 1 of the 3 Following Discussions

T1: Securing the Future: AppSec Challenges and Strategies in the AI Era
Arthur Kemme, Senior Account Executive, OpenText
.
T2:From Standing Privilege to Zero Standing Privilege: A Practical Discussion
Alexandra Krasnitskaya, Cyber Security Expert, Delinea
Rogier Jansen, Cyber Security Expert, Delinea
.
T3: Cyber Resilience Without Boundaries: From Recovery to Continuity
Maurice Franken, Cyber Security Expert, Zerto
.
16:50Panel Discussion: Behind the Firewall: The Mental Toll of Security Leadership

  • How is the high-pressure nature of cyber security leadership impacting the mental health and wellbeing of CISOs and their teams? Why is this issue often overlooked?
  • Which practical steps can we take to reduce burnout, support psychological resilience, and create a healthier more sustainable working environment for security leaders?
  • How can we build a culture where openness, support, and vulnerability are seen as strengths?
  • What lessons can we learn from past mental challenges and the struggles of those before us?

Moderator: George Schizas, CISO EMEA, NEP Group Inc.
Murat Kultur, Head of IT Security Strategy & Services, Vattenfall
Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM)
Pieter Van Goethem, CISO, Delen Private Bank

17:30Closing Remarks: Elian Habra, CISO,Agence pour le Développement de l’Emploi (ADEM)
17:40 Drinks Reception
Day 2 // 5th November 2025
08:15 – 16:10 (CET)
08:15 Registration & Coffee
08:50Opening Address: Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM)
09:00Panel Discussion: Bridging the Regulatory Compliance Gap Across Emerging Cyber and AI Frameworks

  • How are we dealing with the new and evolving regulations transforming compliance obligations in areas such as data protection, operational resilience, and AI governance?
  • To what extent do we need new rules for AI, or do the existing measures for data protection and confidentiality already cover a lot of it?
  • How can we build integrated strategies that align cyber, risk, and governance functions to meet regulatory expectations without disrupting business continuity?
  • What new responsibilities are emerging under new regulatory frameworks, and how can organisations begin preparing to adapt and respond effectively?
  • How can we stay ahead of regulatory developments, mitigate compliance risk, and build long-term resilience?

 Moderator: Fred Pintchman, IT Security Programme Manager, DHL Express
Siegfried Moyo, Director, Cyber & IT Security, Americold Logistics LLC
Joseph Mager, Information Security Officer, Nederlandse Spoorwegenens
Dan Jones, Senior Security Advisor, EMEA, Tanium
Maurice Godschalk, Regional Director Benelux, OPENVAS
.

09:40Presentation: Building Momentum: Reflections and Forward Strategy from the Centre for Cybersecurity Belgium

Over the past year, CCB’s key focus has been implementing NIS2, enabling the delivery of services that support ‘Active Cyber Protection’. By integrating cyber emergency response, threat intelligence, and routine monitoring, we’ve strengthened the protection of Belgian entities and fostered continuous improvement in cybersecurity resilience. Our CyberFundamentals framework is increasingly recognized internationally, helping organizations prioritize implementation over compliance. This year also marked the completion of our previous strategy cycle aimed at making Belgium one of the least vulnerable countries. Building on this success, our new strategy “detect better to protect better” will enhance detection capabilities and focus on initiatives such as collective anti-fraud actions and SME support. These steps lay the groundwork for safer digital environments and stronger national cyber resilience.
.
Johan Klykens, Director Cybersecurity Certification Authority, Centre for Cybersecurity Belgium
.
10:10 Break & Networking 
10:50Presentation: From Darwin to Cyber Security: Why IT Diversity is Crucial for Survival

How can evolutionary biology be used to improve our cyber defenses? Using the Susceptible-Infected-Susceptible model, this session puts powerful insights from epidemics in the context of cybersecurity. Specifically: why cyber threats continue to increase, why uniform systems are more vulnerable, and how diversity reduces the impact of cyber threats.
.
Henk-Jan van der Molen, Senior Information Security Advisor, Ministerie van Binnenlandse Zaken en Koninkrijksrelaties
.
11:20Presentation: Turning Intelligence Into Action: Staying Ahead in a Fast-Moving Threat Landscape

Discover how to best use threat intelligence in order for you to stay proactive in the face of rapidly evolving cyber threats. You will learn how to gather, prioritise, and apply threat data to improve detection, guide response, and support strategic decision-making. Discover proven and effective practices in building an effective threat intelligence capability whilst integrating intel into day-to-day operations, ensuring your team can act on insights in real time.
.
Holger Spohn, CISO/Head of Operations IT, Candriam
.
11:50Case Study: Bridging the Divide: Securing IT-OT Convergence Across Nederlandse Spoorwegen

This session displays the security and operational challenges of IT-OT convergence we face. Explore the pitfalls we encountered to align digital systems and operational environments without compromising performance, availability, or security. Discover practical insights into our approach to managing shared risks, and strengthening cyber resilience across traditionally separate environments.
.
Joseph Mager, Information Security Officer, Nederlandse Spoorwegen
Erwin Kooi, Security Officer for Train Digitisation, Nederlandse Spoorwegen
.
12:20Lunch hosted by KnowBe4
13:20Presentation: A Human Factor Approach to Cyber Defence

Take a deep dive into the effectiveness of a human factor approach in mitigating cyber threats. Uncover insights into how principles from behavioral science, psychology, and related disciplines are being applied to create more robust security systems.
.
Gal Messinger, Head of Global Security, Signify
.
13:50Fireside Chat: The Chain Reaction: Strengthening Cyber Resilience Across Your Supply Network

  • How can we effectively assess and manage third-party risk to minimise supply chain vulnerabilities?
  • What role does continuous monitoring and risk scoring play in building a resilient and proactive supply chain security strategy?
  • What are the key challenges in balancing operational efficiency with robust third-party risk management, and what lessons can be learned from recent incidents?
  • How is the growing use of AI in supply chain operations impacting third-party risk and what safeguards should we put in place to prevent emerging threats?

Moderator: Muyiwa Olufon, CISO, Flutterwave
Pieter Van Goethem, CISO, Delen Private Bank
Fred Pintchman, IT Security Programme Manager, DHL Express

14:20Case Study: Operationalising NIS2: Building Resilience and Earning Trust Through Compliance at Forvis Mazars

The NIS2 Directive will take effect in the Netherlands in 2026, raising the bar for digital resilience, executive accountability, and supply chain security. Yet many organisations, especially at the leadership level are not fully prepared. ISO27001 alone won’t close the compliance gap, and the new rules place direct responsibility on CEOs. At the same time, supply chain risks remain largely unaddressed. This session will explore what NIS2 really demands, where the gaps are, and how to take action now, before compliance becomes a crisis.
.
Jeffrey De Bruijn, Director Cyber Security & Privacy, Forvis Mazars
.
14:50Break & Networking
15:20Case Study: Governing AI: Embedding Safety, Accountability, and Compliance in AI Adoption

In this session, through real world examples explore how you can deploy AI safely and effectively while preparing for upcoming regulatory obligations, including the EU AI Act. Examine how governance frameworks, risk assessments, and internal policies were effectively put in place to guide AI development and usage. Discover how to identify and manage highly effective yet high-risk AI systems and embed security protocols from design to deployment in relation to regulatory developments seen via the EU AI Act.
.
Siegfried Moyo, Director, Cyber & IT Security, Americold Logistics LLC
.
15:50Case Study: AI in the Cyber Arena: Risks to Manage, Opportunities to Seize - Heineken’s Approach

AI is reshaping the cybersecurity battlefield. In this session, Gustavo Maniá – Regional CISO at HEINEKEN and AI/automation enthusiast explores real-world cyber risks from GenAI, agentic AI, phishing automation, deepfake threats, and cybercrime innovation. He shares HEINEKEN’s approach to managing these risks and highlights how AI can also strengthen defence. Attendees will learn how to help their organisations embrace AI securely and strategically.
.
Gustavo Mania, Information Security Risk Manager (Regional CISO), Heineken
.
16:20Closing Remarks: Elian Habra, CISO, Agence pour le Développement de l’Emploi (ADEM)
16:30End of Conference

Join the Line-Up

Submit a Proposal

Request a Brochure

Access Here

Register Now

Choose Your Pass