The Network Group Benelux Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2026 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 9th March 2026
08:30 - 09:10

Arrival, registration & breakfast networking

09:10 - 09:25

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.

Lyzia van Iterson, Head of Security – Customer Applications, LKQ

09:25 - 10:00

Implementing Organisation-Wide Information Security Defences to Increase Cyber Resilience

  • Establishing robust reviews of IT systems to identify and tackle weaknesses in information security defences
  • Engaging with staff to increase cyber security awareness and ensure compliance with security measures
  • Scaling up cyber security defences as part of business growth to maintain organisation-wide cyber resilience

Miguel Ferreira, CISO, Multi Corporation

10:00 - 10:35

Evaluating Information Security Systems to Ensure Compliance with National Regulations

  • Adapting reviews of information security systems in response to new regulations: best practice
  • Resources to support staff adhering to regulations as part of their working processes
  • Key tips on identifying and tackling non-compliant information security systems and processes

Thom Schiltmans, Head of GRC & Security, Resilience & Identity Governance, Signify

10:35 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Trust in the Age of AI

 

Gary Gannon, Strategic Partnerships, EMEA, Vanta

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

The Rise of AI Agents in Cyber Threats – and How to Detect Them

 

 

Egon Kando, VP Europe, Exabeam

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Securing 6,000 Devices: A Real-World Journey to Complete Visibility

 

 

Jamie Stevensen, Head of Sales, ThreatAware 
Mark Barry, Senior Security Operations Manager, UK, Domino’s

11:00 – 13:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
13:05 - 14:00

Networking Lunch

Stream 1 - Cyber Security Technology
14:00 - 14:35

Leveraging the Threat Landscape

  • Exploring how cyber threat intelligence can support sharing knowledge about emerging threats
  • Guidance on streamlining cyber threat mitigation processes
  • Tools to increase automation in cyber resilience strategies

Giancarlo Guizzardi, Head of Cyber Security, University of Twente

Thijs van Ede, Assistant Professor, University of Twente

Stream 2 - Security Risk Management
14:00 - 14:35

Implementing Data-Informed Approaches to Supporting Organisational Risk Management

  • Is IAM strong enough to truly fuel a data‑driven organization?
  • Break open your silos by turning data security risk awareness into shared intelligence
  • Redefine trust itself — make Data Governance and Management the new Zero Trust frontier

Dusan Tomic, Head of Projects, WIPO

Stream 1 - Cyber Security Technology
14:35 - 15:10

Enhancing User Experiences of Security Measures to Increase Compliance with Information Security Strategies

  • Utilising new software to improve efficiency in user journeys through security processes
  • Key advice on using accessible terminology to ensure staff engagement with security protocols
  • Communicating with staff about additional security measures as part of tackling sophisticated cyber threats

René Pluis, Global Cyber Security Remediation Officer, Philips

Stream 2 - Security Risk Management
14:35 - 15:10

Embedding Risk-Based Approaches to Strengthening Cyber Security Measures

  • Guidance on prioritising people, processes, and technology investments to broaden security measures
  • Utilising risk-based approaches to achieve security improvements beyond minimum regulatory compliance
  • Resources for establishing information sharing guidelines with external partners

Eduard-Laurentiu Ioan, CISO, Medicover

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

Beyond Awareness: The Deep Framework for the next Evolution of Security & Human Risk Management platform in the current reality

Javvad Malik, Lead CISO Advisor, KnowBe4

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

When AI Helps the Attacker: Innovation’s Dark Side

 

 

Martin Bosshardt, CEO, Anapaya

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
17:05 - 17:50

Panel Discussion: Developing Robust Emergency Responses to Security Breach Incidents

  • Establishing regular scenario testing exercises to identify gaps in security breach response plans
  • Creating guidelines for employees to recognise and appropriately raise security concerns to senior staff
  • Tailoring post-attack response plans to recover damaged or stolen company assets

Lyzia van Iterson, Head of Security – Customer Applications, LKQ (moderator)
Geert Koster, CISO, Witteveen+Bos
Giannis Konstantinidis, Group CISO, SPB

19:00
Networking Drinks Reception & Dinner
Tuesday 10th March 2026
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: Security Governance

Lakshmi Srinivasan, Cyber Security Solutions Consultant, ManageEngine by Zoho

Roundtable 2: Regulatory Compliance

Joran Leenders, CISO Officer, Belgian Train

Roundtable 3: AI & ML

Maaike van Waarden, ISO, Gemeente Huizen

Roundtable 4: Data Security

Dusan Tomic, Head of Projects, WIPO

Roundtable 5: Regulatory Compliance

Danny Bisaerts, CISO, Vlaams Parlement

Roundtable 6: IAM Systems

Shouvik Dhar, Head of IT Infrastructure & Cyber Security, Sunweb Group

10:10 - 10:45

Roundtable Wrap-up

Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

How CISOs Can Govern AI Agents Without Slowing the Business

 

 

David Horton, VP of Solution Engineering, Airia

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Busting the 5 Myths of the Modern Attack Surface Management

 

 

Jacob Ent, Global Head of Security Engineering, Outpost24

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Stopping Cyber Chaos: Zero Trust, AI, and Resilience

 

 

Hosted by Illumio

11:00-13.05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
13.05 - 14.00

Networking Lunch

Stream 1 - Business & Cyber Security
14:00 - 14:35

Embedding Risk-Based Approaches to Strengthening Security in Supply Chains

  • Incorporating security requirements into procurement processes when selecting new suppliers
  • Key tips on establishing information sharing guidelines with external partners
  • Working with suppliers to improve their security measures and reduce risk within supply chains

Frank Cappa, NCIA Agency CIS Security Officer, NATO

Stream 2 - Information Security Teams
14:00 - 14:35

Empowering Security: Awareness, Advocacy & Accountability

  • Establishing cyber threat recognition schemes to enable staff to raise concerns about potential cyber risks
  • Key tips on leveraging the business and support functions to improve security awareness
  • Metrics that drive the right behaviour and clarifies leadership accountability

Adeiza Yisa, BISO, Shell

Stream 1 - Business & Cyber Security
14:35 - 15:10

Implementing Digital Reporting Systems to Support Risk Management Strategies

  • Guidance on prioritising digital risks within available resources
  • Demonstrating ROI for reporting systems to senior leaders to secure additional resources
  • Resources to support staff transition to new digital reporting systems

Jan Matto, Head of IT Audit, Forvis Mazars

Stream 2 - Information Security Teams
14:35 - 15:10

Embedding Security Governance Polices to Ensure Accountability within Information Security Teams

  • Designing governance frameworks to hold senior leaders to account for cyber risk decision-making
  • Incorporating governance structures to create joined-up processes for reporting and addressing cyber security risks
  • Key advice on developing transparency guidelines within teams without risking organisational cyber security

Paul De Wit, Head of Corporate Office Audit, Belfius

15:10 - 15:55

Panel Discussion: Utilising AI Tools to Strengthen Information Security Systems

  • Working with software providers to select AI products that meet organisational information security needs
  • Best practice on using AI to strengthen automated processes to raise alerts about security concerns
  • Incorporating AI into threat detection systems to monitor and address trends in cyber attacks

Lyzia van Iterson, Head of Security – Customer Applications, LKQ (moderator)
Michael Payne, Director of Information Security, Landal
Murat Kultur, Head of IT Security Strategy & Services, Vattenfall

15:55 - 16:00
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

AMSTERDAM, NETHERLANDS
8-9 March, 2027

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
51 Moorgate
London
EC2R 6LL

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy