The Network Group Benelux Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2025 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Wednesday 19th March 2025
08:30 - 09:00

Arrival, registration & breakfast networking

09:00 - 09:10

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.

Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100

09:10 - 09:40

Boring Timeless Principles: Maintaining Consistency in Information Security to Strengthen Cyber Resilience

  • Implementing effective principles resistant to trends and external and internal cyber threats
  • Addressing misconceptions about modern working practices

Filip Nowak, Global Head, Cyber Defence, Ferrero

09:40 - 10:10

The AI High Five for Cyber Security

  • Five key domains of GenAI for better understanding its potentials
  • How to take the next steps toward integrating GenAI into your cybersecurity efforts
  • Incorporating GenAI technology into day-to-day activities

Stefan van Gansbeke, CISO, Christelijke Mutualiteit

10:10 - 10:50

Panel Discussion: Designing Emergency Response Plans to Manage Security Breach Incidents

  • Preparing response plans to establish roles of all staff in limiting the impact of breach incidents & recovering assets post-attack
  • Learning from security breaches to address causes to incidents & improve cyber protection measures
  • Regular testing of breach incident procedures to highlight gaps in response plans

Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100 (moderator)
Roy Konings, Head of Security, Benelux & Switzerland, Ericsson
Bas Gaal, Director Information Security, Canon Production Printing
Aldo Grech, Head of Sector – Cyber Security Awareness & Governance, European Commission

10:50 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

The Geopolitics of Cyber Crime

 

 

Julius Nicklasson, Sales Engineer, Recorded Future

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

The future of AI is here, but it is not equally distributed

Hans Diederen, Senior Engineer, Exabeam

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

Applying Zero Trust to Shift The Risk Balance to Resilience

 

 

Raghu Nandakumara, Senior Director, Industry Solutions Marketing, Illumio

11:00 – 13:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
13:05 - 14:00

Networking Lunch

Stream 1 - Cyber Resilience
14:00 - 14:35

Resilience in the Real World: Enhancing OT Cyber Security for Critical Systems

  • Examining the current threat landscape, including targeted attacks on industrial control systems
  • A discussion of the best practices for mitigating cyber risks through a layered security approach
  • Exploring the unique challenges of OT cyber security

Godfried Boshuizen, Chair Editorial Board, FERM

Stream 2 - Security Planning
14:00 - 14:35

Investing in Information Security: Allocating Budgets to Strengthen Cyber Resilience

  • Engaging with senior leaders on ROI of security strategies to secure additional support for new measures
  • Guidance on prioritising security needs as part of information security budget planning
  • Reserving financial resources to support security processes during emergency situations

Joost Boele, Head of IT Operations, Netherlands Cancer Institute

Stream 1 - Cyber Resilience
14:35 - 15:10

Creating Staff Training Schemes to Recognise Cyber Threats

  • Developing joined-up responses to safely report potential threats & avoid escalation to becoming major incidents
  • Adapting staff training to tackle increasingly sophisticated security threats, including spearfishing emails
  • Regular inspections to maintain the security of workplace devices: tools & advice

Jeroen Roelandt, CISO, De Watergroep

Stream 2 - Supply Chain Risk
14:35 - 15:10

Implementing Data-Informed Approaches to Information Security

  • Collecting performance data on security measures to ensure cyber security KPIs are achieved
  • Key tools to identify anomalous data & raise concerns about potential security risks
  • Evaluating incident data to tackle gaps in security measures & inform cyber resilience strategies

Joran Leenders, CISO, Ypto

15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

AI-Powered Threat-Led Security Operations: Protecting Organisations & Supporting DORA Compliance

 

 

Parthi Sankar, Technical Director, Sales Engineering, N. Europe, Anomali

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

Identity 3.0: The Future of IGA in the Age of AI & Cloud

Suleyman Mun, Senior Solutions Engineer, Saviynt

 

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
17:05 - 17:50

Panel Discussion: Embedding Security Governance Policies to Build Organisation-Wide Cyber Resilience

  • Designing organisation-wide accountability frameworks to ensure senior leaders are held responsible for cyber security decision-making
  • Incorporating security governance polices to improve coordination of information security incident response plans & strengthen cyber defences
  • Prioritising cyber risks in line with other business needs to maintain support for information security resources from other departments

Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100 (moderator)
Sanjay Kumar Vaid, ICT & Security Risk Officer, Nagelmackers
Shairesh Algoe, Deputy CISO, BNG Bank

19:00
Networking Drinks Reception & Dinner
Thursday 20th March 2025
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: Incident Response

Amir Vashkover, Head of Data Security, Philips

Roundtable 2: Regulatory Compliance
Roundtable 3: Security Governance

Ilona Crommentuijn, Manager Information Security & Privacy, Holland Casino

Roundtable 4: AI & ML

Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance

Roundtable 5: Cloud Security

Alex Leer, Technical ISO, ANWB

Roundtable 6: Digital Transformation

Alain De Maght, Chief InfoSec Officer, SPF Intérieur

Roundtable 7: Vulnerability Management

Eilis O’Broin, Director, Operational Risk Management, flatexDEGIRO

Roundtable 8: Security within Supply Chains

Sonia Verhaeghe, ISO, TUI

10:10 - 10:45

Roundtable Wrap-up

Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

Machine Identity Security: Lessons from the Frontlines

 

 

Kevin Bocek, SVP, Innovation, CyberArk (former Venafi)

11:25 - 11:50
Networking
11:50 - 12:15

Open Forum Think Tank

Security Metrics & Reporting

Alexander Klaver, Head of IT Security, CVC DIF

12:15 - 12:40
Networking
12.40 - 13.05

Open Forum Think Tank

Operational Technology

Dimitrios Papadopoulos, Director Threat Prevention & OT Security, Brenntag

11:00-13.05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
13.05 - 14.00

Networking Lunch

Stream 1 - Compliance
14:00 - 14:35

Embedding Organisation-Wide Security Restructuring in Response to DORA Restrictions

  • Guidance on evaluating company structures to address areas of non-compliance
  • Utilising new technology to ensure compliance with new regulations
  • Engaging with all staff to ensure they understand how to uphold DORA restrictions

Natascha De Croes, CISO/DPO, DELA

Stream 2 - Vulnerability Management
14:00 - 14:35

Embedding Risk Management Policies to Address Organisation-Wide Cyber Security Vulnerabilities

  • Establishing processes for all staff to appropriately raise concerns about potential security vulnerabilities
  • Evaluating vulnerability data to identify & tackle wider trends in information security threats
  • Key tips on fixing security gaps in company technology & software

Paul de Wit, CISO, Belfius

14:35 - 15:10

Evaluating Cyber Security Policies & Processes to Uphold New Regulations

  • Adapting existing information security processes to ensure compliance with the Cyber Resilience Act
  • Allocating resources to update cyber security measures in response to national regulations
  • Working with staff to understand and fulfil their role in meeting regulation requirements

René Pluis, Global Cyber Security Remediation Officer, Philips

15:15 - 15:55

Panel Discussion: Developing AI-Informed Approaches to Strengthen Cyber Security Measures

  • Evaluating AI software to meet the needs and scale of your cyber security operations
  • Utilising AI to set up joined-up approaches to raising concerns about potential security threats
  • Engaging with staff to increase uptake of new AI tools to increase efficiency in working processes

Ivana Nikolik, Executive Member, Forbes Business Development Council, Country Chair, G100 (moderator)
Shay Weiss, Director of Cyber Engineering & Product Portfolio, Walgreens Boots Alliance
Natascha De Croes, CISO/DPO, DELA

15:55 - 16:00
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

AMSTERDAM, NETHERLANDS
18-19 March, 2026

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
6 Snow Hill
London
EC1A 2AY

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy