Arrival, registration & breakfast networking
Introduction from The Network Group & Chairperson
A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.
Lyzia van Iterson, Head of Security – Customer Applications, LKQ
Implementing Organisation-Wide Information Security Defences to Increase Cyber Resilience
- Establishing robust reviews of IT systems to identify and tackle weaknesses in information security defences
- Engaging with staff to increase cyber security awareness and ensure compliance with security measures
- Scaling up cyber security defences as part of business growth to maintain organisation-wide cyber resilience
Miguel Ferreira, CISO, Multi Corporation
Evaluating Information Security Systems to Ensure Compliance with National Regulations
- Adapting reviews of information security systems in response to new regulations: best practice
- Resources to support staff adhering to regulations as part of their working processes
- Key tips on identifying and tackling non-compliant information security systems and processes
Thom Schiltmans, Head of GRC & Security, Resilience & Identity Governance, Signify
Coffee Break & Networking
11:00 – 13:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Leveraging the Threat Landscape
- Exploring how cyber threat intelligence can support sharing knowledge about emerging threats
- Guidance on streamlining cyber threat mitigation processes
- Tools to increase automation in cyber resilience strategies
Giancarlo Guizzardi, Head of Cyber Security, University of Twente
Thijs van Ede, Assistant Professor, University of Twente
Implementing Data-Informed Approaches to Supporting Organisational Risk Management
- Is IAM strong enough to truly fuel a data‑driven organization?
- Break open your silos by turning data security risk awareness into shared intelligence
- Redefine trust itself — make Data Governance and Management the new Zero Trust frontier
Dusan Tomic, Head of Projects, WIPO
Enhancing User Experiences of Security Measures to Increase Compliance with Information Security Strategies
- Utilising new software to improve efficiency in user journeys through security processes
- Key advice on using accessible terminology to ensure staff engagement with security protocols
- Communicating with staff about additional security measures as part of tackling sophisticated cyber threats
René Pluis, Global Cyber Security Remediation Officer, Philips
Embedding Risk-Based Approaches to Strengthening Cyber Security Measures
- Guidance on prioritising people, processes, and technology investments to broaden security measures
- Utilising risk-based approaches to achieve security improvements beyond minimum regulatory compliance
- Resources for establishing information sharing guidelines with external partners
Eduard-Laurentiu Ioan, CISO, Medicover
Coffee Break & Networking
15:25 – 17:05
One-to-One meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Panel Discussion: Developing Robust Emergency Responses to Security Breach Incidents
- Establishing regular scenario testing exercises to identify gaps in security breach response plans
- Creating guidelines for employees to recognise and appropriately raise security concerns to senior staff
- Tailoring post-attack response plans to recover damaged or stolen company assets
Lyzia van Iterson, Head of Security – Customer Applications, LKQ (moderator)
Geert Koster, CISO, Witteveen+Bos
Giannis Konstantinidis, Group CISO, SPB
Morning Registration & Breakfast
Informal networking over breakfast
Roundtable Discussions
Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.
Joran Leenders, CISO Officer, Belgian Train
Maaike van Waarden, ISO, Gemeente Huizen
Dusan Tomic, Head of Projects, WIPO
Danny Bisaerts, CISO, Vlaams Parlement
Shouvik Dhar, Head of IT Infrastructure & Cyber Security, Sunweb Group
Roundtable Wrap-up
Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.
Coffee Break & Networking
11:00-13.05
One-to-One Meetings
Intelligently matched one-to-one meetings:
- Vulnerability Management
- Security Awareness
- Data Governance & DLP
- Threat Intelligence
- PUM & Authentication
- Cloud Security
- Third Party Risk Management
- GRC
- Identity & Access Management
- Application Security
- Mobile Security
- Pen Testing
- Zero Trust
- Attack Surface Management
- Email Security
Networking Lunch
Embedding Risk-Based Approaches to Strengthening Security in Supply Chains
- Incorporating security requirements into procurement processes when selecting new suppliers
- Key tips on establishing information sharing guidelines with external partners
- Working with suppliers to improve their security measures and reduce risk within supply chains
Frank Cappa, NCIA Agency CIS Security Officer, NATO
Empowering Security: Awareness, Advocacy & Accountability
- Establishing cyber threat recognition schemes to enable staff to raise concerns about potential cyber risks
- Key tips on leveraging the business and support functions to improve security awareness
- Metrics that drive the right behaviour and clarifies leadership accountability
Adeiza Yisa, BISO, Shell
Implementing Digital Reporting Systems to Support Risk Management Strategies
- Guidance on prioritising digital risks within available resources
- Demonstrating ROI for reporting systems to senior leaders to secure additional resources
- Resources to support staff transition to new digital reporting systems
Jan Matto, Head of IT Audit, Forvis Mazars
Embedding Security Governance Polices to Ensure Accountability within Information Security Teams
- Designing governance frameworks to hold senior leaders to account for cyber risk decision-making
- Incorporating governance structures to create joined-up processes for reporting and addressing cyber security risks
- Key advice on developing transparency guidelines within teams without risking organisational cyber security
Paul De Wit, Head of Corporate Office Audit, Belfius
Panel Discussion: Utilising AI Tools to Strengthen Information Security Systems
- Working with software providers to select AI products that meet organisational information security needs
- Best practice on using AI to strengthen automated processes to raise alerts about security concerns
- Incorporating AI into threat detection systems to monitor and address trends in cyber attacks
Lyzia van Iterson, Head of Security – Customer Applications, LKQ (moderator)
Michael Payne, Director of Information Security, Landal
Murat Kultur, Head of IT Security Strategy & Services, Vattenfall








