The Network Group Benelux Information Security Network
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
2026 Agenda

Your time is maximised onsite through a combination of keynote presentations, workshops, interactive discussion groups, pre-arranged one-to-one meetings and quality networking sessions

Request an invitation Book now
Access to this content is restricted

If you have a password please enter it below to access this content.

No password? Please Request an invitation.

The password you entered was incorrect. Please try again.

Forgotten your Password? Email: info@thenetwork-group.com

  • Day 1
  • Day 2
Monday 9th March 2026
08:30 - 09:00

Arrival, registration & breakfast networking

09:00 - 09:15

Introduction from The Network Group & Chairperson

A brief introduction to the event software, SNS – this software, unique to the industry, empowers our attendees to make the most effective use of their time at the event by maximising networking opportunities. The software designs a personalised agenda & enables attendees to arrange One-to-One meetings with each other. This will be followed by a welcome from the chairperson.

Lyzia van Iterson, Head of Security – Customer Applications, LKQ Europe

09:15 - 09:45

Embedding Digital Transformation Strategies to Uphold Cyber Security Systems

  • Evaluating working systems to identify areas where digital transformation can increase efficiency
  • Incorporating cloud software to strengthen information security storage systems
  • Guidance in ensuring ethical usage of digital transformation in cyber security processes without cutting roles
09:45 - 10:15

Implementing Organisation-Wide Information Security Defences to Increase Cyber Resilience

  • Establishing robust reviews of IT systems to identify and tackle weaknesses in information security defences
  • Engaging with staff to increase cyber security awareness and ensure compliance with security measures
  • Scaling up cyber security defences as part of business growth to maintain organisation-wide cyber resilience

Miguel Ferreira, CISO, Multi Corporation

10:15 - 10:45

Evaluating Information Security Systems to Ensure Compliance with National Regulations

  • Adapting reviews of information security systems in response to new regulations: best practice
  • Resources to support staff adhering to regulations as part of their working processes
  • Key tips on identifying and tackling non-compliant information security systems and processes

Thom Schiltmans, Head of GRC & Security, Resilience & Identity Governance, Signify

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 1

Vulnerability Management

 

 

 

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 2

 

 

Hosted by Exabeam

 

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 3

 

 

Hosted by ThreatAware

11:00 – 13:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
13:05 - 14:00

Networking Lunch

Stream 1 - Cyber Security Technology
14:00 - 14:35

Embedding Data-Informed Approaches to Broadening Cyber Security Strategies

  • Creating data quality benchmarks to support cyber security decision-making processes
  • Evaluating security incident data to identify trends in cyber attacks
  • Best practice in using synthetic data generation to create cyber attack simulations

Giancarlo Guizzardi, Head of Cyber Security, University of Twente

Stream 2 - Security Risk Management
14:00 - 14:35

Implementing Security Audits to Support Organisational Risk Management

  • Establishing regular audits to monitor the impact of potential security vulnerabilities
  • Allocating resources to prioritise risks and tackle the most serious security vulnerabilities
  • Tools to use sample checks of IT systems to support vulnerability management processes

Nick van Meeteren, CISO, Hogeschool Rotterdam

Stream 1 - Cyber Security Technology
14:35 - 15:10

Enhancing User Experiences of Security Measures to Increase Compliance with Information Security Strategies

  • Utilising new software to improve efficiency in user journeys through security processes
  • Key advice on using accessible terminology to ensure staff engagement with security protocols
  • Communicating with staff about additional security measures as part of tackling sophisticated cyber threats

Brian Vlootman, CISO, Backbase

Stream 2 - Security Risk Management
14:35 - 15:10

Embedding Risk-Based Approaches to Strengthening Security in Supply Chains

  • Incorporating security requirements into procurement processes when selecting new suppliers
  • Key tips on establishing information sharing guidelines with external partners
  • Working with suppliers to improve their security measures and reduce risk within supply chains
15:10 - 15:25

Coffee Break & Networking

15:25 - 15:50

Workshop 4

Beyond Awareness: The Deep Framework for the next Evolution of Security & Human Risk Management platform in the current reality

Javvad Malik, CISO, KnowBe4

15:50 - 16:15
Networking
16:15 - 16:40

Workshop 5

 

 

Hosted by Anapaya

16:40 - 17:05
Networking

15:25 – 17:05

One-to-One meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
17:05 - 17:50

Panel Discussion: Developing Robust Emergency Responses to Security Breach Incidents

  • Establishing regular scenario testing exercises to identify gaps in security breach response plans
  • Creating guidelines for employees to recognise and appropriately raise security concerns to senior staff
  • Tailoring post-attack response plans to recover damaged or stolen company assets

Lyzia van Iterson, Head of Security – Customer Applications, LKQ Europe (moderator)

19:00
Networking Drinks Reception & Dinner
Thursday 10th March 2026
08:30 - 09:00

Morning Registration & Breakfast

Informal networking over breakfast

09:00 - 10:10

Roundtable Discussions

Join group discussions with your peers on some of the most challenging & significant information security topics – please confirm attendance prior to the session. Each host will facilitate the discussion & give a short presentation of key findings in the wrap up session.

Roundtable 1: Security Workforces
Roundtable 2: Cloud Security
Roundtable 3: AI & ML
Roundtable 4: Threat Intelligence
Roundtable 5: Incident Response
Roundtable 6: IAM Systems

Shouvik Dhar, Head of IT Infrastructure & Cyber Security, Sunweb Group

10:10 - 10:45

Roundtable Wrap-up

Each host gives a short overview of key findings from their discussion & creates an ideas board to be distributed post event with the presentations.

10:45 - 11:00

Coffee Break & Networking

11:00 - 11:25

Workshop 6

Identity & Access Management

11:25 - 11:50
Networking
11:50 - 12:15

Workshop 7

Threat Intelligence

12:15 - 12:40
Networking
12:40 - 13:05

Workshop 8

Application Security

11:00-13.05

One-to-One Meetings

Intelligently matched one-to-one meetings:

  • Vulnerability Management
  • Security Awareness
  • Data Governance & DLP
  • Threat Intelligence
  • PUM & Authentication
  • Cloud Security
  • Third Party Risk Management
  • GRC
  • Identity & Access Management
  • Application Security
  • Mobile Security
  • Pen Testing
  • Zero Trust
  • Attack Surface Management
  • Email Security
13.05 - 14.00

Networking Lunch

Stream 1 - Business & Cyber Security
14:00 - 14:35

Aligning Information Security Policies with Business Strategies

  • Working with other departments to embed cyber security into organisation-wide processes
  • Utilising cyber security credentials as a competitive advantage to demonstrate trust and transparency
  • Securing buy-in from senior leaders by demonstrating how cyber security can improve business outcomes

Leo Harskamp, Chief Security Officer, Directorate of Information Services

 

Stream 2 - Information Security Teams
14:00 - 14:35

Implementing Security Awareness Schemes to Tackle Cyber Threats

  • Establishing cyber threat recognition schemes to enable staff to raise concerns about potential cyber risks
  • Key tips on creating professional development opportunities to increase security awareness of teams
  • Tailoring cyber security awareness schemes to address increasingly sophisticated cyber threats

Ardie Kleijn, CISO, Dutch Land Registry

 

Stream 1 - Business & Cyber Security
14:35 - 15:10

Allocating Information Security Resources to Expand Cyber Defences

  • Guidance on prioritising information security projects with available resources
  • Demonstrating ROI for cyber defences to senior leaders to secure additional resources
  • Evaluating cyber defences to identify areas for improving efficiency and freeing up information security resources

Holger Spohn, CISO, Candriam

Stream 2 - Information Security Teams
14:35 - 15:10

Embedding Security Governance Polices to Ensure Accountability within Information Security Teams

  • Designing governance frameworks to hold senior leaders to account for cyber risk decision-making
  • Incorporating governance structures to create joined-up processes for reporting and addressing cyber security risks
  • Key advice on developing transparency guidelines within teams without risking organisational cyber security

Paul De Wit, Head of Corporate Office Audit, Belfius

15:10 - 15:55

Panel Discussion: Utilising AI Tools to Strengthen Information Security Systems

  • Working with software providers to select AI products that meet organisational information security needs
  • Best practice on using AI to strengthen automated processes to raise alerts about security concerns
  • Incorporating AI into threat detection systems to monitor and address trends in cyber attacks

Lyzia van Iterson, Head of Security – Customer Applications, LKQ Europe (moderator)
Michael Payne, Director of Information Security, Landal
Thomas Desmedt, Head of IT & Digital Innovation Program, HOGENT

15:55 - 16:00
Closing remarks from the Chairperson

Request an invitation
or book your place now

Request an invitation Book now

AMSTERDAM, NETHERLANDS
9-10 March, 2026

This site
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now
Events
  • Home
  • Agenda
  • Delegates
  • Solution Partners
  • Venue
  • Packages
  • Testimonials
  • Request an invitation
  • Book now

The Network Group
51 Moorgate
London
EC2R 6LL

info@thenetwork-group.com

+44 (0)203 828 7430

© Network Group Events Ltd. All rights reserved. Cookies, Privacy