{"id":5669,"date":"2020-12-16T12:56:08","date_gmt":"2020-12-16T12:56:08","guid":{"rendered":"https:\/\/heliview.be\/cyber-security\/?page_id=5669"},"modified":"2026-03-19T13:58:30","modified_gmt":"2026-03-19T13:58:30","slug":"about-the-conference","status":"publish","type":"page","link":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/","title":{"rendered":"About the conference"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1607674674778{background-color: #f2f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Trust, Sovereignty &amp; AI Powered Intelligent Defence<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The IT-Security landscape has entered a new era. One defined by rapid technological disruption, rising regulatory pressure, and a growing need for resilience. Innovation brings enormous opportunity but also increasing complexity: organizations must modernize their architectures, secure distributed environments, and adopt AI responsibly, all while navigating an expanding set of European regulations.<\/p>\n<p>At the <strong>Cyber Resilience Conference<\/strong>, we dive into the realities of this new cybersecurity landscape. Discover how organizations can implement <strong>DORA, NIS2, CRA and the AI Act<\/strong> simultaneously without collapsing under compliance load.<\/p>\n<p>Learn how to prepare for post-quantum cryptography, secure multi-cloud and API-driven ecosystems, strengthen identity systems, and protect against AI-driven attack techniques such as adversarial inputs and data poisoning.[\/vc_column_text][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;100px&#8221;][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=1dt0uNkcAXc&#8221; align=&#8221;center&#8221; css=&#8221;&#8221;]<div class=\"lgx-brand-btn-area text-center\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand2\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/tickets\/\" target=\"_self\"><span>Claim your ticket<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1607674685379{background-color: #ffffff !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">The focus of the conference and it's programme is on:<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>(AI-Driven) Cyber Defence<\/li>\n<li>(AI-Driven) Data Protection &amp; Privacy<\/li>\n<li>Application &amp; API Security<\/li>\n<li>Cloud Security<\/li>\n<li>Compliance, Legislation &amp; Regulation<\/li>\n<li>Governance, Risk Management &amp; AI Readiness<\/li>\n<li>Identity &amp; Access Management<\/li>\n<li>Incident Response &amp; Crisis Management<\/li>\n<li>Security Architecture &amp; Technologies<\/li>\n<li>Security Awareness &amp; Training<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Join the conference and discover:<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>How organizations implement DORA, NIS2, CRA and AI Act simultaneously without collapsing under compliance load<\/li>\n<li>Practical migration paths to post-quantum crypto for enterprises and cloud infrastructures<\/li>\n<li>Understanding the real business impact of AI, adversarial input attacks and data poisoning<\/li>\n<li>Achieving digital sovereignty by ensuring control over data, infrastructure, and software supply chains<\/li>\n<li>Strengthening cloud environments and IAM systems against identity misuse, misconfigurations, and cross-tenant threats<\/li>\n<li>Advancing cyber defence with adaptive, AI-powered detection and respons capabilities<\/li>\n<li>Designing resilient security architectures for distributed API-driven and multi-cloud ecosystems<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1607674674778{background-color: #f2f2f2 !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">WHO IS THIS CONFERENCE FOR?<\/h3>              \r\n              <\/div>[vc_column_text]The conference focuses on qualified targeted participants existing of the following professions:[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>Chief Information Security Officers<\/li>\n<li>(Chief) Security Officers<\/li>\n<li>(Chief) Risk Managers<\/li>\n<li>IT Management<\/li>\n<li>Information Security Officers<\/li>\n<li>Cyber Security Officers<\/li>\n<li>Business Continuity Managers<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>Data Privacy Officers<\/li>\n<li>Compliance Managers<\/li>\n<li>Security Architects<\/li>\n<li>IAM Managers<\/li>\n<li>IT Architects<\/li>\n<li>Application Managers<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1701259824422{background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">PARTICIPATION IN THIS CONFERENCE IS FREE OF COST UNDER THESE CONDITIONS:<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>You are part of the targeted participants as specified above<\/li>\n<li>You are employed by an organisation with at least 20 FTEs<\/li>\n<li>You will agree to have three short one-to-one meetings with senior representatives of our partners<\/li>\n<li>You will plan your personal conference programme in the EventManager<\/li>\n<\/ul>\n[\/vc_column_text]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand2\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/tickets\/\" target=\"_blank\"><span>CLAIM YOUR TICKET<\/span><\/a>\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"https:\/\/heliview.be\/summits\/registration-conditions\/?_ga=2.198638761.741409855.1701070143-3868574.1686656390\" target=\"_blank\"><span>READ THE TERMS AND CONDITIONS<\/span><\/a>\r\n               \r\n                <\/div>[vc_empty_space][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">PARTICIPATE AS PARTNER OF THE CONFERENCE<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]If you would like more information about the partner packages and\/or advice about participating as a business partner in the Cyber Resilience Conference, you can contact <strong>Kjeld Eggen<\/strong><strong>, Sales Executive <a href=\"tel:+31765484000\">+31 76 548 4000<\/a><\/strong>[\/vc_column_text][vc_empty_space]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/register-as-partner\/\" target=\"_blank\"><span>MORE INFORMATION<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">ADVISORY BOARD 2025<\/h3>              \r\n              <\/div>[vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-one \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2020\/01\/Erik-van-Zuuren-1.jpg\" alt=\"Erik van Zuuren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/evanzuuren\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">Erik van Zuuren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chair of TrustCore<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-one \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/claudio-bolla\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/12\/Foto-Claudio-Bolla.jpg\" alt=\"Claudio Bolla\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/cbolla\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/claudio-bolla\/\">Claudio Bolla<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Group Information Security Director (CISO) at INEOS<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-one \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/phedra-clouner-2\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/12\/Phedra-Clouner.png\" alt=\"Ph\u00e9dra Clouner\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/pclouner\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/phedra-clouner-2\/\">Ph\u00e9dra Clouner<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Deputy Director, Centre for Cybersecurity Belgium<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-one \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/xavier-paulus\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2025\/02\/Xavier-Paulus.jpg\" alt=\"Xavier Paulus\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/xavierpaulus\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/xavier-paulus\/\">Xavier Paulus<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">CISO of Solvay<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-one \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/eric-van-cangh\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/12\/Eric-van-Cangh.png\" alt=\"Eric van Cangh\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/eric-van-cangh-7591155\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/eric-van-cangh\/\">Eric van Cangh<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Business Group Leader Digital at Agoria<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-one \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/arthur-piels\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2024\/11\/Arthur-Piels.png\" alt=\"Arthur Piels\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/arthurpiels\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/arthur-piels\/\">Arthur Piels<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Conference Producer at Heliview<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1607674674778{background-color: #f2f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]The IT-Security landscape has entered a new era. One defined by rapid technological disruption, rising regulatory pressure, and a growing need for resilience. Innovation brings enormous opportunity but also increasing complexity: organizations must modernize their architectures, secure distributed environments, and adopt AI responsibly, all while navigating an expanding set [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5669","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>About the conference - Cyber Resilience Conference<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"About the conference - Cyber Resilience Conference\" \/>\r\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1607674674778{background-color: #f2f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]The IT-Security landscape has entered a new era. One defined by rapid technological disruption, rising regulatory pressure, and a growing need for resilience. Innovation brings enormous opportunity but also increasing complexity: organizations must modernize their architectures, secure distributed environments, and adopt AI responsibly, all while navigating an expanding set [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Resilience Conference\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-03-19T13:58:30+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2024\/01\/1200x628-More-Information.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"628\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/06\/04822312-Banner-SL-BE-1200x628-1.png\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/\",\"name\":\"About the conference - Cyber Resilience Conference\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\"},\"datePublished\":\"2020-12-16T12:56:08+00:00\",\"dateModified\":\"2026-03-19T13:58:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About the conference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\",\"name\":\"Cyber Resilience Conference\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"About the conference - Cyber Resilience Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/","og_locale":"en_US","og_type":"article","og_title":"About the conference - Cyber Resilience Conference","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1607674674778{background-color: #f2f2f2 !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]The IT-Security landscape has entered a new era. One defined by rapid technological disruption, rising regulatory pressure, and a growing need for resilience. Innovation brings enormous opportunity but also increasing complexity: organizations must modernize their architectures, secure distributed environments, and adopt AI responsibly, all while navigating an expanding set [&hellip;]","og_url":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/","og_site_name":"Cyber Resilience Conference","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2026-03-19T13:58:30+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2024\/01\/1200x628-More-Information.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/06\/04822312-Banner-SL-BE-1200x628-1.png","twitter_site":"@HeliviewConf","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/","name":"About the conference - Cyber Resilience Conference","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website"},"datePublished":"2020-12-16T12:56:08+00:00","dateModified":"2026-03-19T13:58:30+00:00","breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/about-the-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-resilience-belgium\/"},{"@type":"ListItem","position":2,"name":"About the conference"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/","name":"Cyber Resilience Conference","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages\/5669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/comments?post=5669"}],"version-history":[{"count":7,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages\/5669\/revisions"}],"predecessor-version":[{"id":8131,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages\/5669\/revisions\/8131"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/media?parent=5669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}