{"id":7843,"date":"2025-12-22T11:25:45","date_gmt":"2025-12-22T11:25:45","guid":{"rendered":"https:\/\/heliview.com\/cyber-resilience-belgium\/?page_id=7843"},"modified":"2026-02-13T10:27:24","modified_gmt":"2026-02-13T10:27:24","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"
[vc_row full_width=”stretch_row” css=”.vc_custom_1678796439107{background-color: #ffffff !important;}”][vc_column]
\r\n

<\/h2>\r\n

The place for security leaders to be & network<\/h3> \r\n <\/div>[vc_column_text css=””]Cyber Resilience Conference is a strategic conference, specially developed for security managers and management.<\/p>\n

How can we prepare for tomorrow and keep our organizations safe?\u00a0To start with by learning from peers and discussing strategies for keeping things under control.<\/p>\n

So, join the Cyber Resilience Conference to explore these innovations and build resilience![\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1655207923531{padding-top: 30px !important;background-color: #ffffff !important;}” el_class=”custom-programma”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Programme” tab_id=”1713530192776-cc24c93c-4f50″][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7298″ img_size=”full”][\/vc_column_inner][vc_column_inner width=”4\/6″]

\r\n

WELCOME AND REGISTRATION<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]The Heliview employees will welcome you to the conference in Van der Valk Hotel in Mechelen. Parking at Parking Keerdok is accessible from the N16 via a direct exit lane. Via the bicycle and pedestrian bridge, you get to the Van der Valk hotel just a 2-minute walk away. The address to reach Parking Keerdok is Antonia Wolversstraat 1, Mechelen.<\/p>\n

Of course the coffee or tea is ready for you![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=”solvay”][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n

\r\n
\r\n \r\n \"Erik\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Erik van Zuuren<\/a><\/h3>\r\n

Chair of TrustCore<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Opening by the chair & Link up: The Connection Kickoff<\/h2>\r\n

Erik van Zuuren, Chairman of TrustCore<\/h3> \r\n <\/div>[vc_column_text css=””]Erik is actively engaged in several professional activities. As such he founded TrustCore.EU, he executed several assignments private and public sector. Currently his main focusses are on the topics of Openbanking and Security Architecture at BNP Paribas Fortis as well as the wide topic of the new Trust Regulation en the European Digital Identity Wallet in collaboration with the EU Member States. With his knowledge and experience, Erik is the ideal person to guide the conference as chair of the day.<\/p>\n

This interactive networking session will break the ice and is the starting point of meaningful connections. The Connection Kickoff is the perfect opportunity to meet fellow security leaders, share your interests, and start expanding your network of peers who can inspire and support you during and beyond the conference. Let\u2019s make the first connection count![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7896″ img_size=”medium” alignment=”center” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n

\r\n
\r\n \r\n \"Karolien\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Karolien Vanhuffel<\/a><\/h3>\r\n

Global Associate Director Cyber & Digital Risk Management of BD<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

BD\u2019s Journey Implementing NIS2 and the Cyber Resilience Act<\/h2>\r\n

Karolien Vanhuffel, Global Associate Director Cyber & Digital Risk Management of BD<\/h3> \r\n <\/div>[vc_column_text css=””]At BD.COM, we approached NIS2 and CRA implementation as an opportunity to strengthen trust, not just meet obligations. Our journey revealed how cross\u2011functional collaboration accelerates compliance without slowing innovation.\u00a0We learned that governance, automation, and continuous risk visibility are the pillars of sustainable resilience.<\/p>\n

By embedding security-by-design into every product and process, we\u2019ve turned regulatory pressure into strategic advantage. I\u2019ll share our key lessons and the practices that are foundational BD.COM\u2019s cyber\u2011resilient future.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”7911″ img_size=”medium” alignment=”center” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n

\r\n
\r\n \r\n \"Tim\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Tim Bosch<\/a><\/h3>\r\n

Former Director of Change Management, AIVD and Birdwatcher Group<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Keynote: Hybrid Threats in the Benelux: A Little Wake-Up Call<\/h2>\r\n

Tim Bosch, Former Director of Change Management AIVD of Birdwatcher Group<\/h3> \r\n <\/div>[vc_column_text css=””]The Benelux region faces increasing hybrid pressures ranging from espionage to digital sabotage, mirroring broader European trends. State actors such as Russia and China employ covert influence, cyberattacks, and intelligence operations that often remain below the public radar.<\/p>\n

Recent (cyber) incidents highlight how vulnerable open, interconnected societies are to targeted disinformation and clandestine interference. As hybrid tactics intensify, the Benelux must balance openness with resilience to safeguard democratic institutions and critical infrastructure.<\/p>\n

So, time to take note of current reality so that you can enhance your organisation\u2019s defences![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”8035″ img_size=”medium” alignment=”center” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n

\r\n
\r\n \r\n \"Stephan\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Stephan Ilaender<\/a><\/h3>\r\n

Field CTO of STACKIT<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Keynote: How STACKIT build a European Sovereign Cloud<\/h2>\r\n

Stephan Ilaender, Field CTO of STACKIT<\/h3> \r\n <\/div>[vc_column_text css=””]By leveraging the scale and discipline of the Schwarz Group companies, we have built a powerful internal cloud base.\u00a0This infrastructure evolved into STACKIT, a sovereign cloud engineered to meet strict European data\u2011sovereignty and GDPR requirements.<\/p>\n

In 2024, it became a standalone cloud provider, opening its services to businesses seeking independence from non\u2011EU hyperscalers.\u00a0In a world where privacy, security and sovereignty becomes more important every day, real European sovereign clouds are the solution that\u00a0address our needs. Let’s share related insights![\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″][vc_single_image image=”8029″ img_size=”medium” alignment=”center” css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_col-xs-2\/5″]\r\n\r\n

\r\n
\r\n \r\n \"Bart\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Bart Bruijnesteijn<\/a><\/h3>\r\n

Senior Director Solutions Engineering of CyberArk<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”4\/6″]
\r\n

Break-Out Session: Identity is the New Control Plane: Securing Human, AI, and Machine Access in Modern Enterprises <\/h2>\r\n

Bart Bruijnesteijn, Senior Director Solutions Engineering of CyberArk <\/h3> \r\n <\/div>[vc_column_text css=””]As human, machine, and AI identities multiply, and attackers increasingly weaponize AI, the consequences of a single identity breach are escalating at unprecedented speed.
\nFragmented IAM, PAM, and IGA approaches were not designed for this reality. The industry has reached a pivotal inflection point in cybersecurity.<\/p>\n

This session highlights the advantages of shifting from fragmented tools to a unified platform that aligns with CISO and SOC priorities while enabling a new approach to visibility, control and trust.<\/p>\n

Key learnings:<\/p>\n