{"id":7843,"date":"2025-12-22T11:25:45","date_gmt":"2025-12-22T11:25:45","guid":{"rendered":"https:\/\/heliview.com\/cyber-resilience-belgium\/?page_id=7843"},"modified":"2026-04-15T11:51:59","modified_gmt":"2026-04-15T11:51:59","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1678796439107{background-color: #ffffff !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">The place for security leaders to be &amp; network<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Cyber Resilience Conference is a strategic conference, specially developed for security managers and management.<\/p>\n<p>How can we prepare for tomorrow and keep our organizations safe?\u00a0To start with by learning from peers and discussing strategies for keeping things under control.<\/p>\n<p>So, join the Cyber Resilience Conference to explore these innovations and build resilience![\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1655207923531{padding-top: 30px !important;background-color: #ffffff !important;}&#8221; el_class=&#8221;custom-programma&#8221;][vc_column][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Programme&#8221; tab_id=&#8221;1713530192776-cc24c93c-4f50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7298&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">WELCOME AND REGISTRATION<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The Heliview employees will welcome you to the conference in Van der Valk Hotel in Mechelen. Parking at Parking Keerdok is accessible from the N16 via a direct exit lane. Via the bicycle and pedestrian bridge, you get to the Van der Valk hotel just a 2-minute walk away. The address to reach Parking Keerdok is Antonia Wolversstraat 1, Mechelen.<\/p>\n<p>Of course the coffee or tea is ready for you![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;8:45 &#8211; 9:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;solvay&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2020\/01\/Erik-van-Zuuren-1.jpg\" alt=\"Erik van Zuuren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/evanzuuren\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">Erik van Zuuren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chair of TrustCore<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Opening by the chair &amp; Link up: The Connection Kickoff<\/h2>\r\n                    <h3 class=\"subheading\">Erik van Zuuren, Chairman of TrustCore<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Erik is actively engaged in several professional activities. As such he founded TrustCore.EU, he executed several assignments private and public sector. Currently his main focusses are on the topics of Openbanking and Security Architecture at BNP Paribas Fortis as well as the wide topic of the new Trust Regulation en the European Digital Identity Wallet in collaboration with the EU Member States. With his knowledge and experience, Erik is the ideal person to guide the conference as chair of the day.<\/p>\n<p>This interactive networking session will break the ice and is the starting point of meaningful connections. The Connection Kickoff is the perfect opportunity to meet fellow security leaders, share your interests, and start expanding your network of peers who can inspire and support you during and beyond the conference. Let\u2019s make the first connection count![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7896&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;9:15 &#8211; 9:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;sophossessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/alexandra-rose\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/03\/Alexandra-rose.jpg\" alt=\"Alexandra Rose\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/alexandra-rose3\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/alexandra-rose\/\">Alexandra Rose<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Director of Counter Threat Unit of Sophos<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Keynote: Big or Small: Doesn\u2019t Matter \u2013 You Are at Risk<\/h2>\r\n                    <h3 class=\"subheading\">Alexandra Rose, Director of Counter Threat Unit of Sophos<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Alexandra Rose is the Director of the Sophos Counter Threat Unit. In this keynote she will provide:<\/p>\n<ul class=\"checklist\">\n<li>Real incidents and attacker techniques observed by Sophos Threat Intelligence .<\/li>\n<li>How identity, tokens, and trust paths are increasingly targeted.<\/li>\n<li>SME and large enterprise cases showing the \u201chours to impact\u201d trend.<\/li>\n<li>Key indicators defenders must watch (MFA fatigue, OAuth abuse, supply chain paths, IT\/OT trust).<\/li>\n<li>Practical, non-vendor recommendations for improving resilience.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8094&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;9:30 &#8211; 10:00&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/yonas-leguesse\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/03\/Enisa.png\" alt=\"Yonas Leguesse\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/yonas-leguesse\/\">Yonas Leguesse<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Cybersecurity Expert of ENISA<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Keynote: Strengthening Europe\u2019s Cyber Resilience<\/h2>\r\n                    <h3 class=\"subheading\">Yonas Leguesse, Cybersecurity Expert of ENISA<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Europe\u2019s digital ecosystem is expanding rapidly, making robust product and technology security essential to safeguard citizens, businesses, and critical infrastructures. ENISA\u2019s Technology and Product Security Unit plays a central role in enhancing this resilience by supporting and promoting secure\u2011by\u2011design practices.<\/p>\n<p>Through close collaboration with industry, national authorities, and standardization bodies,<\/p>\n<p>ENISA is helping to ensure that emerging technologies and connected products meet high levels of security and trust by fostering the integration of security practices throughout the entire product lifecycle. This session will give you a look into those activities and not the least activities related to the Cyber Resilience Act.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8109&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;10:05 &#8211; 10:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7298&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Morning break at the Network Square with one-to-one Meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Enjoy fresh coffee, tea and snacks on the network square. And the first 1-to-1 meetings take place.<\/p>\n<p>Meet your peers, speakers and solution providers.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;10:40 &#8211; 11:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;veeamsessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/edwin-weijdema\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/04\/Ontwerp-zonder-titel-2026-04-13T153820.546.png\" alt=\"Edwin Weijdema\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/eweijdema%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/edwin-weijdema\/\">Edwin Weijdema<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Field CTO EMEA & Cybersecurity Lead of Veeam Software B.V.<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-Out Session: Control in an Uncertain World<\/h2>\r\n                    <h3 class=\"subheading\">Andre Troskie, EMEA Field CISO of Veeam Software B.V.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Join Veeam for a talk on &#8220;Control in an Uncertain World,&#8221; where we&#8217;ll explore how harnessing the power of control can enhance security and resilience in today&#8217;s volatile landscape.<\/p>\n<p>We will delve into the pressing risks we confront now and those on the horizon, and discover how visibility and insight provides a structured path to govern security, build resilience, and ensure the safe deployment of AI. This session provides practical strategies to navigate chaos with confidence, empowering leaders to turn uncertainty into opportunity.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7885&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:25 &#8211; 11:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/jeroen-hanssens\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/03\/a15f8e59-21df-4a8c-bed9-d3df425fee59-cropped.jpg\" alt=\"Jeroen Hanssens\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/jeroen-hanssens\/\">Jeroen Hanssens<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Security Engineer of Tenable<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-Out Session: Exposure Management in the age of AI<\/h2>\r\n                    <h3 class=\"subheading\">Jeroen Hanssens, Security Engineer of Tenable<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As AI becomes deeply embedded across the enterprise, it creates a &#8220;Visibility Gap&#8221; that traditional security tools can no longer bridge. This session explores how Tenable\u2019s AI-powered exposure management platform unifies visibility across IT, cloud, and identity to uncover &#8220;shadow AI&#8221; and critical attack paths before they are exploited.<\/p>\n<p>We will discuss how to shift from reactive patching to proactive risk reduction by leveraging predictive analytics and automated governance. Attendees will leave with a clear framework for closing the AI exposure gap and aligning technical risk with broader business priorities.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8144&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:25 &#8211; 11:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;fraudsessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/remy-knecht-2\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/01\/pasfoto-8.jpg\" alt=\"Remy Knecht\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/remyknecht\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/remy-knecht-2\/\">Remy Knecht<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">National Anti-Fraud Coordination Board<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Roundtable: Staying Ahead of Online Fraud: Reality Check and Practical Lessons<\/h2>\r\n                    <h3 class=\"subheading\">Remy Knecht, National Anti-Fraud Coordination Board<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Fraud is accelerating everywhere: Belgian companies are loosing millions every year due to scams like CEO fraud, invoice fraud, trademark scams. Despite initiatives to counter fraud, the YOY growth is still near 35-45%. Criminals pressure victim companies with convincing fake platforms and urgent messaging tactics now supercharged by AI-driven impersonation and deepfakes.<\/p>\n<p>Also new technological developments, intended to make payment processes safer like Verification of Payee and e-invoicing\/Peppol are already showing major flaws and criminals found ways to use these new developments to their advantage to give companies a fake sense of security and even scale up their fraud attacks.<\/p>\n<p>Goal of this roundtable is to understand the evolution and sophistication of scams and fraud patterns, so we can jointly take the necessary measures to up our game in detection and preventing fraud.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;11:25 &#8211; 12:20&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2020\/01\/Erik-van-Zuuren-1.jpg\" alt=\"Erik van Zuuren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/evanzuuren\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">Erik van Zuuren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chair of TrustCore<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Understanding the Cyber Impact of AI<\/h2>\r\n                    <h3 class=\"subheading\">Erik van Zuuren, Chairman of TrustCore<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Artificial Intelligence is transforming our digital ecosystem at unprecedented speed. Its capabilities unlock new efficiencies, but also introduce new, complex cyber risks. AI-driven threats challenge traditional enterprise architectures, exposing gaps in identity, data flows, and trust boundaries. Architectures must evolve toward zero\u2011trust principles, continuous monitoring, and AI\u2011ready security controls.<\/p>\n<p>New dependencies\u2014models, training data, APIs, and external AI services\u2014expand the attack surface and require strict governance.<\/p>\n<p>Let\u2019s explore\u2026.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7896&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:25 &#8211; 11:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/dimitris-vassilopoulos\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/03\/Foto-Dimitris-Vassilopoulos.jpg\" alt=\"Dimitris Vassilopoulos\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/dimitris-vassilopoulos\/\">Dimitris Vassilopoulos<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Solutions Architect - EMEA of Upwind Security Ltd<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-Out Session: Runtime First Cloud Security: Turning Cloud Noise into Actionable Insights<\/h2>\r\n                    <h3 class=\"subheading\">Dimitris Vassilopoulos, Solutions Architect - EMEA of Upwind Security Ltd<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In today\u2019s cloud-native world, workloads are ephemeral, architectures are API-driven, and applications are built on microservices. Static security tooling is not enough and cannot keep pace with this speed and complexity.<\/p>\n<p>Risk owners are overwhelmed by theoretical findings that lack production context and fail to reflect real exposure. What they need is a complete CNAPP that can also offer actionable visibility into live, exploitable risk.<\/p>\n<p>&nbsp;<\/p>\n<p>This session explores how runtime context reduces noise, sharpens prioritisation, and accelerates detection and response.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8142&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:00 &#8211; 12:25&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7298&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Lunch Break at the Network Square with One-to-One Meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Enjoy various richly filled sandwiches, a warm and cold buffet.<\/p>\n<p>During lunch there is enough time for 1-on-1 meetings and networking with colleagues, solution providers, peers and speakers.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;12:35 &#8211; 13:35&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;panel&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/eric-van-cangh\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/12\/Eric-van-Cangh.png\" alt=\"Eric van Cangh\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/eric-van-cangh-7591155\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/eric-van-cangh\/\">Eric van Cangh<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Business Group Leader Digital at Agoria<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/karl-dobbelaere\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/04\/Ontwerp-zonder-titel-2026-04-07T140612.983.png\" alt=\"Karl Dobbelaere\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/karl-dobbelaere\/\">Karl Dobbelaere<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Policy Advisor Cybersecurity of Centre for Cyber Security Belgium<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/claudio-bolla\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/12\/Foto-Claudio-Bolla.jpg\" alt=\"Claudio Bolla\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/cbolla\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/claudio-bolla\/\">Claudio Bolla<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Group Information Security Director (CISO) at INEOS<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Panel discussion The Digital Omnibus: Making Compliance with NIS2\/GDPR\/DSA\/etc manageable<\/h2>\r\n                    <h3 class=\"subheading\">Eric van Cangh, Senior Business Group Leader Digital of Agoria | Justine Leruth, Analyst International Relations of Centre for Cyber Security Belgium | Claudio Bolla, Group Information Security Officer<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The European Commission\u2019s Digital Omnibus introduces targeted simplifications to GDPR, AI, data, and cybersecurity rules, aiming to reduce administrative burdens for businesses.<\/p>\n<p>By aligning overlapping obligations and easing reporting requirements, the Omnibus helps companies cut compliance costs and focus on innovation. New clarity on data use, streamlined incident reporting, and extended relief for SMEs and mid\u2011caps make it easier to manage day\u2011to\u2011day regulatory duties.<\/p>\n<p>The package is designed to replace fragmentation with coherence &#8211; making compliance more predictable, practical, and scalable as companies grow.<\/p>\n<p>Join this presentation and follow-up debate to learn how these reforms can transform regulatory overload into a competitive advantage.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7984&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;7895&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;8111&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:40 &#8211; 14:05&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/bart-bruijnesteijn\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/02\/pasfoto-15.jpg\" alt=\"Bart Bruijnesteijn\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/bbruijnesteijn\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/bart-bruijnesteijn\/\">Bart Bruijnesteijn<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Senior Director Solutions Engineering of CyberArk<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-Out Session: Identity is the New Control Plane: Securing Human, AI, and Machine Access in Modern Enterprises<\/h2>\r\n                    <h3 class=\"subheading\">Bart Bruijnesteijn, Senior Director Solutions Engineering of CyberArk<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As human, machine, and AI identities multiply, and attackers increasingly weaponize AI, the consequences of a single identity breach are escalating at unprecedented speed.<br \/>\nFragmented IAM, PAM, and IGA approaches were not designed for this reality. The industry has reached a pivotal inflection point in cybersecurity.<\/p>\n<p>This session highlights the advantages of shifting from fragmented tools to a unified platform that aligns with CISO and SOC priorities while enabling a new approach to visibility, control and trust.<\/p>\n<p>Key learnings:<\/p>\n<ul class=\"checklist\">\n<li>Why privilege controls for all identities across human, machine, and AI will give you the upper hand<\/li>\n<li>How proactive threat detection with the use of AI helps you stay ahead of the threat<\/li>\n<li>How to gain complete visibility across environments<\/li>\n<li>How to achieve faster mitigation of security breaches through shared data and insights<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8044&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:10 &#8211; 14:35&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/harold-metselaar\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/04\/Ontwerp-zonder-titel-2026-04-13T152938.923-1.png\" alt=\"Harold Metselaar\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/harrymetselaar%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/harold-metselaar\/\">Harold Metselaar<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Lead security\/CISO EDI program of Aptitude For European Digital Identity<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-Out Session: Impact of the EUDI-wallet on Trust and CyberSec<\/h2>\r\n                    <h3 class=\"subheading\">Harold Metselaar, Enterprise Security Architect of Aptitude For European Digital Identity<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The EUDI\u2011Wallet introduces a cross\u2011European identity layer that reshapes how enterprises handle trust, authentication, and user data. It shifts identity verification toward decentralized, verifiable credentials\u2014requiring redesign of IAM, onboarding, and access flows.<\/p>\n<p>Public Sector is supposed to adopt the use of this wallet by end of 2026. Certain private sector actors are supposed to accept it by end of 2027. Enterprises that want to leverage this EUDIW must adapt architectures to these \u00a0interactions, selective disclosure, and standardized trust frameworks.<\/p>\n<p>Come and prepare yourself for this game-changer.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8176&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:10 &#8211; 14:35&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;interparkingsessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/eric-huwaert\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/02\/940b0903-c557-4b0a-8811-6e60d1ee5464-1.jpg\" alt=\"Eric Huwaert\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/eric-huwaert\/\">Eric Huwaert<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Group CISO of Interparking Group<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Deep Dive Session: Trust but Verify: The necessity of Third Party Risk Management<\/h2>\r\n                    <h3 class=\"subheading\">Eric Huwaert, Group CISO of Interparking Group<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Today\u2019s cyberattacks increasingly exploit suppliers, partners, and service providers\u2014often the easiest way into a well\u2011protected company.<\/p>\n<p>A single weak link in the supply chain can cause massive operational, financial, and reputational damage. Modern ecosystems rely on large amounts of interconnected vendors, expanding the attack surface beyond direct control. Rigorous third\u2011party risk assessment helps identify vulnerabilities, enforce security standards, and detect backdoors early.<\/p>\n<p>In a world of escalating threats, securing your extended enterprise is no longer optional\u2014it\u2019s a core pillar of corporate resilience. One sector has years of experience in this field, come and learn from this experience.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8057&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;8169&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:10 &#8211; 15:05&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/harold-metselaar\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/04\/Ontwerp-zonder-titel-2026-04-13T152938.923-1.png\" alt=\"Harold Metselaar\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/harrymetselaar%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/harold-metselaar\/\">Harold Metselaar<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Lead security\/CISO EDI program of Aptitude For European Digital Identity<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Changes in Trust Services \u2026 and their impact on Trust and CyberSec<\/h2>\r\n                    <h3 class=\"subheading\">Harold Metselaar, Enterprise Security Architect of Aptitude For European Digital Identity<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]eIDAS v2 introduces an expanded and more coherent ecosystem of Trust Services, with stronger rules for identity, signing, and electronic attestations. New qualified services\u2014such as EUDI\u2011Wallet credentials and electronic attestations of attributes\u2014reshape how trust is established across the EU. These changes raise the assurance level for digital interactions but also increase the complexity of the trust chain.<\/p>\n<p>Enterprises must adapt governance, certification, and interoperability practices to comply with the updated framework. Cybersecurity strategies must evolve to secure new trust anchors, credential lifecycles, and high\u2011value identity assets.<\/p>\n<p>Let\u2019s explore how these changes strengthen trust\u2014while demanding a more resilient cybersecurity posture.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8176&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:40 &#8211; 15:05&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/jan-ursi\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/03\/Ontwerp-zonder-titel-2026-03-31T112200.503.png\" alt=\"Jan Ursi\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/jan-ursi\/\">Jan Ursi<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Global VP of Channel of keep IT<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Intelligent resilience starts by having intelligent conversations<\/h2>\r\n                    <h3 class=\"subheading\">Jan Ursi, Global VP of Channel of Keepit<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]This session will explore why data sovereignty is so important &#8211; the ability to control where dataresides, who governs it, and how it is protected &#8211; is possibly the most complex pillar of digital sovereignty for organizations operating globally.<\/p>\n<p>Hear which critical questions leaders must answer to balance compliance, resilience, and vendor dependence and how organizations can maintain control and prepare for what\u2019s next.\u200b[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8158&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:40 &#8211; 15:05&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8137&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Afternoon break at the network square<\/h2>\r\n                    <h3 class=\"subheading\">With 1-to-1 meetings<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Enjoy the afternoon break at the network square with 1-to-1 meetings, meet colleagues, solution providers, peers and speakers and share your gained knowledge![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;15:10 &#8211; 15:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;stephanIlaender&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2020\/01\/Erik-van-Zuuren-1.jpg\" alt=\"Erik van Zuuren\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/evanzuuren\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/erik-r-van-zuuren\/\">Erik van Zuuren<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chair of TrustCore<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Welcome back by chair Erik R. Van Zuuren<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Chair Erik R. Van. Zuuren welcomes everyone back in the plenary room.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7896&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;15:45 &#8211; 15:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/stephan-ilaender\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/02\/64110903-a3a2-4f8f-b572-5d29d22ba2de.jpg\" alt=\"Stephan Ilaender\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/stephan-ilaender\/\">Stephan Ilaender<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Field CTO of STACKIT<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Keynote: How STACKIT build a European Sovereign Cloud<\/h2>\r\n                    <h3 class=\"subheading\">Stephan Ilaender, Field CTO of STACKIT<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]By leveraging the scale and discipline of the Schwarz Group companies, which includes large retailers like Lidl and Kaufland, \u00a0we have built a powerful internal cloud base. This infrastructure evolved into STACKIT, a sovereign cloud engineered to meet strict European data\u2011sovereignty and GDPR requirements.<\/p>\n<p>In 2024, it became a standalone cloud provider, opening its services to businesses seeking independence from non\u2011EU hyperscalers.\u00a0In a world where privacy, security and sovereignty becomes more important every day, real European sovereign clouds are the solution that\u00a0address our needs.<\/p>\n<p>Let&#8217;s share related insights![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8029&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;15:50 &#8211; 16:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;birdwatchersessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/tim-bosch\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2026\/02\/Reality-Check-and-Practical-Lessons-2.png\" alt=\"Tim Bosch\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/tim-boschceo%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/speaker\/tim-bosch\/\">Tim Bosch<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Former Director of Change Management AIVD (Dutch Intelligence Agency) and Founder Birdwatcher Group<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Keynote: Hybrid Threats in the Benelux: A Little Wake-Up Call<\/h2>\r\n                    <h3 class=\"subheading\">Tim Bosch, Former Director of Change Management AIVD (Dutch Intelligence Agency) and Founder Birdwatcher Group<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The Benelux region faces increasing hybrid pressures ranging from espionage to digital sabotage, mirroring broader European trends. State actors such as Russia and China employ covert influence, cyberattacks, and intelligence operations that often remain below the public radar.<\/p>\n<p>Recent (cyber) incidents highlight how vulnerable open, interconnected societies are to targeted disinformation and clandestine interference. As hybrid tactics intensify, the Benelux must balance openness with resilience to safeguard democratic institutions and critical infrastructure.<\/p>\n<p>So, time to take note of current reality so that you can enhance your organisation\u2019s defences![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8027&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;16:20 &#8211; 16:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8136&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;4\/6&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Network drinks &amp; appetizers<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]We end the day in an appropriate manner while enjoying a drink, appetizers and finger food.<\/p>\n<p>Have informal discussions with colleagues, peers, partners and speakers.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;17:00 &#8211; 17:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Visual&#8221; tab_id=&#8221;1775827832220-f93c2bba-5b9e&#8221;][vc_single_image image=&#8221;8203&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1679927517758{background-color: #ffffff !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Here are some of the peers who joined last year<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]<strong>European Commission, Finvision, Toyota Motor Europe, Azelis, G4S Security Services B.V., OMP Belgium, Federal Government, Vlaamse Overheid, Sociale Zekerheid Zelfstandige Ondernemers, Orange Belgium SA, EY Belgium, KBC Bank N.V., Bua Unlimited SRL, IBPT, Skytanking N.V., Federale Pensioendienst, Vanbreda Risk &amp; Benefits, Vlaamse Radio en Televisieomroeporganisatie, Howest, University of Applied Sciences, Vivee cvba, Cegelec Fire Solutions, APK Group, DHL Express Europe Headquarters and many more!<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]      <div class=\"vc-fixed-button\" id=\"1\">\n        <button class=\"vc-fixed-button__close\" onclick=\"document.getElementById('1').classList.add('hidden')\">\n          <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"h-6 w-6\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\">\n            <path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M10 14l2-2m0 0l2-2m-2 2l-2-2m2 2l2 2m7-2a9 9 0 11-18 0 9 9 0 0118 0z\" \/>\n          <\/svg>\n        <\/button>\n        <p>Register today and get inspired!<\/p>\n\n        <a class=\"lgx-btn btn-df lgx-btn-brand2\" href=\"\/cyber-resilience-belgium\/tickets\/\" title=\"Register\" target=\"\" rel=\"\">\n                      <span>Register<\/span>\n                    <\/a>\n      <\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1678796439107{background-color: #ffffff !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221;]Cyber Resilience Conference is a strategic conference, specially developed for security managers and management. How can we prepare for tomorrow and keep our organizations safe?\u00a0To start with by learning from peers and discussing strategies for keeping things under control. So, join the Cyber Resilience Conference to explore these innovations and [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7843","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Programme | See which sessions are part of Cyber Resilience Conference<\/title>\r\n<meta name=\"description\" content=\"Join our conference! Gain knowledge through inspiring experts. Check our programme and get your eventticket today.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Programme | See which sessions are part of Cyber Resilience Conference\" \/>\r\n<meta property=\"og:description\" content=\"Join our conference! Gain knowledge through inspiring experts. Check our programme and get your eventticket today.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Resilience Conference\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-04-15T11:51:59+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/06\/04822312-Banner-SL-BE-1200x628-1.png\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/\",\"name\":\"Programme | See which sessions are part of Cyber Resilience Conference\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\"},\"datePublished\":\"2025-12-22T11:25:45+00:00\",\"dateModified\":\"2026-04-15T11:51:59+00:00\",\"description\":\"Join our conference! Gain knowledge through inspiring experts. Check our programme and get your eventticket today.\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\",\"name\":\"Cyber Resilience Conference\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Programme | See which sessions are part of Cyber Resilience Conference","description":"Join our conference! Gain knowledge through inspiring experts. Check our programme and get your eventticket today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/","og_locale":"en_US","og_type":"article","og_title":"Programme | See which sessions are part of Cyber Resilience Conference","og_description":"Join our conference! Gain knowledge through inspiring experts. Check our programme and get your eventticket today.","og_url":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/","og_site_name":"Cyber Resilience Conference","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2026-04-15T11:51:59+00:00","twitter_card":"summary_large_image","twitter_image":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2022\/06\/04822312-Banner-SL-BE-1200x628-1.png","twitter_site":"@HeliviewConf","twitter_misc":{"Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/","name":"Programme | See which sessions are part of Cyber Resilience Conference","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website"},"datePublished":"2025-12-22T11:25:45+00:00","dateModified":"2026-04-15T11:51:59+00:00","description":"Join our conference! Gain knowledge through inspiring experts. Check our programme and get your eventticket today.","breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-resilience-belgium\/"},{"@type":"ListItem","position":2,"name":"Programme"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/","name":"Cyber Resilience Conference","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages\/7843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/comments?post=7843"}],"version-history":[{"count":4,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages\/7843\/revisions"}],"predecessor-version":[{"id":8205,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/pages\/7843\/revisions\/8205"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/media?parent=7843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}