{"id":6367,"date":"2025-05-26T09:47:40","date_gmt":"2025-05-26T09:47:40","guid":{"rendered":"https:\/\/heliview.com\/digital-identity-trust-belgium\/?page_id=6367"},"modified":"2025-10-23T09:35:39","modified_gmt":"2025-10-23T09:35:39","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/digital-identity-trust-belgium\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"
[vc_row css=”.vc_custom_1576017595207{padding-top: 30px !important;}”][vc_column][vc_row_inner][vc_column_inner]
\r\n

This is the programme of 2025<\/h2>\r\n

Digital Identities in the Age of AI and Digital Wallets<\/h3> \r\n <\/div>[vc_column_text css=””]The Digital Identity & Trust Conference 2025 promises an exceptional program that brings together Europe\u2019s leading experts in security standards with compelling local stories from Belgium.
\nMeet registered peers and solution providers from, among others, Deutsche Bank Belgium, Belfius Bank, Fluvius, OMP Belgium, Ping Identity, Port of Antwerp- Bruges, ASML, Okta, TUC Rail, UCB Biopharma, YPTO, SITS Traxion, Upright Security, Securitas, Isabel Group, Itsme, OPNS, Opentext, Omada, Docaposte, Amadeus, EWC, FIDO Alliance, Trend Micro & more.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space][\/vc_column][\/vc_row][vc_row el_class=”custom-programma”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Full programme” tab_id=”1721646502021-ce55c565-2e25″][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6709″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Reception and Registration<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n

Welcome to the Digital Identity & Trust Conference 2025.\u00a0Upon registration, you will receive an SMS with your login link to Eventmanager. There, you can find your schedule and planned one-to-one meetings. Grab a cup of coffee or tea at the networking area, and enjoy your day!<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”09:00 – 09:30″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Erik\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Erik R. van Zuuren<\/a><\/h3>\r\n

CHAIRMAN OF THE CONFERENCE<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Opening by chairman of the day<\/h2>\r\n

Erik van Zuuren, Chair of TrustCore<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n

Chairman of the day Erik van Zuuren will open the programma and walk you trough what the day will bring.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6029″ img_size=”” css=””][vc_btn title=”09:30 – 09:40″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Erik\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Erik Plaggenmarsch<\/a><\/h3>\r\n

Domain Architect IAM of ASML<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Orchestrating Digital Identity for Compliance<\/h2>\r\n

Erik Plaggenmarsch, Domain Architect IAM from ASML Netherlands<\/h3> \r\n <\/div>[vc_column_text css=””]In today\u2019s complex enterprise environments, identity has become the backbone of security and compliance. At ASML, one of the world\u2019s leading technology innovators, Identity & Access Management is no longer an isolated discipline but an integrated ecosystem spanning Identity Governance, Access Management, PAM and Cryptography for humans and machines.<\/p>\n

In this session, Erik Plaggenmarsch will share how ASML approaches Digital Identity Orchestration: aligning policies, organization and technologies to comply with regulations that apply to all sectors in the organization. This includes building adaptive access policies, embedding Zero Trust principles and enforcing export-control requirements into daily operations to stay compliant.<\/p>\n

Expect a practical, no-nonsense view on how identity, upcoming technologies, compliance and security can be orchestrated together \u2013 offering insights that resonate for any organization dealing with scale, complexity, and regulatory demands.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6590″ img_size=”” css=””][vc_btn title=”09:40 – 10:05″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Alisa\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Alisa Isachenkova<\/a><\/h3>\r\n

Cyber Security Advisor of Port of Antwerp-Bruges<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Mastering Digital Identity: in control with IGA<\/h2>\r\n

Alisa Isachenkova, Cyber Security Advisor of Port of Antwerp-Bruges<\/h3> \r\n <\/div>[vc_column_text css=””]\n

In today\u2019s rapidly evolving digital world, identity management is no longer a nice-to-have\u2014it\u2019s a critical foundation for security and compliance. This dynamic session dives into the transformative power of Identity Governance & Administration (IGA) and how it can help organizations reduce manual workloads, tighten access controls, and stay aligned with regulations like NIS2.<\/p>\n

Discover how to align identity processes with your enterprise architecture and design a scalable roadmap for onboarding applications. We\u2019ll explore proven practices in role modeling, stakeholder engagement, and change management that drive adoption and long-term success.<\/p>\n

Packed with real-world insights and actionable strategies, this session will equip you with the tools and vision to build a future-ready identity strategy.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6360″ img_size=”” css=””][vc_btn title=”10:05 – 10:30″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6711″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]

\r\n

Morning Break at The Network Square With 1-to-1 Meetings<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n

Enjoy fresh coffee, tea and snacks on the network square. And the first 1-to-1 meetings take place. Check your EventManager for your personal programme.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”10:30 – 11:10″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Iwan\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Iwan Dijkstra<\/a><\/h3>\r\n

IGA Expert \/ Country Lead Belgium - Omada of Omada<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

The State of Identity Governance<\/h2>\r\n

Iwan Dijkstra, IGA Expert \/ Country Lead Belgium of Omada<\/h3> \r\n <\/div>[vc_column_text css=””]In this session, we\u2019ll walk through the key findings from Omada\u2019s annual research report, explore the main and actual business drivers for Identity Governance & Administration (IGA), and share real-world examples of what to consider before starting your IGA journey.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6647″ img_size=”” css=””][vc_single_image image=”6669″ img_size=”” css=””][vc_btn title=”11:15 – 11:40″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Michiel\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Michiel Pouw<\/a><\/h3>\r\n

Senior Solution Consultant of OpenText<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

The $2M Integration Trap: Why Smart CISOs Choose Architecture Over Point Solutions<\/h2>\r\n

Michiel Pouw, Senior Solution Consultant of OpenText<\/h3> \r\n <\/div>[vc_column_text css=””]Every week, another CISO discovers the hidden truth about “best-of-breed” IAM strategies: that sleek MFA tool doesn’t talk to your governance platform, your SSO only works for cloud apps, and your users now navigate three different portals just to do their jobs.<\/p>\n

The Real Question Isn’t “What’s the Best IAM Tool?”\u2014It’s “How Do I Avoid the Integration Trap?”<\/p>\n

In this dynamic 20-minute session, you’ll discover why the fastest path to IAM improvement often becomes the most expensive mistake\u2014and what industry leaders are doing differently.<\/p>\n

You’ll Learn:<\/p>\n