{"id":722,"date":"2018-09-11T08:23:05","date_gmt":"2018-09-11T08:23:05","guid":{"rendered":"http:\/\/logichunt.net\/demo\/wordpress\/emeet\/?page_id=722"},"modified":"2026-04-14T16:07:13","modified_gmt":"2026-04-14T14:07:13","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/security-leadership\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css=&#8221;.vc_custom_1576017595207{padding-top: 30px !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">The full programme of 2026<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]How do you translate strategy into implementation? How do you prepare yourself so that you are resilient? Risk, Compliance &amp; Business Continuity. Security Awareness. Legislation and regulations. Threats and opportunities of Artificial Intelligence. Security of complex cloud environments. Data protection and privacy. Incident Response. Technology tracks and security best practices.<\/p>\n<p><strong>Meet 150+ peers and solution providers amongst others<\/strong>: ABN Amro Bank, Allianz Benelux, De Nederlandsche Bank, Erasmus MC, Gemeente Amsterdam, Gemeente Breda, Holland Casino, ING Bank N.V. Ingka IKEA, Ministerie van Defensie, ProRail, Rabobank, Shell, Sociale Verzekeringsbank, Tata Steel Nederland, Univ\u00e9 Verzekeringen, and more.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1636712355727{padding-top: 30px !important;}&#8221; el_class=&#8221;custom-programma&#8221;][vc_column][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Full programme&#8221; tab_id=&#8221;1601370013447-27a45615-432f&#8221;][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7830&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Reception &amp; Registration<\/h2>\r\n                    <h3 class=\"subheading\">The Heliview team will welcome you to Supernova (Jaarbeurs), Utrecht centrally located directly next to Utrecht Central Station.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]The Heliview team will welcome you to Supernova (Jaarbeurs), Utrecht centrally located directly next to Utrecht Central Station.<\/p>\n<p>In addition to being easily accessible by public transport, the venue has:<\/p>\n<ul class=\"checklist\">\n<li>3.000+ parking spaces with 40+ charging points. Parking ticket is included in the free end-user ticket.<\/li>\n<\/ul>\n<ul class=\"checklist\">\n<li>Enjoy cookies from the Koekfabriek, a selection of sweets, mini cinnamon rolls, mini b\u00f6rek with spinach and cheese, and a New York croissant roll, while fresh coffee and tea are waiting for you!<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7828&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;9:00 &#8211; 9:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;kickoff&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/martijn-hoogesteger\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/12\/Martijn-Hoogesteger.jpg\" alt=\"Martijn Hoogesteger\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/mhoogesteger\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/martijn-hoogesteger\/\">Martijn Hoogesteger<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Digital Detective at Hunted and CTO of S-RM<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Opening by the chair &amp; Link up: The Connection Kickoff<\/h2>\r\n                    <h3 class=\"subheading\">Martijn Hoogesteger, Digital Detective at Hunted and CTO of S-RM<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Martijn Hoogesteger is a Digital Detective from the TV Program Hunted. Besides being a digital detective he is a cybersecurity expert. Martijn opens the conference with \u201cThe Connection Kickoff\u201d. This interactive networking session will break the ice and is the starting point of meaningful connections.<\/p>\n<p>The Connection Kickoff is the perfect opportunity to meet fellow security leaders, share your interests, and start expanding your network of peers who can inspire and support you during and beyond the conference. Let\u2019s make the first connection count![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7623&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;9:30 &#8211; 9:55&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;talkshow&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/cas-schiopu\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/pasfoto-4.jpg\" alt=\"Cas Schiopu\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/search\/results\/people\/?keywords=Cas++Schiopu+ey\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/cas-schiopu\/\">Cas Schiopu<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Senior Manager Cyber Security, Data Privacy & AI at EY<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/martijn-hoogesteger\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/12\/Martijn-Hoogesteger.jpg\" alt=\"Martijn Hoogesteger\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/mhoogesteger\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/martijn-hoogesteger\/\">Martijn Hoogesteger<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Digital Detective at Hunted and CTO of S-RM<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/aart-jochem\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/Aart-jochen.png\" alt=\"Aart Jochem\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/aart-jochem-%e2%9c%93-6812442\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/aart-jochem\/\">Aart Jochem<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chief Information Security Officer and Taskforce Digital Sovereignty<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Talkshow: Control, Dependency and Risk: The Sovereignty Challenge for IT Security Leaders<\/h2>\r\n                    <h3 class=\"subheading\">Cas Schiopu, Senior Manager Cyber Security, Data Privacy &amp; AI of EY | Martijn Hoogesteger, Digital Detective at Hunted and CTO of S-RM | Aart Jochem, CISO and Taskforce Digital Sovereignty of Centric<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]We open the conference with an interactive panel discussion on technical and operational sovereignty. As organisations increasingly rely on complex architectures, cloud platforms, and strategic vendors, maintaining control over technology, operations, and risk becomes a key leadership challenge.<\/p>\n<p>From an architecture and risk management perspective, the panel explores what sovereignty means in practice and addresses the difficult choices security leaders face, the dependencies they inherit or create, and the moments where control, accountability, and risk exposure must be deliberately accepted, or challenged.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7712&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;7623&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;7756&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;10:00 &#8211; 10:35&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/sheetal-joseph\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2025\/11\/Sheetal-Joseph.jpg\" alt=\"Sheetal Joseph\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/sheetaljo\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/sheetal-joseph\/\">Sheetal Joseph<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Ciso of P2P.org, former CISO of Bitvavo<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Keynote: Laying Security Foundations That Scale<\/h2>\r\n                    <h3 class=\"subheading\">Sheetal Joseph, CISO of P2P.org and Former CISO of Bitvavo<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Building a security program whether from zero in a lean startup or rebooting one in a mature organization is as much about context as it is about controls. There\u2019s no one-size-fits-all blueprint, but there is a repeatable framework that adapts to your organization\u2019s size, risk profile, and growth trajectory.<\/p>\n<p>In this talk, I\u2019ll walk through a practical, four-phase model that helps you build or rebuild security with clarity and purpose. From facing the right direction, to getting the basics right, embedding them sustainably, and if needed scaling to a more strategic and advanced level.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7928&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;10:40 &#8211; 11:05&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7806&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Morning Break at The Network Square With 1-To-1 Meetings<\/h2>\r\n                    <h3 class=\"subheading\">Enjoy fresh coffee, tea and snacks on the network square.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<ul class=\"checklist\">\n<li>Network with peers, speakers and partners.<\/li>\n<li>The first round of scheduled 1-to-1 meetings take place.<\/li>\n<li>Check your EventManager for your personal programme.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7828&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:00 &#8211; 11:35&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/mark-molyneux\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/Ontwerp-zonder-titel-5-1.png\" alt=\"Mark Molyneux\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/search\/results\/people\/?keywords=Mark++Molyneux+commvault\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/mark-molyneux\/\">Mark Molyneux<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">CTO Northern Europe of Commvault<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Breakout session: Commvault: From Cyber Security to Cyber Resilience<\/h2>\r\n                    <h3 class=\"subheading\">Mark Molyneux, CTO Northern Europe of Commvault<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Threats are exponential, AI is only accelerating, and \u201ccloud-first\u201d is no longer a distant vision, but the reality of every global enterprise.<\/p>\n<p>Join Commvault EMEA CTO, Mark Molyneux, as he shares powerful insights into the constantly evolving cyber-attack surface and demonstrates the importance of why a focus on creating an optimised cyber resiliency strategy is imperative.<\/p>\n<p><strong>Key learnings:<\/strong><\/p>\n<ul class=\"checklist\">\n<li>Understanding why unified resilience across security, identity, and recovery teams is critical to defeating modern attackers who exploit organizational silos<\/li>\n<li>Why clean recovery matters more than fast recovery and how AI-driven techniques can surgically remove compromised data to prevent reinfection<\/li>\n<li>How to prepare your organization for the agentic enterprise, where autonomous AI systems require new governance and protection strategies<\/li>\n<li>Why hybrid infrastructure is permanent, and how to implement resilience strategies that work seamlessly across cloud, SaaS, and on-premises environments<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7704&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:50 &#8211; 12:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/christian-reinhardt\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/2140469e-d8c6-42ca-a1bf-1ca4ebf0204c.png\" alt=\"Christian Reinhardt\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/christian-reinhardt\/\">Christian Reinhardt<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Directorm Human Risk Management of SoSafe<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: This Is Your Brain on Deepfakes: Why AI Scams Work on Smart People and how you can stop it<\/h2>\r\n                    <h3 class=\"subheading\">Christian Reinhardt, Directorm Human Risk Management of SoSafe<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Deepfakes are no longer science fiction &#8211; they are here, and they are highly effective. Drawing on neuroscientific insights, this talk explains why the human brain is not built for these threats and how the same psychological mechanisms attackers exploit can be turned into powerful tools for awareness.<\/p>\n<p>Understanding the brain is key to building real security resilience.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7085&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:50 &#8211; 12:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;heinekensessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/gustavo-de-mania\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/Foto-Gustavo-de-Mania.jpg\" alt=\"Gustavo de Mani\u00e1\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/gustavo-mania%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/gustavo-de-mania\/\">Gustavo de Mani\u00e1<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Regional CISO of Heineken Nederland B.V.<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Deep Dive Session: HEINEKEN\u2019s Approach to AI-Powered Deception with Deepfakes, Voice Cloning and Emerging Cyber Risks<\/h2>\r\n                    <h3 class=\"subheading\">Gustavo de Mani\u00e1, Regional CISO of Heineken Nederland B.V.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]AI-driven threats such as deepfakes, voice cloning and automated phishing are rapidly reshaping the cyber-risk landscape. In this interactive 55-minute deep dive session, you will explore how HEINEKEN tackles these emerging risks.<\/p>\n<p>Join your peers in this interactive session, where you are actively challenged to analyse real-world scenarios, assess AI-powered deception techniques and consider how your own organisations would respond.<\/p>\n<p>The session offers a concise, practical look at how deepfakes and voice cloning work, why they are so effective in social engineering, and which controls deliver the fastest security impact.<\/p>\n<p>This session is led by Gustavo Mani\u00e1, Information Security and Risk Manager and Regional CISO for Africa and the Middle East at The HEINEKEN Company.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7878&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:50 &#8211; 12:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/bart-bruijnesteijn\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/pasfoto-15.jpg\" alt=\"Bart Bruijnesteijn\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/bbruijnesteijn\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/bart-bruijnesteijn\/\">Bart Bruijnesteijn<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Senior Director Solutions Engineering at CyberArk<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Identity is the New Control Plane: Securing Human, AI, and Machine Access in Modern Enterprises<\/h2>\r\n                    <h3 class=\"subheading\">Bart Bruijnesteijn, Senior Director Solutions Engineering of CyberArk<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As human, machine, and AI identities multiply, and attackers increasingly weaponize AI, the consequences of a single identity breach are escalating at unprecedented speed.<br \/>\nFragmented IAM, PAM, and IGA approaches were not designed for this reality. The industry has reached a pivotal inflection point in cybersecurity.<\/p>\n<p>This session highlights the advantages of shifting from fragmented tools to a unified platform that aligns with CISO and SOC priorities while enabling a new approach to visibility, control and trust.<\/p>\n<p>Key learnings:<\/p>\n<ul class=\"checklist\">\n<li>Why privilege controls for all identities across human, machine, and AI will give you the upper hand<\/li>\n<li>How proactive threat detection with the use of AI helps you stay ahead of the threat<\/li>\n<li>How to gain complete visibility across environments<\/li>\n<li>How to achieve faster mitigation of security breaches through shared data and insights<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7710&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:50 &#8211; 12:15&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;postnlciso&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/omar-ali\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/Ontwerp-zonder-titel-18.png\" alt=\"Omar Ali\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/search\/results\/people\/?keywords=Omar++Ali+post\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/omar-ali\/\">Omar Ali<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">CISO and IT Director at PostNL<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Deep Dive Session: Balancing Security and Cost Optimisation: A New Reality for Security Leaders<\/h2>\r\n                    <h3 class=\"subheading\">Omar Ali, CISO and IT Director of PostNL<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As security demands continue to grow, budgets, resources, and talent do not scale at the same pace. Security leaders must make deliberate choices, recognising that full coverage is neither feasible nor cost-effective.<\/p>\n<p>In this Deep Dive Session, led by Omar Ali, CISO and IT Director at PostNL, we examine how to balance security ambitions with financial reality. Through a risk-based approach, we explore how security leaders can actively control and reduce costs.<\/p>\n<p>The session focuses on identifying overspend, rationalising tooling, optimising the use of people and capabilities, and consciously accepting certain risks to avoid unnecessary expense.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7747&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;11:50 &#8211; 12:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;trendaisessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/bart-herps-2\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/03\/Ontwerp-zonder-titel-2026-03-16T153447.349.png\" alt=\"Bart Herps\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/bart-herps-2\/\">Bart Herps<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Solutions Architect, TrendAI\u2122<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Breakout Session: From cyber risk to business value: strategic Security frameworks for every stakeholder<\/h2>\r\n                    <h3 class=\"subheading\">Bart Herps, Solutions Architect at TrendAI\u2122<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Discover how to transform cybersecurity from a cost center into a business enabler through practical insights from three perspectives. In this session, Bart shares hands-on strategies to build measurable cyber resilience using a modern, AI-driven security platform, while providing concrete takeaways for different stakeholders:<\/p>\n<ul class=\"checklist\">\n<li><strong>For Executives:<\/strong> Learn how to communicate cyber risks in business terms that drive strategic decision-making and board-level conversations. Discover how advanced cyber risk quantification translates technical vulnerabilities into measurable business impact metrics that resonate with the board and other stakeholders.<\/li>\n<li><strong>For CISOs:<\/strong> Gain actionable frameworks to achieve centralized visibility across the entire attack surface. Learn how cyber risk management enables you to prioritize remediation, demonstrate compliance, and align security initiatives with business priorities through data-driven decision-making.<\/li>\n<li><strong>For SecOps Teams:<\/strong> Experience how AI-native security operations can dramatically improve efficiency and response times. Explore next-generation SIEM capabilities (processing any log type within three hours) and intelligent security orchestration that automates decision-making and accelerates incident response in the SOC.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7968&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:20 &#8211; 12:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;hospital&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/ronald-westerveen\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/Foto-Ronald-Westerveen.jpg\" alt=\"Ronald Westerveen\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/ronald-westerveen-a00a47a\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/ronald-westerveen\/\">Ronald Westerveen<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Chief Information Security Officer of Prinses Maxima Centrum<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Breakout Session: Prinses Maxima Centrum &amp; Conscia; the cybersecurity challenges faced by a specialist hospital<\/h2>\r\n                    <h3 class=\"subheading\">Ronald Westerveen, CISO at Prinses Maxima Centrum<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]We are pleased to announce that Ronald Westerveen, Chief Information Security Officer at the Princess M\u00e1xima Centrum, will deliver an inspiring and practice\u2011oriented presentation on the unique cybersecurity challenges within a specialist hospital.<\/p>\n<p>As the leading expertise center for pediatric oncology in the Netherlands, the Princess M\u00e1xima Center plays a crucial role in both patient care and scientific research. This position brings specific and demanding requirements in the field of information security. In his session, Ronald will elaborate on:<\/p>\n<ul class=\"checklist\">\n<li>The day\u2011to\u2011day security challenges faced by a highly specialized hospital<\/li>\n<li>The complexity of protecting sensitive patient data in an ever\u2011evolving threat landscape<\/li>\n<li>The balance between accessibility for healthcare professionals and the need for strict security measures<\/li>\n<li>The strategies, technical solutions, and organizational measures used to effectively mitigate risks<\/li>\n<\/ul>\n<p>This presentation offers valuable insights for anyone involved in cybersecurity, healthcare IT, data protection, or organization\u2011wide digital resilience. We look forward to seeing you there for a session full of practical knowledge, inspiring experiences, and real\u2011life examples from healthcare practice.<\/p>\n<p>*Please note that this session will be in Dutch.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7842&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_single_image image=&#8221;7769&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:20 &#8211; 12:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/marius-venter\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/pasfoto-16.jpg\" alt=\"Marius Venter\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/marius-venter\/\">Marius Venter<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Security Specialist at Zscaler<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Engineering Trust in the Age of Intelligent Systems<\/h2>\r\n                    <h3 class=\"subheading\">Marius Venter, Security Specialist of Zscaler<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]We are entering a new era where organizations are no longer just businesses, but living information systems composed of people, platforms, and increasingly autonomous AI agents. As intelligence becomes embedded into workflows, decisions, and communications, the very nature of trust inside the enterprise is changing.<\/p>\n<p>Trust can no longer be assumed based on location, role, or past behavior. It must be continuously designed, measured, and verified. Drawing on insights from information theory, networked societies, and modern enterprise architecture, this session explores how the rise of AI transforms companies into real time decision networks where truth, authenticity, and control determine resilience.<\/p>\n<p>Leaders must move beyond traditional security models and adopt a mindset where trust is engineered into every interaction, data flow, and system action.<\/p>\n<p>This talk reframes Zero Trust as a leadership discipline for the intelligence age, giving decisionmakers a new lens for governing complexity, enabling innovation, and protecting the integrity of their digital reality.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7405&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:20 &#8211; 12:45&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7809&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Lunch Break at the Network Square with 1-to-1meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Enjoy a\u00a0variety of filled sandwiches and a warm snack, featuring five types of toppings. Including one fish option, three vegetarian choices and one vegan option,\u00a0accompanied by a rotating warm snack, soup from the<\/p>\n<p>Verspillingsfabriek,\u00a0international salads, a dessert board, and fruit juices.<\/p>\n<p>During lunch there is enough time for 1-on-1 meetings and networking with colleagues, solution providers, peers and speakers.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7828&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;12:40 &#8211; 13:40&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/nadav-elkiess\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/f3daf954-2706-4ce8-9538-1f95469c8ab1.png\" alt=\"Nadav Elkiess\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/nadav-elkiess\/\">Nadav Elkiess<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Lead France & BENELUX Region of Pentera Security Ltd.<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Ransomware Reality Check<\/h2>\r\n                    <h3 class=\"subheading\">Nadav Elkiess, Lead France &amp; BENELUX Region of Pentera<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Ransomware remains the most critical threat to organizations globally, reaching an unprecedented scale and impact. The sophistication and persistence of threat actors mean that businesses face a constant and evolving risk. Despite the takedown of two major ransomware groups, LockBit and ALPHV, the overall volume of attacks remains largely unchanged, demonstrating the deeply rooted nature of this digital scourge.<\/p>\n<p>With costs projected to reach a staggering $265 billion annually by 2031, the need for proactive defense is more urgent than ever.<\/p>\n<p>Contrary to the common belief that an attack is inevitable, ransomware doesn&#8217;t have to be a matter of &#8220;when&#8221;\u2014security teams have the power to turn it into an &#8220;if.&#8221;<\/p>\n<p>In this essential session, Nadav Elkiess, will move beyond theory to present concrete, evidence-based strategies. Attendees will learn how to strengthen their current defenses, identify and close critical security gaps, and fundamentally enhance their organization&#8217;s resilience against the most advanced persistent threats.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7737&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:55 &#8211; 14:20&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/dimitris-vassilopoulos\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/03\/e1d2f936-d704-46fa-9090-3f105c7d110e-cropped.jpg\" alt=\"Dimitris Vassilopoulos\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/dimitris-vassilopoulos\/\">Dimitris Vassilopoulos<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Solutions Architect - EMEA of Upwind Security Ltd<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Runtime First Cloud Security: Turning Cloud Noise into Actionable Insights<\/h2>\r\n                    <h3 class=\"subheading\">Dimitris Vassilopoulos, Solutions Architect - EMEA of Upwind Security Ltd<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In today&#8217;s cloud-native world, workloads are ephemeral, architectures are API-driven, and applications are built on microservices. Static security tooling is not enough and cannot keep pace with this speed and complexity.<\/p>\n<p>Risk owners are overwhelmed by theoretical findings that lack production context and fail to reflect real exposure. What they need is a complete CNAPP that can also offer actionable visibility into live, exploitable risk.<\/p>\n<p>This session explores how runtime context reduces noise, sharpens prioritisation, and accelerates detection and response.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7906&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:55 &#8211; 14:20&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/christian-sullivan\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/Ontwerp-zonder-titel-78.png\" alt=\"Christian Sullivan\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/christian-sullivan-a526a1159\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/christian-sullivan\/\">Christian Sullivan<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">EMEA Solutions Advisor of Saviynt<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out Session: The Rise of AI Identities: How to Govern What You Can\u2019t See - What You Should Prepare For<\/h2>\r\n                    <h3 class=\"subheading\">Christian Sullivan, EMEA Solutions Advisor of Saviynt<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]AI is transforming the enterprise at breakneck speed \u2014 and with it comes a new identity challenge hiding in plain sight. AI agents are now reading sensitive data, making autonomous decisions, and triggering actions across critical systems. They\u2019re powerful, fast, and often invisible to traditional IAM controls. In short: AI identities are rising, and most organizations aren\u2019t prepared.<\/p>\n<p>The Rise of AI Identities: How to Govern What You Can\u2019t See \u2014 What Every Security Leader Should Prepare For<\/p>\n<p>This breakout session reveals why AI agents are quickly becoming the most privileged and least understood identities in your environment. You\u2019ll learn how AI-driven access sprawl happens, how attackers are already exploiting AI behaviors, and why existing governance models fall short.<\/p>\n<p>Most importantly, we\u2019ll outline the new rules for discovering, governing, and securing AI identities so your organization can innovate safely \u2014 without losing control of who (or what) has access.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7845&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:55 &#8211; 14:20&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;tstc&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/siebe-brouwer\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/pasfoto-11.jpg\" alt=\"Siebe Brouwer\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/siebeb\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/siebe-brouwer\/\">Siebe Brouwer<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Partner at Banx and Trainer at TSTC<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    \r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/tawnni-de-la-cuesta\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/01\/pasfoto-12.jpg\" alt=\"Tawnni Casta\u00f1o de la Cuesta\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/tawnni-casta%C3%B1o-de-la-cuesta-843926b0\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/tawnni-de-la-cuesta\/\">Tawnni Casta\u00f1o de la Cuesta<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Partner at Banx and Trainer at TSTC<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Workshop: From Compliance to Strategic Value: How GRC Strengthens Security Leadership at Board Level<\/h2>\r\n                    <h3 class=\"subheading\">Siebe Brouwer, Partner at Banx and Trainer at TSTC | Tawnni Casta\u00f1o de la Cuesta, Partner at Banx and Trainer at TSTC<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Security leadership today requires more than technical controls and compliance checkboxes. Board members expect insight, control, and direction. In this deep dive session, we show how you can use GRC as a strategic leadership instrument. You will gain insight into:<\/p>\n<ul class=\"checklist\">\n<li>The contribution of GRC to decision-making at board-level<\/li>\n<li>How to focus on being \u201cin control\u201d rather than on compliance<\/li>\n<\/ul>\n<p>Join your fellow security leaders in this deep dive to discover how GRC supports stronger security leadership and decision-making at board level.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7858&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;13:55 &#8211; 14:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/amir-vashkover\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2025\/12\/pasfoto-3.jpg\" alt=\"Amir Vashkover\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/amir-vashkover\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/amir-vashkover\/\">Amir Vashkover<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Head of Data Security<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Deep Dive Session: Ensuring Robust Data Protection &amp; Privacy Measures<\/h2>\r\n                    <h3 class=\"subheading\">Amir Vashkover, Head of data security<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<h2><span style=\"color: #ff0000;\"><strong>THIS SESSION IS CANCELLED<br \/>\nSpeaker will not be coming<\/strong><\/span><\/h2>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_btn title=&#8221;13:55 &#8211; 14:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/eoin-mcgrath\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/Ontwerp-zonder-titel-82.png\" alt=\"Eoin McGrath\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/eoin-mcgrath\/\">Eoin McGrath<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Special Projects Manager of ThreatLocker<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Make Your Business a Hard Target for Cybercriminals<\/h2>\r\n                    <h3 class=\"subheading\">Eoin McGrath, Special Projects Manager of ThreatLocker<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]When it comes to potential targets for cyberattacks, easier to breach means more likely to fall victim. While you might not be able to influence your perceived value, there are changes that can eliminate your organization from being seen as an easy target.<\/p>\n<p>We\u2019ll explore practical tactics to reduce your surface area of attack and controls to prevent lateral movement should a breach occur.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7901&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:25 &#8211; 14:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;oneidentitysession&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/alan-radford\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/03\/4389edc9-2bec-478b-8b2c-889b69eed948.jpg\" alt=\"Alan Radford\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/linkedin.com\/in\/alradford%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/alan-radford\/\">Alan Radford<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Global Strategist of One Identity Software Netherlands B.V.<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: How to create a solid ground<\/h2>\r\n                    <h3 class=\"subheading\">Alan Radford, Global Strategist of One Identity Software Netherlands B.V.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Get a firsthand look at where privileged access management is heading and why it is becoming a cornerstone of modern cybersecurity. This session explores how current PAM capabilities and upcoming innovations strengthen security defences, simplify compliance, and deliver more intentional control over privileged access.<\/p>\n<p>You will learn how PAM increases the value of your existing cybersecurity investments, how the future of enforcing least privilege access is taking shape, and how our strategic direction leads to measurable improvements in overall security posture.<\/p>\n<p>You will leave with clear, usable insights and a confident view of how to prepare your organization for what comes next.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8001&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:25 &#8211; 14:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;Harfanglabsession&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/sander-hofman-2\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/767e62df-e530-4f4d-acbe-b4e7357eee5-cropped.jpg\" alt=\"Sander Hofman\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/hofmans%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/sander-hofman-2\/\">Sander Hofman<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Pre-Sales BeNeLux of HarfangLab<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out session: Cybersecurity without compromise<\/h2>\r\n                    <h3 class=\"subheading\">Sander Hofman, Pre-Sales BeNeLux of HarfangLab<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]It\u2019s no surprise that in today\u2019s world, cybersecurity is not a plus, it\u2019s a must-have and it\u2019s critical. Whether it\u2019s to protect strategic assets, critical data, or simply to ensure business continuity, no organisation can afford the cost of no protection. Yet, cybersecurity often comes with compromises in businesses\u2019 minds.<\/p>\n<p>In this presentation, we\u2019ll debunk this theory. No, choosing the best cybersecurity approach doesn\u2019t mean giving up privacy, control, efficiency or compliance. Yes, Europe has it all &#8211; performance, excellence, innovation and engineers.<\/p>\n<p>Despite today&#8217;s tensed geopolitical environment where the cyberspace is more strategic than ever for nations, Europe keeps increasing its technological dependencies and hence, reducing its resilience. As businesses try to navigate through geopolitcal and regulatory realities this presentation will define operational sovereignty and provide a risked-based analysis when it comes to security strategies.<\/p>\n<p>Ready to take the control?[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;8003&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:25 &#8211; 14:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7806&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Afternoon break at the network square with 1-to-1 meetings<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Enjoy a selection of refreshing lemonades and healthy smoothies, a cookie\u2011brownie treat, Bites We Love nut mixes, and mozzarella\u2013tomato skewers.<\/p>\n<p>Have\u00a01-to-1 meetings, meet colleagues, solution providers, peers and speakers and share your gained knowledge![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7828&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;14:55 &#8211; 15:35&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221; el_id=&#8221;ukrainewar&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/security-leadership\/speaker\/chris-kubecka\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2026\/02\/pasfoto-14.jpg\" alt=\"Chris Kubecka\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/chris-kubecka\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/security-leadership\/speaker\/chris-kubecka\/\">Chris Kubecka<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Cyber Hacktress of Hypasec<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Keynote: Cyber Warfare: Real-World Lessons from Ukraine<\/h2>\r\n                    <h3 class=\"subheading\">Chris Kubecka, Internationally Recognised Cyberwarfare Expert of -<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Chris Kubecka is an internationally recognised cyberwarfare expert. In this keynote she takes you deep into the digital battlefields. Drawing on her first-hand experience with cyber operations in the Ukraine-Russia war, Chris will unpack real-world case studies that illustrate how cyber warfare unfolds, who the key actors are, and what the tangible consequences are for societies, infrastructure, and global stability.<\/p>\n<p>You will gain a nuanced understanding of how malware, nation-state operations, open-source intelligence, and unconventional cyber tactics intersect with geopolitical conflict.<\/p>\n<p>This session highlights critical lessons in cyber resilience and collective defence. By the end of the talk, you will walk away not just with a clearer picture of cyberwarfare realities, but with hope, tools, and inspiration on how individuals, organisations, and nations can respond and adapt in an increasingly contested digital world.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7828&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;15:35 &#8211; 16:10&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;custom-programma&#8221;][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7809&#8243; img_size=&#8221;&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Network Drinks &amp; Appetizers<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]We close the conference with a networking drink and apetizers.<\/p>\n<p>Enjoy informal conversations with colleagues, partners, speakers, and new contacts![\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243; offset=&#8221;vc_col-xs-2\/5&#8243;][vc_single_image image=&#8221;7828&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;16:20 &#8211; 16:50&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600335570970{padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Who&#039;s speaking?<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Curious about who is contributing to the conference and what experience they bring with them? Quickly view the complete overview![\/vc_column_text]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"https:\/\/heliview.com\/security-leadership\/speakers\/\" target=\"_self\"><span>See all speakers<\/span><\/a>\r\n                    \r\n               \r\n                <\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1576017595207{padding-top: 30px !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]How do you translate strategy into implementation? How do you prepare yourself so that you are resilient? Risk, Compliance &amp; Business Continuity. Security Awareness. Legislation and regulations. Threats and opportunities of Artificial Intelligence. Security of complex cloud environments. Data protection and privacy. Incident Response. Technology tracks and security best practices. Meet [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-722","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Programme | Security Leadership | IT &amp; Information Security<\/title>\r\n<meta name=\"description\" content=\"About the latest developments in legislation, awareness, security, risk &amp; compliance, and much more. Read more...\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/security-leadership\/programme\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Programme | Security Leadership | IT &amp; Information Security\" \/>\r\n<meta property=\"og:description\" content=\"About the latest developments in legislation, awareness, security, risk &amp; compliance, and much more. Read more...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/security-leadership\/programme\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Security Leadership\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-04-14T14:07:13+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/11\/1200x628.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"628\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/11\/1200x628.jpg\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/programme\/\",\"url\":\"https:\/\/heliview.com\/security-leadership\/programme\/\",\"name\":\"Programme | Security Leadership | IT & Information Security\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\"},\"datePublished\":\"2018-09-11T08:23:05+00:00\",\"dateModified\":\"2026-04-14T14:07:13+00:00\",\"description\":\"About the latest developments in legislation, awareness, security, risk & compliance, and much more. Read more...\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/programme\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/security-leadership\/programme\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/programme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/security-leadership\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programme\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\",\"url\":\"https:\/\/heliview.com\/security-leadership\/\",\"name\":\"Security Leadership\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Programme | Security Leadership | IT & Information Security","description":"About the latest developments in legislation, awareness, security, risk & compliance, and much more. Read more...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/security-leadership\/programme\/","og_locale":"en_GB","og_type":"article","og_title":"Programme | Security Leadership | IT & Information Security","og_description":"About the latest developments in legislation, awareness, security, risk & compliance, and much more. Read more...","og_url":"https:\/\/heliview.com\/security-leadership\/programme\/","og_site_name":"Security Leadership","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2026-04-14T14:07:13+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/11\/1200x628.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2023\/11\/1200x628.jpg","twitter_site":"@HeliviewConf","twitter_misc":{"Estimated reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/security-leadership\/programme\/","url":"https:\/\/heliview.com\/security-leadership\/programme\/","name":"Programme | Security Leadership | IT & Information Security","isPartOf":{"@id":"https:\/\/heliview.com\/security-leadership\/#website"},"datePublished":"2018-09-11T08:23:05+00:00","dateModified":"2026-04-14T14:07:13+00:00","description":"About the latest developments in legislation, awareness, security, risk & compliance, and much more. Read more...","breadcrumb":{"@id":"https:\/\/heliview.com\/security-leadership\/programme\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/security-leadership\/programme\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/security-leadership\/programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/security-leadership\/"},{"@type":"ListItem","position":2,"name":"Programme"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/security-leadership\/#website","url":"https:\/\/heliview.com\/security-leadership\/","name":"Security Leadership","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/pages\/722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/comments?post=722"}],"version-history":[{"count":11,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/pages\/722\/revisions"}],"predecessor-version":[{"id":8133,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/pages\/722\/revisions\/8133"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media?parent=722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}