Program 2019

This program is provisional and may be adapted in the future.
Keep an eye on this page for future announcements

Doors open at 8h30. First speaker slot: 9h20. End of speaker slots: 17h00

Auditorium (+3)

09:20
OPENING Belgian Cyber Security Convention 2019
Peter Buelens / Jan De Blauwe – Brewery of Ideas / Belgian Cyber Security Coalition More Info
09:30
Keynote: The evolving Cyber Threat and our responses
Miguel De Bruycker – Managing Director @ Centre for Cyber Security Belgium More Info Keynote
10:00
Integrated Cyber Security as an enabler, not a CISO’s worst nightmare
Bart Asnot – Microsoft More Info Governance & Practices
10:30
The future impact of AI on cyber crime and the shift of self-learning self-defending networks
Bernard Gallant – Darktrace More Info Technology & Innovation
11:00
COFFEE BREAK
11:30
How to build trust, starting with identity
Mark Ryan – Zscaler More Info Technology & Innovation
12:00
#EpicFail: Why incidents still happen
David Callebaut – Infosentry More Info Governance & Practices
12:30
The Data Breach vs. The Ethics Breach: How to Prepare for Both
Quentin Roulier – OneTrust More Info Compliance & Legal
13:00
LUNCH BREAK
14:00
My Son and I: 3 decades of cybersecurity differences!
Eddy Willems – Gdata More Info Technology & Innovation
14:30
The evolution of intelligent identity
Christian Voigt – Entrust Datacard More Info Technology & Innovation
15:00
Disturbance: the Sorry State of Cybersecurity and What we can do About it
Saad Kadhi – CERT.eu More Info Technology & Innovation
15:30
COFFEE BREAK
16:00
Towards European Cybersecurity
Alberto Di Felice – Digital Europe More Info Governance & Practices
16:30
20 years of Cybersecurity in Luxembourg “Lessons learned and good practices form the ecosystem.”
Pascal Steichen – securitymadein.lu More Info Governance & Practices
17:00
CLOSING DRINK

Alcazar (+5)

9:20
OPENING in Auditorium
9:30
KEYNOTE in Auditorium
13:00
LUNCH BREAK
14:00
Third-Party Risks Aren’t Static: Monitoring Tips and Tactics
Quentin Roulier – Onetrust More Info Compliance & Legal
14:30
Protect your business – Control your Cyber (in)vulnerability
Yves Looverie – Thales Group More Info Platforms & Tools
15:00
Discover Darktrace threat visualizer and autonomous response
Miguel Pieters – Darktrace More Info Platforms & Tools
15:30
COFFEE BREAK
17:00
CLOSING DRINK

Dijlezaal (0)

9:20
OPENING in Auditorium
9:30
KEYNOTE in Auditorium
10:00
Unite and conquer – a collaborative approach to cyber security
Prof. Dr. Martina Angela Sasse Freng – Ruhr University Bochum More Info Governance & Practices
10:30
Also taking your Security for granted?
Jurgen Van Eynde – Synergics More Info Governance & Practices
11:00
COFFEE BREAK
11:30
Body of knowledge and Competences Assessment for Cybersecurity professionals
Georges Ataya – Solvay Business School of Economics More Info Governance & Practices
12:00
Cyber insurance : A strong ally to mitigate cyber risks
Koen Druyts – CyberContract More Info Governance & Practices
12:30
Cyber Security in Retail
Raf De Leu – Torfs More Info Governance & Practices
13:00
LUNCH BREAK
14:00
Cyber security strategy – Why should not the IT decide but the management?
Alexandre Pluvinage – ING BE More Info SME
14:30
The Seven Deadly Sins and Virtues of Cybersecurit
Bert Bleukx – KBC Bank & Assurance More Info SME
15:00
How to make your employees cybersafe
Jan Populaire – BNP Paribas Fortis More Info SME
15:30
COFFEE BREAK
16:00
Do you know what to do if it happens – Managing cybersecurity incidents and save your business
Kurt Ceuppens – nViso More Info SME
16:30
Round table
Alexandre Pluvinage, Bert Bleukx, Jan Populaire and Kurt Ceuppens SME
17:00
CLOSING DRINK

Hertenaas (+4)

9:20
OPENING in Auditorium
9:30
KEYNOTE in Auditorium
10:00
Manage 3rd party IT security risk at scale
Lennart Pikaart – BitSight More Info Technology & Innovation
10:30
The Attack Surface Is Expanding Creating A Cyber Exposure Gap.
Mikael Rosander – Tenable More Info Technology & Innovation
11:00
COFFEE BREAK
11:30
Autonomous Breach Protection
Kiarash Jafari – Cynet More Info Technology & Innovation
12:00
Defense in Depth: Key Learnings for Achieving Detection and Response Everywhere
David Gold – Verizon More Info Technology & Innovation
12:30
Secure Application Migration to the Cloud
Mark Ryan – Zscaler More Info Technology & Innovation
13:00
LUNCH BREAK
14:00
The economics of penetration testing in the new threat landscape
Barry Butler – Outpost24 More Info Technology & Innovation
14:30
What’s the impact of drones in corporate cybersecurity?
Thomas Petracca – Senhive More Info Technology & Innovation
15:00
Cyber Arms Race vs Platform Security
Jeroen Hekelaar – Infinigate / SonicWall More Info Technology & Innovation
15:30
COFFEE BREAK
17:00
CLOSING DRINK

Scala (+3)

9:20
OPENING in Auditorium
9:30
KEYNOTE in Auditorium
10:00
SD-WAN Transforms to Secure SD-WAN – Taking Software Defined One Step Beyond
Patrick Grillo – Fortinet More Info Technology & Innovation
10:30
How to get hacked before you get hacked
Inti De Ceukelaire – HackerOne More Info Technology & Innovation
11:00
COFFEE BREAK
11:30
Securing Hybrid Cloud environments
Philippe Michiels – Tobania More Info Technology & Innovation
12:00
Cyber security and A.I. – practices to defend algorithms
Mika Lauhde – Huawei Technologies More Info Technology & Innovation
12:30
(in)secure passwords – You have been logged out because you signed in from another device.
Martijn Claes – Eurofins More Info Technology & Innovation
13:00
LUNCH BREAK
14:00
Trusted Execution Environments and how far to trust them
Jan Tobias Muehlberg – KULeuven More Info Technology & Innovation
14:30
How a single IT vulnerability could bring down your entire organisation. What’s next?
Sean Willems – Accel – Sophos More Info Technology & Innovation
15:00
Blockchain and distributed ledger technologies – Security risks, threats and vulnerabilities
Kurt Callewaert – Howest University of Applied Sciences More Info Technology & Innovation
15:30
COFFEE BREAK
16:00
How Policy Based CIAM can Improve the Customer Journey
Kurt Berghs – Trustbuilder More Info Technology & Innovation
16:30
The importance of industrial security for Industry 4.0
Tijl Deneut – Howest University College More Info Technology & Innovation
17:00
CLOSING DRINK