Benelux

Amsterdam

April 16, 2026

"An ounce of prevention is worth a pound of cure."
Benjamin Franklin

Click on the Fast Link buttons to learn more

VenueSoon

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Collective Awareness and Cyber Collaboration:
   The Best Way to Learn is from Mistakes

CRA’s (Cyber Resilience Act) Impact on Security    Landscape:
   What Leaders Must Know

Trust but Verify!
   Building Trust in Zero Trust Industry

From Theory to Threat-Ready:
   AI and Cloud Tomorrow

Keynotes

Deividas Lis

Cyber Threat Intelligence Officer at ECB (European Central Bank)
In my current role, I navigate the complex and ever-evolving landscape of cyber threats, employing a meticulous approach to safeguard digital environments. My expertise is underpinned by a solid legal education, complemented by ongoing professional development in advanced technologies like Python.

I thrive in collaborative, high-stakes settings, having led numerous critical investigations and intelligence projects that have significantly bolstered organizational security. As I continue to deepen my technical acumen, I remain committed to contributing meaningfully to the field of cybersecurity, driven by a mission to enhance digital safety and security in our interconnected world.

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Apply for The C-Suite Edition

16th of April 2026


Welcome to the Next IT Security – Benelux Edition 2026, an exclusive gathering that unites cybersecurity executives, innovators, and strategists from across Europe. Here in Amsterdam, we explore how organizations can thrive in a landscape defined by rapid technological change, evolving regulations, and increasingly sophisticated threats.

This edition centers on collective learning, shared responsibility, and turning theory into actionable resilience. As digital ecosystems expand, so does the necessity for stronger collaboration, deeper trust, and smarter implementation of emerging technologies.

In this edition, we highlight several critical focus areas shaping the future of cybersecurity leadership:

Collective Awareness and Cyber Collaboration

The Best Way to Learn Is from Mistakes
Cyber incidents whether internal or global offer invaluable lessons. When shared, they strengthen the entire ecosystem. Building a culture where organizations openly exchange experiences and best practices is key to preventing repeated failures and accelerating collective maturity.

CRA’s (Cyber Resilience Act) Impact on the Security Landscape

What Leaders Must Know
Europe’s Cyber Resilience Act is redefining accountability for software, devices, and digital products. For leaders, understanding its operational and strategic implications is essential. CRA is not only a regulatory milestone but a catalyst for raising security standards across the entire supply chain.

Trust but Verify!

Building Trust in a Zero Trust Industry
As Zero Trust evolves from a framework to an operational reality, organizations must redefine how trust is built, validated, and continuously assessed. Establishing transparent, verifiable trust models is crucial to securing distributed environments and complex digital ecosystems.

From Theory to Threat-Ready

AI and Cloud Tomorrow
AI-driven operations and advanced cloud architectures promise unprecedented capabilities but they require equally advanced security strategies. Moving from theoretical principles to fully implemented, threat-ready systems is the next great challenge for modern enterprises.

At Next IT Security, our mission remains clear: empower leaders with the insights, strategies, and collaborative strength needed to safeguard Europe’s digital future.

Welcome to Amsterdam  where the next chapter of cybersecurity resilience takes shape.

Agenda

08:00

Registration

08:15

Roundtable Breakfast

Time for initial networking on the event while we are expecting the Opening Keynote.


Chapter One:

Collective Awareness and Cyber Collaboration:

The Best Way to Learn is from Mistakes

09:00

This session explores how organizations can transform cybersecurity breaches into valuable learning experiences. It highlights the power of shared knowledge and collaborative insights, showing how teams can learn from both their own and others’ incidents to improve detection, response, and overall resilience.

Attendees will gain actionable strategies to strengthen defenses, accelerate incident response, and build a culture of collective awareness. The session provides practical guidance on turning mistakes into opportunities for strategic improvement, helping leaders embed resilience across their organizations.

Organizations that miss this session may remain reliant on isolated approaches, repeating mistakes and responding slower to emerging threats. Without leveraging collaborative insights, they risk losing opportunities to convert breaches into breakthroughs and strengthen cybersecurity across teams and industry peers.

Deividas Lis

Cyber Threat Intelligence Officer
ECB (European Central Bank)

09:25

This panel explores how organizations can leverage collective intelligence to strengthen cybersecurity. Experts will discuss how sharing experiences, lessons learned, and best practices across teams and organizations leads to faster threat detection, smarter responses, and more resilient operations.

Attendees will gain practical perspectives on fostering collaborative security, understanding cross-industry challenges, and applying collective lessons to their own teams. The discussion encourages active participation, exchanging viewpoints, and learning from peers’ real-world experiences.

In a rapidly evolving threat landscape, relying on isolated approaches can slow response and increase risk. Engaging in this panel helps executives uncover new strategies, avoid repeated mistakes, and transform shared knowledge into actionable improvements across their organizations.

Smeden Svahn

Information Security Coordinator and Administration Manager
ADDA

Sharon Larsson

CISO
Sveska Spel

Amit Sharma

Cyber Security Officer
ASR

Siegfried Moyo

Author & Director, IT Security – (Deputy CISO)
Americold Logistics, LLC

10:00

This session demonstrates how organizations can turn collective awareness into a strategic advantage in cybersecurity. By sharing real-world experiences, lessons learned, and insights across teams and organizations, participants will see how collaborative approaches improve detection, accelerate response, and build adaptive security practices.

Attendees will gain actionable strategies to foster cross-team collaboration, enhance threat intelligence, and embed a culture of shared learning within their organizations. The session equips leaders to convert insights from peers into practical improvements in defenses and risk management.

Organizations that do not engage in collective learning may remain siloed, repeating mistakes and responding slower to emerging threats. Missing this session means losing the opportunity to leverage shared experience to strengthen both organizational and industry-wide cybersecurity resilience.

Lucas von Stockhausen

Executive Director, Application Security Engineering Black Duck

10:25

Coffee Break & 1-1 meetings

Let’s discuss what we hear about Collective Awareness and Collaboration over a cup of coffee and explore some new opportunities with the partners of the event.


Chapter Two:

CRA’s (Cyber Resilience Act) Impact on Security Landscape:

What Leaders Must Know

10:55

This session breaks down the core elements of the Cyber Resilience Act (CRA) and clarifies what the regulation actually means in practice. It explains why CRA affects industries differently, yet still reshapes the entire cybersecurity landscape changing expectations for vendors, service providers, and every organization relying on digital products. Attendees will gain a clear view of the responsibilities, obligations, and market shifts triggered by the act.

Participants will walk away with practical guidance on how to prepare for CRA-driven changes, how to integrate upcoming requirements into their security strategy, and how to identify where CRA will have the strongest impact on their organization. The session helps leaders turn regulatory pressure into an opportunity to strengthen long-term resilience and operational readiness.

Without understanding CRA’s broader implications, organizations risk underestimating the changes ahead, missing critical compliance expectations, and being unprepared for the market transformation that will inevitably affect everyone whether directly regulated or indirectly through partners and supply chains.

Tobias Ander

Manager IT Security
Försvarsmakten (Swedish Armed Forces)

11:20

This panel brings together experts to discuss the key aspects of the Cyber Resilience Act (CRA) and its real-world implications: what CRA entails, which sectors are directly affected, and why, even with varying obligations, it will reshape the cybersecurity landscape. Participants will hear perspectives on how CRA will influence manufacturers, service providers, and the organizations that depend on them.

Attendees will gain a clear understanding of CRA’s most important requirements and hear practical insights on how to prepare for the operational and strategic changes ahead. The discussion will help leaders anticipate where CRA will have the greatest impact, plan for adjustments, and leverage regulatory shifts to strengthen overall cyber resilience.

Without engaging in this discussion, organizations may underestimate the upcoming changes, miss critical deadlines, and be unprepared for market transformations that will affect all players  either directly or through their suppliers and partners.

Geert Koster

Chief Information Security Officer
Witteveen+Bos

Jan Olsson

Kriminalkommisarie / Police Superintendent
Swedish National Police SC3

Mikael Varverud

CISO
Iptor

Kasun Bandar

CISO
CCFP

Georgios Kryparos

CISO
Einride

11:55

This keynote explores how NIS2 and DORA are reshaping cybersecurity obligations and the digital ecosystem, and highlights the innovative approaches introduced by the Cyber Resilience Act. Attendees will gain practical insights on integrating new requirements into operations while leveraging these changes to strengthen resilience and security.

Participants will understand the evolving regulatory landscape and leave with actionable strategies to turn compliance challenges into opportunities for competitive advantage and stronger cybersecurity posture.

Without clarity on NIS2, DORA, and CRA, organizations risk falling behind, facing unexpected compliance pressures, and missing opportunities to future-proof their security operations.

Chris Brown

VP EMEA
Synack

12:20

Lunch Break

Time to gather after two main focus areas of the event (Collective Awareness and Collaboration & CRA) , and gather our thoughts on it over the lovely seated lunch.


Chapter Three:

Trust but Verify!

Building Trust in Zero Trust Industry

13:20

This session explores the human dimension of trust in cybersecurity, where the industry mantra is “Trust but Verify” and technological solutions focus on Zero Trust. Participants will gain insight into how trust is built, maintained, and verified among people, teams, and organizations. The discussion highlights strategies for fostering collaboration, credibility, and confidence in an environment dominated by skepticism and verification.

Attendees will learn practical approaches to develop meaningful relationships with colleagues, partners, and clients, while balancing necessary scrutiny. Leaders will walk away with actionable strategies to enhance team cohesion, improve cross-organizational collaboration, and use trust as a foundation for stronger security culture and decision-making.

Without understanding the human element of trust in a Zero Trust world, organizations risk miscommunication, weak collaboration, and lost opportunities for secure partnerships. Failing to cultivate verified trust may limit the effectiveness of security initiatives and hinder the growth of a resilient cybersecurity ecosystem.

Moderator: Roberta Mladenovic

Regional Director
XM Cyber

13:45

This panel explores how cybersecurity leaders can move beyond the baseline of “verify everything” to build genuine, collaborative trust within and across organizations. Discussion will focus on real-world examples of trust-building, the challenges of operating in a high-skepticism environment, and strategies for fostering credibility, transparency, and cooperation among peers and partners.

Participants will gain practical insights into cultivating trust in executive relationships, improving cross-functional collaboration, and leveraging human trust to strengthen security culture. Leaders will leave with actionable takeaways for turning verification into a foundation for stronger, more resilient partnerships.

Without a clear approach to building trust, organizations may struggle with siloed decision-making, inefficiencies, and missed opportunities for collaborative security initiatives. Ignoring the human dimension of cybersecurity can weaken leadership effectiveness and limit organizational resilience.

Jeremy Rowley

Senior VP and Digital Trust Specialist
DigiCert

Rai Chanderjeet

Cyber Security Controls Manager
H&M

14:20

This keynote focuses on why modern cybersecurity can no longer rely on assurances, marketing claims, or assumed trust. It explores the shift toward demonstrable security posture, measurable controls, and continuous validation as expectations from customers, regulators, and partners intensify. The session highlights how leading vendors are moving from static promises to transparent evidence, real-time testing, and accountable security engineering.

Attendees will learn how to evaluate vendors based on proof rather than perception, understand which forms of validation carry the most weight, and see practical examples of how evidence-driven security builds stronger customer confidence. The session provides a roadmap for aligning product security, compliance, and communication so organizations can show their security maturity instead of talking about it.

Without a shift toward demonstrable security, organizations risk losing customer trust, failing upcoming regulatory expectations, and relying on suppliers whose claims cannot withstand scrutiny. Missing this perspective may lead to gaps in assurance, weaker procurement decisions, and greater exposure across the supply chain.

Daniel Qvint

Enterprise Sales Engineer
Abnormal AI

14:45

Coffee Break

Let’s discuss what we hear about Building Trust in Zero Trust Industry over a cup of coffee and explore some new opportunities with the partners of the event.


Chapter Four:

From Theory to Threat-Ready:

AI and Cloud Tomorrow

15:15

This session examines how organizations can harness the power of agentic AI while managing associated cybersecurity risks. Topics include AI-driven threat detection, automation of security processes, and balancing innovation with accountability and oversight.

Participants will understand practical ways to implement agentic AI safely, identify areas of high impact, and make informed decisions that accelerate innovation while maintaining robust security. Leaders will leave with frameworks to integrate AI into their cybersecurity strategy effectively.

Without a structured approach, deploying agentic AI can introduce unforeseen vulnerabilities, regulatory exposure, and operational risks. Organizations that ignore AI’s security implications may struggle to leverage its full potential safely.

Kjell Arne Yttervik

Nordics and CEE Security Channel
at Google

15:40

This keynote explores how AI-driven strategies can transform cloud security from reactive defense to proactive resilience. Discussion will cover real-world use cases, threat prediction, and adaptive defense mechanisms that leverage AI to secure dynamic cloud environments and safeguard critical data.

Participants will gain actionable insights into implementing AI-powered security solutions, improving incident response, and building resilient cloud architectures capable of anticipating and mitigating emerging threats. Leaders will leave equipped to turn intelligence into tangible, operational security advantages.

Without leveraging AI in cloud security, organizations risk slower detection, fragmented defense strategies, and exposure to increasingly sophisticated attacks. Missing this session means overlooking opportunities to integrate intelligence, automation, and resilience into your cloud infrastructure.

Flavio Aggio

CISO
WHO (World Health Organisation)

16:05

This session explores strategies for designing cloud environments that anticipate evolving cyber threats. Discussion will cover resilient architectures, risk-aware design, and practical approaches to safeguard data, applications, and workloads while enabling agility and innovation.

Participants will gain insights on implementing cloud resilience frameworks, prioritizing security without compromising performance, and preparing for emerging threat vectors. Leaders will leave with actionable strategies to strengthen their cloud posture for the future.

Without a proactive approach to cloud resilience, organizations risk data breaches, service disruptions, and costly recovery efforts. Failing to plan for future threats can compromise innovation, trust, and operational continuity.

Flavio Aggio

CISO
WHO (World Health Organisation)

16:30

The Chairman will kick off the round table discussions with a brief introduction, highlighting why this moment in time is particularly important to address these two topics. He will provide context on the current challenges and opportunities in cloud security and AI regulations, explaining why participants’ insights and active engagement will be valuable for understanding best practices and future-ready strategies.

Flavio Aggio

CISO
WHO (World Health Organisation)

16:40

Each topic will be discussed at a dedicated round table for 30 minutes, with round table captains ensuring that everyone has an equal opportunity to participate. The discussions follow a “learning by teaching” approach, meaning that each participant shares their insights while actively listening to the perspectives of seven other guests.

After the first 30 minutes, all participants except the round table captain will change seats, allowing attendees to engage with new peers and gain diverse perspectives, ensuring a high-quality networking and knowledge-sharing experience.

Flavio Aggio

CISO
WHO (World Health Organisation)

Round table moderators:

Jonaz Kumlander

Chief Technology Officer
Avidly

Smeden Svahn

Information Security Coordinator and Administration Manager
ADDA

Kasun Bandar

CISO
CCFP

Girish Venkatappa

Security Architect
Volvo Financial Services

Siegfried Moyo

Author & Director, IT Security (Deputy CISO)
Americold Logistics, LLC

17:25

  • The increasing complexity and interconnectedness of supply chains have introduced new risks. This discussion will examine the vulnerabilities that come with third-party vendors and interconnected systems, and how organizations can implement effective supply chain security strategies.
  • Employee behavior remains one of the top causes of cyber breaches. This point will focus on the importance of educating and training employees to recognize and respond to security threats, and the potential risks of neglecting security awareness programs.
  • The discussion will center on how organizations can manage both supply chain security and internal security awareness. Experts will provide insights on how to integrate solutions that address both threats simultaneously for a more resilient and secure organization.

Gianclaudio Moresi

CISO
Forbo Group

Team Blue

Surinder Lall

Board Member
at UK Government for Cyber Security

Team Red

17:45

Book signing by

Gianclaudio Moresi

"The Three Laws of Cybersecurity"
"Zero Trust Network - Zero Internet"

Tobias Ander

“Systematisk informationssäkerhet”

18:00

Networking Dinner Cruise

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event