Benelux

Amsterdam

May 15, 2025

Media Partners

Click on the Fast Link buttons to learn more

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR Benelux C-level Cybersecurity CONFERENCE

Focus:

Are you affected by NIS2 & DORA?

Cybersecurity for Essential Sectors

2025 - The year of Quantum computing

Who Bears the Responsibility When Cloud Services Fail?   

The Future of Cyber Supply Chains

Keynotes

Chandrashekhar Kachole

Chief Technology Officer
Results-oriented visionary with a unique background in Technology, currently working at Worldline, with 30+ years of experience in the industry. Consistently breaks new ground, enhances existing capabilities, and delivers unique solutions with lasting engineering and financial benefits for organizations.

Dynamic, resourceful, and collaborative leader with a history of proactively focusing on internal and external customer needs and expectations. Thrives in demanding, multi-task environments while providing cost-effective project designs. Motivational leader skilled in identifying critical players to build strong project teams.

Resourceful problem solver with a proven ability to conceptualize solutions for challenging situations and maximize product success. An articulate communicator across diverse groups and at all corporate levels. Highly organized planner with excellent time management skills.

Marijn Schuurbiers

Head of Operations at European Cybercrime Center - Europol (EC3)
Marijn Schuurbiers is the current Head of Operations at Europol’s Cybercrime Centre (EC3). EC3 acts as the data- and people’s hub for international cybercrime investigations, and serves a pivotal role when it comes to the international coordination of such complex investigations.

Before his current position, Marijn served for 12 years in multiple senior management positions at Team High Tech Crime of the Dutch National Police, and an additional 3 years overseas at an Organised Crime Unit (RST) on the Dutch Caribbean.

Marijn has studied both Cyber Security at the University of Lancaster (UK), Police Management at the Dutch Police Academy (NL) and Informatics at the University of Applied Sciences in Breda (NL).

Nir Chervoni

Data Security & AI Leader
With over 20 years of experience in the IT field, currently working at Booking.com, including approximately 20 years in Information Security and 13 years in security leadership positions, Nir has worked with various types of organizations. These include startups, SMBs, large enterprises, and government organizations, mainly focusing on Information Security, Risk Management, and Security Strategy.

Additionally, he has extensive knowledge and experience in various professional domains within the field of information security, such as data security, generative AI security, cloud security, infrastructure security, application/API security, identity and access management, and data privacy.

Benjamin
Bachmann

Director Group Information Security & Enterprise Architecture (aka CISO)
Bilfinger

Ben is a passionate cybersecurity leader with a focus on training individuals and organizations to navigate the digital world securely. Drawing on his experience, he helps companies build a strong security culture by ensuring employees are properly educated on cybersecurity threats, including phishing and malware. Ben believes in making security training engaging and effective, using humor to drive home important lessons. With a deep commitment to keeping companies safe from cyberattacks, he provides tailored solutions that protect both individuals and businesses from costly breaches.

Patrick Ghion

Chief Cyber Strategy Officer and Head Regional Cyber Competence Center
Geneva State Police and Western Switzerland (RC3)

Patrick, a seasoned cybersecurity professional, blends technical acumen with strategic leadership. His career, showcased in his profile, highlights his role in fortifying digital landscapes. With a robust history of managing complex security challenges, Patrick's expertise enriches discussions on modern cyber threats and risk mitigation.

Akansha
Shukla

Cyber Security
Domain Expert.
(Leading API Security)
ABN AMRO Bank

Akansha Shukla is an Information Security Expert with over ten years of experience specializing in application security, DevSecOps, API security, security architecture, secure design principles, threat modeling, and risk assessment. She also has a strong background in project management and creative problem-solving. Akansha is known for building and maintaining positive relationships with stakeholders and providing comprehensive support for security operations. Her efforts in protecting organizations from internal and external threats have been widely recognized, earning her a solid reputation for resolving complex challenges.

Surinder Lall

SVP Global Information Security Risk Management and Board Member
Paramount and UK Government Cyber Security

Surinder is a seasoned leader with over 25 years of experience in the technology sector, backed by a robust academic background including a postgraduate Masters in Law (LL.M) from Strathclyde University and a B.A. in International Business & Management from Bournemouth University, alongside numerous prestigious cyber security certifications including but not limited to CISSP, CEH, CHFI, C:CISO

 

A passionate innovator his work at Paramount resulted in him receiving the Top Innovator Award from the CEO of Paramount International in 2019. In 2022 he was also called to serve on the prestigious UK Government's Cyber Security Advisory Board, advising the Cabinet Office the highest office of UK government leadership on critical cyber security matters where he continues to serve today.

Juan Diego
Nocua Gualdron

CISO
Artsen zonder Grenzen Nederland

Experienced Information Technology Coordinator with a history of working in the non-profit organization management industry. Strong operations professional skilled in ISO 27001, NIST, PHP, IT Infrastructure Management, Information Security Awareness, and Network.

Siegfried Moyo

Director, IT Security
(Deputy CISO)
Americold Logistics, LLC.

A seasoned cybersecurity transformational leader, strategist and researcher with over two decades of experience, I consistently drive significant cybersecurity improvements within an organization. My expertise lies in guiding businesses through strategic cyber and information security initiatives, enhancing their defences in the ever-evolving threat landscape. A key focus is always on stabilizing cybersecurity posture while ensuring business continuity. I believe in fostering strong cross-functional collaboration to achieve optimal cybersecurity outcomes.

 

My commitment to excellence is reflected in my book, 'Executive's Guide to Cyber Risk: Securing the Future Today,' where I share actionable insights for business and board executives on navigating the complexities of cybersecurity.

 

I view cybersecurity as an integral enabler of business success, and I always strive to help organizations build cyber resilience that empowers their growth and innovation.

Trish
McGill

Security IT/OT Manager
Illonix

With over 25 years of experience across Corporate, Financial, Oil & Gas, Chemical Industry, Manufacturing, Government, Military, and Technology sectors, both domestically and internationally, Trish McGill is recognized as a leading Trusted Advisor and Executive Subject Matter Expert in Cyber Security IT/OT. Her expertise in navigating complex global Cyber Security regulations and designing effective, realistic security strategies has made her a sought-after authority worldwide.

 

Trish is a dedicated and loyal team leader with a diverse skill set and exceptional interpersonal and communication abilities. Known for her ability to create synergy and motivate teams, she transforms the challenges of Cyber Crime Defense, Cyber Security, and Risk Management into opportunities for growth and improvement. Her professional demeanor and passion for these fields resonate throughout all levels of an organization.

Amit
Sharma

Security Officer
ASR

I am an Information Security Professional with years of experience in Application Security, Penetration Testing & Information Risk Management.

I have rich experience with working on complex security engagements, from designing and executing of Application Security Strategy, Supply Chain Security to Compliance Consulting.

Some of the topics that is fascinating to me is DevSecOps, Advancement and usage of AI in Application Security, Security Awareness and Vulnerability Management.

My mission is to use my existing knowledge and expertise to assist organizations in making their applications more resilient.

Always enthusiastic about sharing my insights and best practices with other security professionals and enthusiasts via talks and coffee chats.

Munish Sidana

Head of Information Security
Rhenus Logistics

With over 17 years of experience in cybersecurity, I lead the Global IT Security team at Rhenus Logistics, a leading provider of logistics solutions with operations in more than 50 countries. I hold multiple certifications, such as CISSP, CISM, CEH, and PCI DSS, and have a strong background in security architecture, risk assessment, and security operations.

In my current role, I design and implement the cybersecurity strategy across the business unit globally, ensuring compliance with industry standards and regulations, and enhancing the security and efficiency of our network operations. I have successfully deployed Zero Trust Network Architecture (ZTNA), a cutting-edge solution that reduces the attack surface and improves the user experience. I also have extensive experience in IIOT, security assessments, and product evaluations and roll outs. Previously, I delivered complex and high-impact security projects for clients in various industries, such as the digital transformation project that saved tens of thousands of dollars in revenue on a monthly basis. I am passionate about cybersecurity and its role in enabling business growth and innovation. I enjoy working in a dynamic and challenging environment, where I can leverage my skills and expertise to solve problems and deliver value. I also value collaboration and learning, and strive to develop myself and my team continuously. My goal is to advance the security and resilience of Rhenus Logistics and its customers.

Erik Frambach

CISO
Rail & OV

Making IT work for the business has always been my motto. After I left university with a MSc in biology I put this motto into practice by developing "e-learning software" for the Open University. My interest then shifted towards network architecture and technology, and the Internet and its applications. Information security soon became my specialty. Certifications: CISSP, CISM, ISO 27001 Lead Auditor, CIPP/E. Next stop: CCISO or CCSP.

 

I've participated in many projects involving information security, identity & access management, and IT governance & compliance. Working with businesses both big and small, local and multi-national, profit and non-profit, public and military, loosely managed and tightly regulated, has taught me what works and what doesn't work under specific conditions. My strength lies in applying this expertise and experience to selecting and implementing suitable solutions, in tune with the business.

Deepankar Bhagat

Global IAM
ING Bank

Deepankar Bhagat is a seasoned cybersecurity and risk management expert specializing in Identity and Access Management (IAM) and regulatory compliance. He has extensive experience in designing and implementing security frameworks for business-critical systems, ensuring compliance with evolving regulations.

 

Key Expertise:

 

  • IAM & Security Frameworks: Murex, Sophis, Summit NT, Adaptive Suite
  • Risk & Compliance: Six Sigma, CMMI, ITIL Standards
  • Scripting & Programming: SQL, PL/SQL, C, C++, Perl, Shell Scripting, Core Java
  • Service & Configuration Management: GIT, Control Book Structure (CBS)
  • Tools & Technologies: JIRA, Oracle Developer, Toad, Citrix, MQ Series, Jenkins, Autosys

At ING Bank, Deepankar drives IAM strategies, enhancing security, efficiency, and compliance in an evolving regulatory landscape.

Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

Richard Meeus is Akamai’s EMEA Director of Security Technology and Strategy. With more than 20 years of experience, Richard is responsible for designing and building secure solutions for some of the world’s most influential organisations.

Richard is an industry expert in cloud computing, enterprise software, and network security. During his time at Akamai, Mirapoint, and Prolexic, Richard has had held strategic roles across a broad range of projects, including the deployment of DDoS solutions for multinational organizations to protect critical infrastructure and sensitive data. Additionally, Richard is a chartered member of the BCS and a CISSP.

Kev Eley

Vice President UKI
Exabeam

Kev Eley is Vice President UKI at Exabeam. For nearly three decades he has delivered expert insight and solutions to the IT and software industry, dedicating 15 years specifically to cybersecurity and fraud detection. He has been personally involved in over 150 security information and event management (SIEM), User and Entity Behavior Analytics (UEBA) and Security Analytics deployments, with a core focus on customer success and value realization.

 

Previous to Exabeam, Kev held notable positions at IBM, Microsoft, TrapX Security, Egress Software Technologies and LogRhythm. He possesses a keen interest in all aspects of cyber and its impact on business and society and has worked across a wide variety of sectors, including financial services, utilities, the public sector and more.

Victoria van Roosmalen

CISO & DPO
Coosto

I’m driven to foster safety and the right to privacy in the ever-evolving cyber realm by navigating others towards thoughtful outcomes and elegant solutions. I invest in sharing and elevating my expertise in IT, security, and data protection—including the intersection with relevant laws and regulations.

 

Passionate about mastering my crafts, I enjoy diving deep into various subject matters. It empowers me to uncover flaws rapidly, (fore)see adverse effects, and defend against threats and the dark arts—whether deeply technical or psychological. Although playing safe doesn’t allow us to flourish, I’m determined to help others stay ahead of the curve and reveal the seemingly impossible yet possible.

Pierre Noel

CISO
Le Collectionist

Pierre Noel is an independent cybersecurity expert, advisor to Airbus, former CISO of Microsoft & CISO of the Le Collectionist group and partner in the CYAN network. With plenty of years of consultancy and cybersecurity expertise, he brings a lot of use cases and company learnings to the cyber threat landscape.

Richard Hensen

Enterprise Solutions Engineer
Wiz

Richard Hensen is a highly skilled Solution Engineer at Wiz Cloud Security, where he plays a pivotal role in designing and delivering cutting-edge cloud security solutions to a global portfolio of clients. With over a 20 years of experience in cybersecurity and cloud infrastructure, Richard specializes in helping organizations secure their cloud environments, ensuring regulatory compliance, and mitigating risks in an increasingly complex digital landscape.

 

Areas of Expertise:

  • Cloud Security Architecture: Richard is an expert in building robust cloud security frameworks that align with industry standards like CIS, Mitre Att&ck and ISO 27002. His proficiency spans across multi-cloud environments, including AWS, Azure, and Google Cloud.
  • DevSecOps Integration: A key advocate for security automation, Richard helps companies integrate security into the DevOps pipeline, facilitating faster deployments without compromising security standards.
  • Threat Detection & Response: Leveraging advanced tools and platforms, Richard designs systems that provide real-time threat intelligence, anomaly detection, and rapid incident response, minimizing potential damage from cyber threats.
  • Compliance & Risk Management: Richard has a strong background in guiding enterprises through regulatory challenges, ensuring they meet GDPR, PCI-DSS, and ISO 27001 requirements while maintaining strong security postures.

Personal Philosophy:
Richard believes that in the digital age, security should not be an afterthought but a built-in feature of all cloud operations. His mission is to ensure that businesses can innovate with confidence, knowing that their data and operations are secure from emerging threats.

Jeff Barker

Senior Vice President Product
Synack

More than 25 years of experience in creating and developing markets, leading and scaling teams, driving marketing product strategy and revenue growth. Leading product marketing, product management, marketing, systems engineering, and operations organizations in both startup and public networking and security companies has shaped perspectives that have driven success.

Moshe Vered

Governing Body
XSamsung

A cybersecurity innovator with over 25 years of deep expertise across product, engineering, and research in both cyber-defense and offense. He was instrumental in shaping Samsung's cybersecurity strategy, a founding force at mobile security pioneer Zimperium, and is the visionary behind Provallo, revolutionizing cloud security with cost optimization.

Thierry Monster

CISO
Nederlandse Loterij

I am a senior professional in the field of internal control issues and organization-wide risk management. In recent years I have further specialized in information security issues. 

 

I prefer to work in a team in an environment with sufficient challenge. I am customer-oriented (helpful), pragmatic, creative and structured. With a completed Master's and Postdoc education, I have built a solid theoretical foundation. Over the past 15 years, I have enriched this basis with the necessary practical experience at a very wide variety of national and international organizations in various sectors.

Michiel Corbière

Systems Engineer
Abnormal Security

Michiel Corbière is a seasoned cybersecurity professional currently serving as a Systems Engineer at Abnormal Security, a leading AI-native platform specializing in human behavior security. In his role, he leverages machine learning and behavioral analytics to detect and prevent sophisticated email threats, including social engineering and account compromise attacks. Prior to joining Abnormal Security, Michiel held positions at other cybersecurity orgnisations, where he focused on zero trust architecture and cloud security solutions. He is an active participant in the cybersecurity community, contributing to industry events such as the Cyber Resilience Conference. Based in the Netherlands, Michiel is recognized for his expertise in modern threat detection and his commitment to advancing cyber resilience strategies.

Partners

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Apply for The C-Suite Edition

15th of May 2025


Welcome to the Next IT Security – May Edition in Amsterdam, the premier event where cybersecurity leaders and innovators converge to address the most pressing issues in the field. Our agenda is packed with insightful discussions and strategies to tackle the latest challenges and opportunities in cybersecurity.

  • Navigating NIS2 & DORA Compliance
    Regulatory frameworks like NIS2 and DORA are reshaping cybersecurity expectations across critical sectors. Gain expert insights on compliance strategies, risk management, and what these regulations mean for your organization’s resilience.
  •  Cybersecurity for Essential Sectors
    With essential services becoming prime targets for cyberattacks, protecting critical infrastructure has never been more vital. Learn how industries such as finance, energy, healthcare, and transportation are strengthening their cyber defenses against growing threats.
  • 2025 – The Year of Quantum Computing
    As quantum computing advances, it presents both unprecedented opportunities and threats to cybersecurity. Explore how organizations can prepare for the post-quantum era, from encryption strategies to the potential impact on cryptographic security.
  • Who Bears the Responsibility When Cloud Services Fail?
    Cloud infrastructure has become the backbone of modern IT operations, but outages and security breaches raise concerns about accountability. This session will dissect shared responsibility models, legal implications, and best practices for risk mitigation.
  • The Future of Cyber Supply Chains
    With increasingly interconnected global supply chains, cyber risks are more complex than ever. Discover how companies are securing their digital ecosystems, managing third-party risks, and ensuring supply chain resilience against evolving threats.

Join us in Amsterdam on May 15 for a deep dive into these critical topics, featuring expert discussions, real-world case studies, and opportunities to connect with the cybersecurity community.

Let’s shape the future of cybersecurity together!

Agenda

08:00

Registration

08:15

Power Breakfast

Spark meaningful conversations with peers over a curated breakfast.

Exchange perspectives on building cyber defenses for tomorrow’s threats.

08:55

Firestarter Zerto

09:00

At Europol, the European Cybercrime Center (EC3) is responsible for supporting all major investigations into cybercrime within the EU. From this position, EC3 has continuous and hands-on experience with the latest modus operandi as well as with methods how to counter them. This opening keynote will provide insights in how international law enforcement operates, how Europol works together with the private sector and what trends are to be expected.

Marijn Schuurbiers

Head of Operations
European Cybercrime Center - Europol (EC3)

09:25

GDPR. NIS2. DORA. The regulatory landscape is shifting beneath our feet. Are you prepared to handle the pressure?

This panel brings together top practitioners to explore how organizations can transform regulatory burden into structured frameworks. From scalable compliance models to balancing growth with legal obligations, you will hear actionable insights providing practical strategies to bridge the gap between regulation and implementation.

 Stay ahead of mandated requirements and overcome challenges in maintaining data sovereignty while enabling growth.

Erik Frambach

CISO
Rail & OV

Akansha Shukla

Cyber Security Domain
Expert.(Leading API Security)
ABN AMRO Bank

Deepankar Bhagat

Global IAM
ING Bank

Siegfried Moyo

Director, IT Security – (Deputy CISO)
Americold Logistics, LLC

10:00

  • Understand how to practically reduce your attack surface while reducing costs and achieving payback within 6 months
  • See how microsegmentation accelerates incident response, simplifies ongoing operations, and compares to traditional firewall segmentation
  • Get clear insights into the time, effort, and investment required to successfully deliver and maintain microsegmentation in your organisation

 

Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

10:20

Coffee Break & Networking

10:50

As AI adoption accelerates—with over 85% of organizations integrating AI into their environments—security and compliance risks in the cloud grow exponentially. This presentation outlines the critical challenges modern enterprises face in securing dynamic, multi-cloud environments that increasingly include AI technologies. It introduces a comprehensive approach to achieving continuous compliance and risk mitigation through visibility, compliance frameworks, and AI-specific security capabilities. Key topics include operationalizing compliance across cloud platforms, aligning AI development with frameworks like OWASP LLM Top 10, democratizing security through team collaboration, and utilizing automation to reduce critical risks. The session concludes with practical strategies to gain visibility, ensure data protection, and build secure AI pipelines that support innovation while staying compliant with evolving regulations.

Richard Hensen

Enterprise Solutions Engineer
Wiz

11:15

AI-driven business analytics utilizes sophisticated algorithms and machine learning methods to convert raw data into valuable insights. This innovative approach enables organizations to make well-informed decisions, streamline operations, and improve strategic planning.

Chandrashekhar Kachole

Chief Technology Officer

11:40

Supply chain vulnerabilities, multi-cloud platform risks, and vendor missteps inevitably shape our cyber landscape.

This candid discussion will delve into critical issues in supply chains, shared responsibility models in multi-cloud setups, and vendor risk management strategies that go beyond checklists.

Get a fresh update from another expert’s experience. Be ready to navigate the challenges of 2025 with actionable strategies.

Moderator: Kev Eley

Vice President UKI
Exabeam

Benjamin Bachmann

Director Group Information Security & Enterprise Architecture (aka CISO)
Bilfinger

Amit Sharma

Security Officer
ASR

Surinder Lall

SVP Global Information Security Risk Management at Paramount and Board Member
UK Government Cyber Security

Munish Sidana

Head of Information Security
Rhenus Logistics

12:10

Firestarter Tines

12:20

Lunch Break & Roundtable Discussions

13:20

In today’s rapidly evolving threat landscape, AI-enabled attackers are accelerating the speed and sophistication of cyber threats, outpacing reactive security solutions. Metrics of breaches, vulnerabilities, and time to exploit highlight the failure of defensive strategies alone. Offensive security flips the script, proactively simulating real-world attacks at scale to uncover root causes and reduce risk. This session explores how the future of offensive testing reveals not only vulnerabilities, but also why they’re created in the first place.

Jeff Barker

Senior Vice President Product
Synack

13:45

If critical infrastructure fails, the consequences ripple across nations. Public-private collaboration is of utmost necessity.

This panel explores innovative approaches to defending critical sectors from cascading effects of cyberattacks. 

Hear firsthand accounts of public-private collaboration, lessons from past breaches, and strategies for bolstering defenses across industries.

This is a renewed focus on resilience and the vital role of public-private partnerships in safeguarding critical infrastructure.

Patrick Ghion

Chief Cyber Strategy Officer
Geneva State Police & Head Regional Cyber Competence Center - Western Switzerland (RC3)

Trish McGill

Security IT/OT Manager
Illonix

Juan Diego Nocua Gualdron

CISO
Artsen zonder Grenzen Nederland

Victoria van Roosmalen

CISO & DPO
Coosto

14:20

Michiel Corbière

Systems Engineer
Abnormal Security

14:45

Firestarter Threatlocker

14:50

Coffee Break & Networking

15:20

Cyber threats are evolving — but so are the ways to stay protected. As attackers leverage AI, exploit supply chains, and target personal identities, organizations must stay ahead by understanding these trends and strengthening their security strategies. Join this session to explore the latest cybercrime tactics, discover practical defense measures, and learn how to build a more resilient security culture within your organization.

Pierre Noel

CISO
Bump

15:45

In the cloud, responsibility is shared. But where do the lines blur? This fireside chat will spark a crucial debate.

This engaging discussion will clarify the responsibilities shared between organizations and cloud providers. 

Explore how to improve collaboration to ensure seamless integration of security practices across various stakeholders, and discover emerging frameworks for trust in decentralized ecosystems.

Get a clear understanding of shared responsibility in the cloud and a framework for effective collaboration.

Thierry Monster

CISO
Nederlandse Loterij

Team Blue

Siegfried Moyo

Director, IT Security – (Deputy CISO)
Americold Logistics, LLC.

Team Red

16:20

  • Starting from the recent Trump administration that questioned the need for vulnerability disclosure. 
  • Introducing the CVE , celebrating 25 years, trends.
  • It is part of every cyber regulation including NIS2 and CRA 
  • Showing the limitation of focusing only vulnerabilities 
  • Fixes and updates are also risky for critical infrastructure.
  • Cost of vendors and their third parties to fix bugs
  • What about open source
  • Advice to the wise – become active and proactive 
  • Active – reduce risk, by reducing exposure and adding active controls.
  • Proactive – Intel and exposure analysis

Moshe Vered

Governing Body
XSamsung

16:45

Language models (LMs) are transforming industries, but they also introduce distinct security challenges that demand new approaches. This keynote highlights the most pressing risks: from passive and active data leaks, to adversarial attacks like prompt injection and input poisoning, and the emerging threats posed by autonomous models.

I will share real-world examples and mitigation strategies, along with model risk evaluation techniques to improve resilience.

Looking ahead, I’ll review how autonomous models may escalate risks through self-directed behavior and complex interactions, requiring proactive defenses.

  • Awareness of language model-specific security vulnerabilities
  • Overview of practical mitigation tactics
  • Insight into future threats from increasingly autonomous AI
  • A strategic outlook for securing generative AI systems

 

Nir Chervoni

Data Security & AI Leader

17:05

Book signing by Siegfired Moyo (Executive's Guide to Cyber Risk: Securing the Future Today)

Siegfried Moyo

17:45

Networking Banquet

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event