Benelux

Amsterdam

November 13, 2025

"The price of security is eternal vigilance"
Thomas Jefferson

Media Partners

Click on the Fast Link buttons to learn more

Agenda

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Critical (Infrastructure) Sectors:
   Proactive Defense & Next-Gen Resilience

Cooperation Between Public & Private Sectors:
   Building Stronger Security Through Shared Resources

Human Centric Security:
   Training & Awareness Programs in your Organizations

AI Threat Intelligence:
   Understanding & Mitigating AI-Driven Attacks

Zero Trust in 2026 & Beyond
   Implementation in Modern Multi-Cloud Environments

Keynotes

Mario Beccia

Deputy CIO for Cybersecurity at NATO
Mario Beccia is NATO's Deputy CIO for Cybersecurity, responsible for leading major cybersecurity transformation programs. He holds a degree in Economics and Management, an MBA in innovation management, and multiple IT and cybersecurity certifications (PMP, CISM, CISSP, among others). His career began in 1997 with a start-up focused on web technologies. He later became an independent IT consultant before joining NATO in 2006. At NATO Allied Command Transformation, he contributed to key initiatives like the NATO Computer Incident Response Capability (NCIRC) and IT Modernization programs, as well as leading cybersecurity tracks in prominent NATO exercises and think tanks. In 2015, he transitioned to the NATO Communications and Information Agency, furthering NATO's cybersecurity infrastructure and fostering industry collaboration. He also served as Chief Information Security Officer at the European Defence Agency (2018–2021), spearheading cross-domain cybersecurity projects and organizing military CERT exercises. Since 2021, Mario Beccia has been driving NATO's enterprise cybersecurity strategy, ensuring coherence and enhanced ICT services across the organization.

Jelena Zelenovic Matone

CISO at European Investment Bank
CISO of the year award for 2019, Luxembourg. The Global Cyber Sentinel Award Winner 2020 for immense contribution to cybersecurity domain globally. CISO of the year Europe 2021. Versatile and innovative professional with emphasis on cyber security risk management, policies and procedures creation, IT/IS security, IT Operations, audit, risk mitigation, business process improvement and IT governance. Proven results in building internal and external client relationships, even at government levels for best cybersecurity practices, and driving growth in competitive and ever-changing markets. Proactive in assessing and responding to market and consumer trends. Highly effective at identifying and implementing business process improvements while safeguarding and adding to controls. Skilled at communicating effectively with clients, senior management and colleagues.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory at INTERPOL
Vincent Danjean is the Head of the Cyberspace and New Technologies Laboratory at INTERPOL, where he leads strategic efforts to understand and address the impact of emerging technologies on criminal behavior and investigative practices. With over 22 years of service at INTERPOL, he has held multiple leadership roles, including overseeing information security incident response and participating in internal governance as a member of the Joint Appeals Committee. Vincent is actively engaged in numerous international working groups and advisory boards, including the European Commission’s Fighting Crime and Terrorism Interest Group and the Global Forum on Cyber Expertise. He also contributes to ethical and scientific committees, including the Egregor initiative and the WWF/TRAFFIC UNITE Project focused on combating environmental crime through innovative technologies.

Fireside Chat

Jeroen Prinse

CISO at National Cyber Security Center Netherlands
He is absolutely passionated about shifting security left and integrating security in DevOps. Facilitating ‘the business’ with secure and compliant by design building blocks, security capabilities like secret management, automated security testing and other services. Since the mid 90’s he is an ethical hacker and he responsibly discloses vulnerabilities to companies and people in a way they understand. His highly analytical skills enable him to clarify complex problems quickly and come to pragmatic solutions. He is experienced in the technical and organizational aspects of information security, like (but not limited to): cloud security, secure software development, (automated) security testing, vulnerability management, (web) application security, network security, operational security, Secure DevOps, complex (information security) risk assessments, information security governance, information security management, being compliant with laws and regulations, information security standards and frameworks, identity and access management and writing and implementing information security policies/standards.

Predrag Vuckovic

CISO at Booking.com
Information security leader with 20+ years of experience in building effective security functions. Proven results in achieving and maintaining security and compliance requirements such as GDPR, ISO27001, BAIT, ZAIT, PCI DSS etc.

Holder of globally most recognized certifications including CISSP®, CISM®, Certified ISO 27001 Lead Auditor and more. Member of (ISC)2, ISACA and CSA chapters.

Round Table Chairman

Jurriën Norder

Head of NCC-NL
Jurriën Norder is the Head of NCC-NL, the Netherlands Cybersecurity Coordination Centre, where he leads national efforts to strengthen cybersecurity innovation, public-private collaboration, and international coordination. With extensive experience in both national government and international diplomacy, Jurriën previously held key roles at the Dutch National Cyber Security Centre (NCSC-NL) and the Ministry of Foreign Affairs, including posts in The Hague and abroad. His expertise spans international relations, policy strategy, and cybersecurity coordination across European networks.

Book Author

Ardie Kleijn

CISO at Dutch Land Registry, Kadaster
Author of the book
"How to Create a Risk-Aware Culture and Empowerment"

Partners

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Apply for The C-Suite Edition

13th of November 2025


Welcome to Next IT Security – C-Suites Edition in Amsterdam: The Most Exclusive Cybersecurity Event in the World.

On 13 November, Amsterdam will host a highly curated gathering of cybersecurity leaders, visionaries, and decision-makers from across Europe. Designed exclusively for C-level executives, this edition of Next IT Security will explore the most urgent challenges and innovations shaping the future of cyber resilience and strategy.

In this C-Suites edition, we dive into five business-critical focus areas:

Critical (Infrastructure) Sectors: Proactive Defense & Next-Gen Resilience
As nation-state threats escalate and infrastructures become more interconnected, resilience is no longer optional. This session will focus on preemptive defense strategies that secure critical sectors in an age of sophisticated disruption.

AI Threat Intelligence: Understanding & Mitigating AI-Driven Attacks
The rise of generative AI has created a new class of cyber threats. How can organizations build threat intelligence fast enough to detect and counter AI-enabled attacks? We will unpack strategies that blend human expertise with machine learning.

Zero Trust in 2026 & Beyond: Implementation in Modern Multi-Cloud Environments
Zero Trust is evolving. But are today’s implementations truly aligned with tomorrow’s architectures? Explore how leading organizations are navigating Zero Trust across distributed, cloud-first infrastructures.

Cooperation Between Public & Private Sectors: Building Stronger Security Through Shared Resources
Cyber defense is a shared responsibility. Join CISOs, regulators, and industry leaders as they discuss how trust, transparency, and collaboration can strengthen collective security at both national and organizational levels.

Human-Centric Security: Training & Awareness Programs in Your Organizations
Technology can only go so far—people remain your first and last line of defense. This track explores behavior-based security, executive engagement, and how to build impactful awareness programs that stick.

This is your invitation to engage in forward-thinking conversations, challenge conventional ideas, and help define the cybersecurity priorities for 2026 and beyond.

Agenda

08:00

Registration

08:15

Power Breakfast

Spark meaningful conversations with peers over a curated breakfast.

Exchange perspectives on building cyber defenses for tomorrow’s threats.

08:55

Firestarter

09:00

  • Analysis of the Current Threat Landscape:
    A deep dive into evolving cyber threats targeting essential infrastructure across Europe, including energy, transportation, healthcare, and communication sectors. Real-world insights from recent nation-state and criminal cyber campaigns.
  • Power of International Intelligence Collaboration:
    Learn how cross-border cooperation between law enforcement, defense, and private sector organizations enhances detection, prevention, and coordinated response to increasingly sophisticated threats.
  • From Reactive to Resilient:
    Explore why traditional reactive security models are no longer sufficient, and how forward-looking, intelligence-driven resilience strategies are essential to securing critical infrastructure in a hyper-connected, AI-driven world.

Mario Beccia

Deputy CIO for Cybersecurity
NATO

09:25

Mapping Shared Vulnerabilities Across Interconnected Systems:
The panel will examine how cyber risks in one critical infrastructure domain (e.g. energy, water, finance) can impact others, and why shared visibility and joint risk assessments are essential for early detection and coordinated response.

Breaking Down Silos Through Collaborative Defense Models:
Speakers will showcase how effective partnerships between government agencies, private operators, and international bodies can lead to smarter, faster, and more unified cybersecurity actions.

Pooling Resources for Smarter Investment in Preparedness:
Emphasis will be placed on joint threat intelligence platforms, shared cyber training programs, and co-funded resilience initiatives that strengthen collective defense without duplicating effort.

Victoria van Roosmalen

CISO & DPO
Coosto

Abhishek Goel

Information Security Lead
ABN AMRO Bank

Holger Spohn

CISO
Candriam

Nico Wortel

CISO
Amsterdamse Hogeschool voor de Kunsten

Andrew Byrd

Head CIS Security Office / CISO
NATO

10:00

  • Identifying Tomorrow’s Threats, Today:
    Discover how emerging risks—such as AI-powered attacks and supply chain intrusions—are reshaping the cybersecurity landscape for energy, transport, healthcare, and finance sectors.
  • Innovating with Intelligence:
    Explore how next-gen technologies like machine learning, zero-trust architecture, and threat intelligence platforms are driving proactive defense models and real-time response.
  • Business Value of Resilience:
    Understand how investing in security transformation reduces downtime, builds trust with stakeholders, and ensures compliance—turning cybersecurity into a strategic advantage.

Richard Meeus

Director of Security Technology and Strategy EMEA
Akamai

10:20

Coffee Break & Networking

10:50

Aligning Missions, Amplifying Response:
This session explores how unified cyber defense strategies between government agencies and private sector actors lead to faster, more coordinated responses to evolving digital threats.

Trust-Driven Intelligence Sharing:
Drawing from recent collaborations, we’ll examine how secure data exchange platforms, joint SOC initiatives, and shared situational awareness improve threat detection and reduce siloed efforts.

Building Resilience Through Policy and People:
Discover how long-term success in public-private cybersecurity partnerships depends on clear policy frameworks, trust-based governance models, and investment in cross-sector workforce training.

Jeroen Prinse

CISO
National Cyber Security Center Netherlands

Predrag Vuckovic

CISO
Booking.com

11:15

Enhanced Threat Intelligence Sharing:
This point will explore how the timely and transparent exchange of cyber threat information between government entities and private sector organizations significantly improves early detection and prevention of sophisticated cyberattacks, helping both sides stay ahead of emerging threats.

Coordinated Incident Response:
The panel will discuss how collaborative frameworks and joint response teams across public and private sectors enable quicker, more organized, and effective actions to contain and mitigate security breaches, minimizing damage and reducing recovery time.

Building Resilience Through Trust:
Focus will be on how cultivating mutual trust, aligning regulatory policies, and investing in continuous training and development of cybersecurity professionals are vital to creating sustainable, long-term partnerships that strengthen the overall security posture of critical infrastructure and national assets.

Ardie Kleijn

CISO
Dutch Land Registry, Kadaster

Amit Sharma

Cyber Security Officer
ASR

Aernout Reijmer

Former CSO
ASML

Sergio Ferrao

CISO
Tata Consultancy Services

Magdalena Panczyk

Policy Officer, Cyber and Hybrid Policy
NATO

11:50

Bridging the Gap Between Innovation and Policy:
Explore how vendors work hand-in-hand with government agencies to translate cutting-edge cybersecurity technologies into practical solutions that meet regulatory requirements and address real-world threats.

Collaborative Support and Shared Resources:
Highlight examples of how private companies provide critical expertise, threat intelligence, and advanced tools to public institutions, while benefiting from government insights, funding, and access to broader security frameworks.

Co-Creating Adaptive Cyber Defense Strategies:
Discuss the dynamic relationship where continuous feedback loops between public sector needs and vendor innovations accelerate the development of proactive defense mechanisms, ensuring resilient protection of critical infrastructure in a rapidly evolving threat landscape.

Dr. Mark Khur

Former Technical Director in NSA
and CTO & Co-Founder of Synack

12:10

Firestarter

12:15

Lunch Break & Roundtable Discussions

13:15

Building Lasting Security Habits:
This session will explore how well-designed and targeted training programs can move beyond simple awareness to foster consistent, proactive cybersecurity behaviors across all levels of an organization, significantly reducing risk and vulnerability over time.

Engaging and Empowering Employees:
Learn about innovative, interactive, and personalized training approaches that not only educate but also motivate employees to take ownership of cybersecurity, turning them into active participants in defending the organization against evolving threats.

Measuring Impact and Driving Continuous Improvement:
Discover best practices for evaluating the effectiveness of awareness and training programs through data-driven metrics, feedback loops, and adaptation strategies to ensure ongoing relevance and stronger organizational resilience.

Jelena Zelenovic Matone

CISO
European Investment Bank

13:40

Building a Culture of Cyber Awareness: The panel will explore how ongoing training programs and interactive workshops can foster a strong awareness of cybersecurity risks across all organizational levels. The focus will be on approaches that encourage employees to recognize threats, understand their role in protection, and actively participate in security practices.

Bridging the Gap Between Technology and People: The discussion will cover successful examples of integrating technological solutions with the human factor to reduce human error and improve incident detection and response efficiency. Panelists will share insights on engaging employees through clear communication channels and user-friendly tools.

Sustainable Engagement and Motivation Strategies: Long-term strategies for maintaining employee engagement in cybersecurity will be examined, including the use of gamification, incentives, and continuous empowerment. Special attention will be given to psychological and organizational factors that motivate employees to become proactive guardians of their digital environments.

Moderator: Jake Martens

CISO
Upwind

Thomas B. Zuliani

Global CISO
Arla Foods

Sümeyra Arda Çirpili

Cybersecurity Project Manager
Rabobank

Spandan Chandra

Information Security Manager
Ahold Delhaize

Daniela de Almeida Lourenço

Global CISO
Hunkemöller

Filip Nowak

Global Head of Cyber Defense
Ferrero

Gustavo Maniá

Regional CISO
The HEINEKEN Company

14:15

Practical guidance on crafting comprehensive training programs that go beyond traditional compliance checklists by prioritizing user engagement, relevance, and real-world applicability. These programs are designed to empower employees at all levels to become active cyber defenders who understand their critical role in organizational security. Emphasis is placed on tailoring content to address specific threats relevant to the organization’s industry and culture.

Detailed examples of innovative, interactive learning formats such as scenario-based simulations, gamified modules, and peer-to-peer workshops. These formats ensure that training resonates with diverse employee groups by adapting to varying organizational roles, learning styles, and cultural contexts. By personalizing the content, organizations can maximize participation, retention, and the practical application of cybersecurity best practices.

Insightful tips on measuring training effectiveness through data-driven metrics like behavior change, incident reduction, and engagement analytics. The session also highlights strategies for continuous program refinement, leveraging feedback loops, threat intelligence updates, and evolving workforce dynamics to keep awareness initiatives relevant and impactful over time. This approach helps organizations stay ahead of emerging cyber threats by fostering a proactive security culture.

Michiel Corbière

Systems Engineer
Abnormal Security

14:35

Firestarter

14:40

Coffee Break & Networking

15:10

Delve into practical approaches and proven methodologies for successfully implementing Zero Trust security models across complex, multi-cloud environments. Understand how to move beyond traditional perimeter defenses by adopting a continuous verification mindset that ensures every access request is authenticated and authorized in real time, regardless of location or device.

Discover cutting-edge innovations and technologies that enable seamless integration and dynamic policy enforcement across diverse cloud platforms, empowering organizations to maintain strong security postures while supporting agile and scalable infrastructure. Learn how automation, AI-driven analytics, and adaptive access controls play a crucial role in reducing risk and improving operational efficiency.

Gain actionable insights into measuring the effectiveness of Zero Trust adoption through continuous monitoring, compliance tracking, and feedback loops. Understand how aligning Zero Trust strategies with business objectives, fostering cross-team collaboration, and prioritizing user experience can drive long-term resilience and proactive defense against evolving cyber threats in a rapidly changing digital landscape.

Pierre Noel

CISO
Bump

15:35

CISOs must adapt their threat intelligence capabilities to account for AI-generated attacks such as deepfake phishing, autonomous malware, and large-scale misinformation campaigns.

Failure to act now risks blind spots in detection, significant response delays, and exposure to attacks that evolve faster than traditional defenses can handle.

By understanding how AI is used offensively, organizations can reshape their defensive posture. Intelligence-led, cross-sector strategies can close the gap between innovation and security.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory
INTERPOL

16:00

Harnessing AI to Predict Emerging Threats:
This session will explore how advanced AI algorithms analyze vast amounts of data from multiple sources in real-time to detect patterns and anomalies that signal novel cyber threats. By leveraging machine learning and natural language processing, organizations can gain foresight into attack vectors that traditional methods often miss, enabling proactive defense strategies.

Integrating AI into Threat Intelligence Workflows:
Learn how leading organizations are embedding AI-driven tools into their existing security infrastructures to automate threat detection, prioritization, and response. This bulletpoint covers best practices for combining human expertise with AI capabilities to maximize accuracy and speed, reduce false positives, and streamline decision-making in high-pressure environments.

Mitigating Risks of AI-Enabled Attacks:
As attackers also adopt AI to create more sophisticated and adaptive threats, this discussion focuses on understanding the dual-edged nature of AI in cybersecurity. Explore strategies for continuously updating AI models, fostering collaboration between AI researchers and security teams, and implementing adaptive defense mechanisms that evolve alongside emerging AI-powered attack techniques.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory
INTERPOL

16:25

Chairman Openings on Round Table Discussions

  • Zero Trust in 2026 & Beyond: Implementation in Modern Multi-Cloud Environments
  • AI Threat Intelligence: Understanding & Mitigating AI-Driven Attacks

Jurriën Norder

Head of NCC-NL
The Netherlands Cybersecurity Coordination Centre

16:35

Round Table Discussions

  • Zero Trust in 2026 & Beyond: Implementation in Modern Multi-Cloud Environments
  • AI Threat Intelligence: Understanding & Mitigating AI-Driven Attacks

Round table moderators:

Siegfried Moyo

Director IT Security (Deputy CISO)
Americold Logistics LLC

Abishek Goel

Information Security Lead
ABN AMRO BANK

Jim Lesseman

CISO & COO
Clear.bio

Moshe Vered

Governing Body
XSamsung

Amir Vashkover

Head of Data Security
Philips

Erbin Lim

Director of Engineering & Development
Pfizer

Edwin Sikkens

Chief Information Security Officer
Groningen Airport Eelde

Jan Rubingh

CIO at IT Director
Groningen Airport Eelde

Roelof Kroon

Cyber Risk Officer
Transdev

Burakhan Tahmaz

European Group Information Security Officer
KYOCERA Document Solutions Europe

17:35

Book signing by Ardie Kleijn

17:45

Networking Banquet

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event