Benelux

Amsterdam

November 13, 2025

Fully Booked

"The price of security is eternal vigilance"
Thomas Jefferson

Media Partners

Click on the Fast Link buttons to learn more

Agenda

Limited to 150
BIO C-Suites

WHY YOU SHOULD JOIN
OUR CONFERENCE

Focus:

Critical (Infrastructure) Sectors:
   Proactive Defense & Next-Gen Resilience

Cooperation Between Public & Private Sectors:
   Building Stronger Security Through Shared Resources

Human Centric Security:
   Training & Awareness Programs in your Organizations

AI Threat Intelligence:
   Understanding & Mitigating AI-Driven Attacks

Zero Trust in 2026 & Beyond
   Implementation in Modern Multi-Cloud Environments

Keynotes

Mario Beccia

Deputy CIO for Cybersecurity at NATO
Mario Beccia is NATO's Deputy CIO for Cybersecurity, responsible for leading major cybersecurity transformation programs. He holds a degree in Economics and Management, an MBA in innovation management, and multiple IT and cybersecurity certifications (PMP, CISM, CISSP, among others). His career began in 1997 with a start-up focused on web technologies. He later became an independent IT consultant before joining NATO in 2006. At NATO Allied Command Transformation, he contributed to key initiatives like the NATO Computer Incident Response Capability (NCIRC) and IT Modernization programs, as well as leading cybersecurity tracks in prominent NATO exercises and think tanks. In 2015, he transitioned to the NATO Communications and Information Agency, furthering NATO's cybersecurity infrastructure and fostering industry collaboration. He also served as Chief Information Security Officer at the European Defence Agency (2018–2021), spearheading cross-domain cybersecurity projects and organizing military CERT exercises. Since 2021, Mario Beccia has been driving NATO's enterprise cybersecurity strategy, ensuring coherence and enhanced ICT services across the organization.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory at INTERPOL
Vincent Danjean is the Head of the Cyberspace and New Technologies Laboratory at INTERPOL, where he leads strategic efforts to understand and address the impact of emerging technologies on criminal behavior and investigative practices. With over 22 years of service at INTERPOL, he has held multiple leadership roles, including overseeing information security incident response and participating in internal governance as a member of the Joint Appeals Committee. Vincent is actively engaged in numerous international working groups and advisory boards, including the European Commission’s Fighting Crime and Terrorism Interest Group and the Global Forum on Cyber Expertise. He also contributes to ethical and scientific committees, including the Egregor initiative and the WWF/TRAFFIC UNITE Project focused on combating environmental crime through innovative technologies.

Flavio Aggio

CISO at WHO (World Health Organisation)*
As Chief Information Security Officer (CISO), Flavio Aggio is responsible for Information Security and Cybersecurity at the World Health Organization (WHO). Additionally, he represents WHO in key forums focused on Information Security and Cybersecurity. With more than 30 years of experience in specialized chemical manufacturing, semiconductor, consumer product, government, and international organization industries, Flavio brings tremendous technical leadership and operational expertise to WHO. Prior to joining WHO, Flavio was the Chief Technology Officer at the City and County of San Francisco, where he developed technology solutions to modernize and protect the city. Before that, he held technical leadership positions in Enterprise Architecture, Project Management, Telecommunications, and IT operations with Unisys, ASML, Dow Chemical, and Rohm & Haas.

Fireside Chat

Jeroen Prinse

CISO at National Cyber Security Center Netherlands
He is absolutely passionated about shifting security left and integrating security in DevOps. Facilitating ‘the business’ with secure and compliant by design building blocks, security capabilities like secret management, automated security testing and other services. Since the mid 90’s he is an ethical hacker and he responsibly discloses vulnerabilities to companies and people in a way they understand. His highly analytical skills enable him to clarify complex problems quickly and come to pragmatic solutions. He is experienced in the technical and organizational aspects of information security, like (but not limited to): cloud security, secure software development, (automated) security testing, vulnerability management, (web) application security, network security, operational security, Secure DevOps, complex (information security) risk assessments, information security governance, information security management, being compliant with laws and regulations, information security standards and frameworks, identity and access management and writing and implementing information security policies/standards.

Predrag Vuckovic

CISO at Booking.com
Information security leader with 20+ years of experience in building effective security functions. Proven results in achieving and maintaining security and compliance requirements such as GDPR, ISO27001, BAIT, ZAIT, PCI DSS etc.

Holder of globally most recognized certifications including CISSP®, CISM®, Certified ISO 27001 Lead Auditor and more. Member of (ISC)2, ISACA and CSA chapters.

Round Table Chairman

Jurriën Norder

Head of NCC-NL
Jurriën Norder is the Head of NCC-NL, the Netherlands Cybersecurity Coordination Centre, where he leads national efforts to strengthen cybersecurity innovation, public-private collaboration, and international coordination. With extensive experience in both national government and international diplomacy, Jurriën previously held key roles at the Dutch National Cyber Security Centre (NCSC-NL) and the Ministry of Foreign Affairs, including posts in The Hague and abroad. His expertise spans international relations, policy strategy, and cybersecurity coordination across European networks.

Book Author

Siegfried Moyo

Director IT Security (Deputy CISO) - Americold Logistics LLC
Author of the book
"Executive's Guide to Cyber Risk: Securing the Future Today"

Partners

Ticket Price

990 €

Get your FREE ticket
with a PROMO CODE

Fully Booked
waiting list

Apply for The C-Suite Edition

13th of November 2025


Welcome to Next IT Security – C-Suites Edition in Amsterdam: The Most Exclusive Cybersecurity Event in the World.

On 13 November, Amsterdam will host a highly curated gathering of cybersecurity leaders, visionaries, and decision-makers from across Europe. Designed exclusively for C-level executives, this edition of Next IT Security will explore the most urgent challenges and innovations shaping the future of cyber resilience and strategy.

In this C-Suites edition, we dive into five business-critical focus areas:

Critical (Infrastructure) Sectors: Proactive Defense & Next-Gen Resilience
As nation-state threats escalate and infrastructures become more interconnected, resilience is no longer optional. This session will focus on preemptive defense strategies that secure critical sectors in an age of sophisticated disruption.

AI Threat Intelligence: Understanding & Mitigating AI-Driven Attacks
The rise of generative AI has created a new class of cyber threats. How can organizations build threat intelligence fast enough to detect and counter AI-enabled attacks? We will unpack strategies that blend human expertise with machine learning.

Zero Trust in 2026 & Beyond: Implementation in Modern Multi-Cloud Environments
Zero Trust is evolving. But are today’s implementations truly aligned with tomorrow’s architectures? Explore how leading organizations are navigating Zero Trust across distributed, cloud-first infrastructures.

Cooperation Between Public & Private Sectors: Building Stronger Security Through Shared Resources
Cyber defense is a shared responsibility. Join CISOs, regulators, and industry leaders as they discuss how trust, transparency, and collaboration can strengthen collective security at both national and organizational levels.

Human-Centric Security: Training & Awareness Programs in Your Organizations
Technology can only go so far—people remain your first and last line of defense. This track explores behavior-based security, executive engagement, and how to build impactful awareness programs that stick.

This is your invitation to engage in forward-thinking conversations, challenge conventional ideas, and help define the cybersecurity priorities for 2026 and beyond.

Agenda

08:00

Registration

08:15

Power Breakfast

Spark meaningful conversations with peers over a curated breakfast.

Exchange perspectives on building cyber defenses for tomorrow’s threats.

08:55

Firestarter Hadrian

09:00

  • Analysis of the Current Threat Landscape:
    A deep dive into evolving cyber threats targeting essential infrastructure across Europe, including energy, transportation, healthcare, and communication sectors. Real-world insights from recent nation-state and criminal cyber campaigns.
  • Power of International Intelligence Collaboration:
    Learn how cross-border cooperation between law enforcement, defense, and private sector organizations enhances detection, prevention, and coordinated response to increasingly sophisticated threats.
  • From Reactive to Resilient:
    Explore why traditional reactive security models are no longer sufficient, and how forward-looking, intelligence-driven resilience strategies are essential to securing critical infrastructure in a hyper-connected, AI-driven world.

Mario Beccia

Director Readiness and Operations for Cybersecurity and Digital Transformation
NATO

09:25

Mapping Shared Vulnerabilities Across Interconnected Systems:
The panel will examine how cyber risks in one critical infrastructure domain (e.g. energy, water, finance) can impact others, and why shared visibility and joint risk assessments are essential for early detection and coordinated response.

Breaking Down Silos Through Collaborative Defense Models:
Speakers will showcase how effective partnerships between government agencies, private operators, and international bodies can lead to smarter, faster, and more unified cybersecurity actions.

Pooling Resources for Smarter Investment in Preparedness:
Emphasis will be placed on joint threat intelligence platforms, shared cyber training programs, and co-funded resilience initiatives that strengthen collective defense without duplicating effort.

Abhishek Goel

Information Security Lead
ABN AMRO Bank

Holger Spohn

CISO
Candriam

Nico Wortel

CISO
Amsterdamse Hogeschool voor de Kunsten

Andrew Byrd

Head CIS Security Office / CISO
NATO

10:00

As critical infrastructure becomes increasingly connected, every exposed service, forgotten port, or unmanaged asset represents a potential breach point. Drawing on global internet intelligence and insights from Censys research, this session explores how visibility and continuous Attack Surface Management (ASM) are transforming cyber resilience.

We’ll examine what the latest exposure data reveals about the state of the internet, how attackers find and exploit misconfigurations within minutes, and what leaders can do to stay ahead. Discover how organizations can evolve from reactive defense to proactive resilience — securing the exposed edge before adversaries even arrive.

Martin Solang

Regional Director
Censys

Jonas Gyllenhammar

Senior Solutions Engineer
Censys

10:20

Coffee Break & Networking

10:50

Aligning Missions, Amplifying Response:
This session explores how unified cyber defense strategies between government agencies and private sector actors lead to faster, more coordinated responses to evolving digital threats.

Trust-Driven Intelligence Sharing:
Drawing from recent collaborations, we’ll examine how secure data exchange platforms, joint SOC initiatives, and shared situational awareness improve threat detection and reduce siloed efforts.

Building Resilience Through Policy and People:
Discover how long-term success in public-private cybersecurity partnerships depends on clear policy frameworks, trust-based governance models, and investment in cross-sector workforce training.

Jeroen Prinse

CISO
National Cyber Security Center Netherlands

Predrag Vuckovic

CISO
Booking.com

11:15

Enhanced Threat Intelligence Sharing:
This point will explore how the timely and transparent exchange of cyber threat information between government entities and private sector organizations significantly improves early detection and prevention of sophisticated cyberattacks, helping both sides stay ahead of emerging threats.

Coordinated Incident Response:
The panel will discuss how collaborative frameworks and joint response teams across public and private sectors enable quicker, more organized, and effective actions to contain and mitigate security breaches, minimizing damage and reducing recovery time.

Building Resilience Through Trust:
Focus will be on how cultivating mutual trust, aligning regulatory policies, and investing in continuous training and development of cybersecurity professionals are vital to creating sustainable, long-term partnerships that strengthen the overall security posture of critical infrastructure and national assets.

Moderator: Wibo Rigter

Sales Director Northern Europe
DataBee a Comcast Company

Amit Sharma

Cyber Security Officer
ASR

Aernout Reijmer

Former CSO
ASML

Sergio Ferrao

CISO
Tata Consultancy Services

Burakhan Tahmaz

European Group Information Security Officer
KYOCERA Document Solutions Europe

11:50

The battlefield has changed. We’re entering an age where defenders and attackers alike are deploying AI – creating an arms race defined by speed, autonomy and creativity. Attackers are already “vibe-coding” exploits: tuning generative models, crafting adaptive malware, leveraging AI-powered reconnaissance to zero-in on weaknesses faster than ever. At the same time, defenders must flip their playbook: from manually reactive to continuously adaptive AI-assisted defence. 

In this session, we’ll explore:

  • How AI is reshaping both attack and defence strategies.
  • Why the weaponisation of AI is accelerating.
  • What this means for your board-level strategy, cyber-operations roadmap and investment priorities.
  • How to stay ahead – not become the prey – in an AI-driven threat landscape.

 

Dr. Mark Kuhr

Former Technical Director in NSA
and CTO & Co-Founder of Synack

12:10

Firestarter KnowBe4

12:15

Lunch Break & Roundtable Discussions

13:15

Building Lasting Security Habits:
This session will explore how well-designed and targeted training programs can move beyond simple awareness to foster consistent, proactive cybersecurity behaviors across all levels of an organization, significantly reducing risk and vulnerability over time.

Engaging and Empowering Employees:
Learn about innovative, interactive, and personalized training approaches that not only educate but also motivate employees to take ownership of cybersecurity, turning them into active participants in defending the organization against evolving threats.

Measuring Impact and Driving Continuous Improvement:
Discover best practices for evaluating the effectiveness of awareness and training programs through data-driven metrics, feedback loops, and adaptation strategies to ensure ongoing relevance and stronger organizational resilience.

Flavio Aggio

CISO
WHO (World Health Organisation)

13:40

Building a Culture of Cyber Awareness: The panel will explore how ongoing training programs and interactive workshops can foster a strong awareness of cybersecurity risks across all organizational levels. The focus will be on approaches that encourage employees to recognize threats, understand their role in protection, and actively participate in security practices.

Bridging the Gap Between Technology and People: The discussion will cover successful examples of integrating technological solutions with the human factor to reduce human error and improve incident detection and response efficiency. Panelists will share insights on engaging employees through clear communication channels and user-friendly tools.

Sustainable Engagement and Motivation Strategies: Long-term strategies for maintaining employee engagement in cybersecurity will be examined, including the use of gamification, incentives, and continuous empowerment. Special attention will be given to psychological and organizational factors that motivate employees to become proactive guardians of their digital environments.

Moderator: Jake Martens

CISO
Upwind

Thomas B. Zuliani

Global CISO
Arla Foods

Sümeyra Arda Çirpili

Cybersecurity Project Manager
Rabobank

Daniela de Almeida Lourenço

Global CISO
Hunkemöller

Filip Nowak

Global Head of Cyber Defense
Ferrero

Gustavo Maniá

Regional CISO
The HEINEKEN Company

14:15

The modern IT leader is accustomed to using commonplace technology to propel change. Even though they affect every worker, every workflow, and every day, some of the most popular platforms are rarely viewed as change agents. What if the enterprise was taken into consideration when reimagining one of these essential tools? What impact would that have on productivity, security, and the nature of work itself?

Participate in this session to learn about:

  • Creating work environments that prioritize flexibility and productivity
  • Allowing unmanaged devices to have secure access without sacrificing control
  • Reevaluating the ways in which IT executives can empower users and generate distinctive business value

Filip Wijnholds

Solutions Engineer Director
Benelux

14:35

Firestarter Digicert

14:40

Coffee Break & Networking

15:10

Firestarter ThreatLocker

15:15

Leveraging AI agents to accelerate threat detection and response is about more than speed – it’s about precision, trust, and control. Success depends on ensuring these agents have access to the right data, operate within your governance and compliance standards, and can be deployed flexibly across the environments that matter most to you. This session will discuss how organisations can harness AI responsibly and effectively, creating a security ecosystem that is adaptive, resilient, and future-ready.

Tim Brophy

EMEA Field CTO
Elastic

15:40

CISOs must adapt their threat intelligence capabilities to account for AI-generated attacks such as deepfake phishing, autonomous malware, and large-scale misinformation campaigns.

Failure to act now risks blind spots in detection, significant response delays, and exposure to attacks that evolve faster than traditional defenses can handle.

By understanding how AI is used offensively, organizations can reshape their defensive posture. Intelligence-led, cross-sector strategies can close the gap between innovation and security.

Vincent Danjean

Head of Cyberspace and New Technologies Laboratory
INTERPOL

16:05

In an era where the perimeter has already been breached, the question is no longer whether – but how far an attacker can roam once inside. In this session we will explore a fundamentally different approach to securing the enterprise: automated microsegmentation and identity-centric zero trust, deployed in days, not years.

Key take-aways:

  • Why lateral movement remains the persistent weak link in ransomware and supply-chain attacks – and why traditional firewalls and VPNs no longer suffice.
  • How Zero Networks’ agentless microsegmentation platform enables organisations to isolate assets, identities and services – regardless of cloud, on-prem or OT/IoT environments.
  • A practical deployment blueprint: fast time-to-value, policy automation, set-and-forget operations – making microsegmentation an operational reality rather than a theoretical ideal.
  • Real-world lessons from Benelux-region use cases: compliance wins, audit transparency, reduced op-ex and measurable blast-radius reduction.
  • What forward-looking CISOs need to plan now: shifting from reactive threat detection to proactive containment, and how to align microsegmentation with zero-trust and SASE initiatives.

Pieter Wigleven

Director, Customer Engineering

16:30

Chairman Openings on Round Table Discussions

  • Zero Trust in 2026 & Beyond: Implementation in Modern Multi-Cloud Environments
  • AI Threat Intelligence: Understanding & Mitigating AI-Driven Attacks

Jurriën Norder

Head of NCC-NL
The Netherlands Cybersecurity Coordination Centre

16:40

Round Table Discussions

  • Zero Trust in 2026 & Beyond: Implementation in Modern Multi-Cloud Environments
  • AI Threat Intelligence: Understanding & Mitigating AI-Driven Attacks

Round table moderators:

Siegfried Moyo

Director IT Security (Deputy CISO)
Americold Logistics LLC

Abishek Goel

Information Security Lead
ABN AMRO BANK

Jim Lesseman

CISO & COO
Clear.bio

Moshe Vered

Governing Body
XSamsung

Erbin Lim

Director of Engineering & Development
Pfizer

Jan Rubingh

CIO
Clinias Dental Group in Breda

Roelof Kroon

Cyber Risk Officer
Transdev

Burakhan Tahmaz

European Group Information Security Officer
KYOCERA Document Solutions Europe

17:40

Book signing by Siegfried Moyo

18:00

Networking Banquet

Nordics Edition

C-Level IT Security Event

BeNeLux Edition

C-Level IT Security Event

DACH Edition

C-Level IT Security Event