InfoSec Dialogue Benelux

Radisson Blu Hotel Amsterdam Airport

08 June 2017 - 09 June 2017

Preparing for a new generation of protection and response

We can provide certificates of attendance to assist you in claiming for your CPE points

With recent breaches making front page news and new regulations looming, effective information security has become one of the most important challenges facing companies today. The increasing number and sophistication of attacks being launched, the increase in sharing of customer data and intellectual property with third-parties, along with maturing technologies such as cloud computing, mobile and big data, all place enormous demands on the Head of Information Security to develop and implement robust strategies to protect their business.

Infosec Dialogue Benelux, an invitation-only event designed to deliver outstanding knowledge-sharing and networking opportunities for Heads of IT Security, will analyse how to adapt strategies and successfully leverage new technologies to secure your business and guarantee its successful expansion.


The evolving strategic role of the CISO; how to prepare for the new EU data protection laws; how to apply security by design on IoE (Internet of Everything); gamification of Security by Design in an agile world; information security risk assessment & management - metrics, metrics, metrics; Europol’s role in combating cybercrime in the digital age; controlling intellectual property theft risks in your organisation - disrupting the CISO approach; take away APT strategies; overcoming governance & effective testing the effectiveness; managing information security throughout your supply chain; Internet of toys: how the next generation will intrude your home & enterprise networks - hackable Barbies, Smart TV’s, Cayla, MippoSaur and baby phones; securing & enabling your digital workspaces; identity and access management (IAM) in an era of digital business; how to demonstrate ROI from an Application Security Program; maximising your enterprise’s Internet security, compliance and productivity; among others.

Infosec Dialogue Benelux, now in its 5th edition is the exclusive, invitation-only event for C-Level information security executives in the Benelux region, operating under Chatham House rules to allow for frank and open discussion.

With a programme focusing on delivering high-value takeaways by combining case studies, workshops, roundtable discussions and tailored business interactions, Infosec Dialogue Benelux will enable you to:

  • ANTICIPATE emerging security threats and adapt your risk prevention and mitigation strategy
  • CREATE a global security awareness culture
  • REVIEW the most appropriate tools and technologies to protect your business from external cyber attacks and data leakage through third-party collaboration
  • ENSURE you communicate meaningful information security metrics to the board
  • BUILD a bridge between Information security and Internal audit to achieve business growth
  • ALLOCATE your budget to deliver maximum ROI
  • BENEFIT from pre-matched one-to-one meetings and other networking opportunities with experienced Information Security Executives



"Great event with excellent speakers and networking."

CISOHuisman Equipment BV

"Very well organized. Very interesting topic addressed but some speakers should know who is attending."

IT Manager, ING Investment Management - BE

"Good for networking & update on new products."

Project Manager ICT SecuritySligro Food Group N.V.

"Great event. The informal contacts with colleagues brings a lot of value."

Head of IRT, ING Belgium

speaker image

Walter Lecossois

Director, IT Risk and Security
UCB Pharma


Walter Lecossois is the Chief Information Security Officer for UCB Biopharma, a global pharmaceutical company with 9000 employees.  He is responsible for the worldwide Information Security program in a highly innovative and rapidly evolving environment.  In addition to spending most of his time on promoting security for UCB users, Walter also works on other regulatory and privacy-related topics.


Walter has 20 years of experience in Information Security.  Prior to joining UCB in 2013, he has worked as a security professional in the financial and telecom sector.

speaker image

Aernout Reijmer

Director IT Security
ASML Netherlands


Aernout  Reymer  is  an  internationally  recognised  Information  Security  Risk  Management Executive with  12 years experience in  Information Security Management.  He has worked and lived in the Netherlands, Germany, Sweden, France and the United Kingdom, and joined BT Global Services in 2001.  After 14 years, Aernout switched For ASML, the chipmachine manufacturing company where he now is Director of IT Security.  His mission is to enhance the IT Security and Cyber Resilience capabilities of ASML.

Aernout  is  passionate  about  creating  risk  conscious  cultures  where  risk  management  is embedded in the corporate decision-making through a well-managed governance structure and stakeholder management, allowing for transparency. 


Through  his  academic  background  in  both  Business  Management  as  well  as Telecommunication Engineering he sets ambitious goals for his teams that serve the business, translates ideas into results through technical solutions, and creates shareholder value. 

speaker image

Elly van den Heuvel

c / o National Coordinator for Counterterrorism and Security
Cyber Security Raad


Elly van den Heuvel is an experienced manager, who has had a long career within Dutch government. Van den Heuvel has held various positions at the Ministry of Security and Justice and  the Ministry of the Interior and Kingdom Relations.

In 2014 she was appointed Secretary to the  Dutch Cyber Security Council (CSR). The Dutch Cyber Security Council has 18 high level members from government, industry, and the scientific community. The CSR offers both solicited and unsolicited advice to the Cabinet. The Council also facilitates public-private dialogue on the complex matter of cyber security. Van den Heuvel represents the Council at meetings, conferences and commissions at national and international level. Maintaining an large global network in the cyber community, she is regularly invited to serve on advisory boards, and to perform as keynote speaker at national and international conferences. She has co-authored a number of publications on cyber security. Additionally, she is editor in chief of the Cyber Security Council magazine (CSR).

From 2008-2014, she was head of the National Cyber Security Centre (NCSC) and its predecessor GOVCERT.NL. During this period she focused on strengthening existing (inter)national joint ventures within the community. The NCSC  is formed as a public-private partnership. Building a strong  public private partnership had  her special attention. Added to her achievements were building a sturdy foundation of trust with all stakeholders. She was responsible for the operational coordination of large incidents (including DIGINOTAR) in the critical infrastructure. 

speaker image

Stefan van Gansbeke

CM/MC Health Insurance Fund Belgium


Stefan Van Gansbeke, is the Information Security Officer for the Christian health insurance fund (CM/MC). With more than 4.5 million members and 6.000 employees, CM is Belgium's largest compulsory health insurance organisation.

CM implemented an ISO 27000 inspired corporate cyber security policy, with a governance adapted to the federated structure of the organisation. An effective security strategy, business relevance, dashboarded security baselines and spicy awareness with a lean structure are the major ingredients. CM/MC is confronted with interesting challenges such as upcoming changes in privacy legislation, growing demand for Cloud & BYOx, big data and machine learning, adoption of Enterprise Risk Management, implementation of IAM/PIM, enforcing its BCM and facing cyber threats.

Stefan has been appointed as a Risk Officer for two related organisations requiring CBFA and Solvency II compliancy.

Stefan is regularly  invited to security roundtables and speaking opportunities such as EIC2015, IDC, ISACA, International Cyber Security Strategy Conference, CIO leadership summit, CIO net, Solvay Business School, AMS,…  

Stefan held different positions within  IT &  program  management and ‘DRY’ development for Capco, Lease Plan,  Smals & Scorpio.

Stefan holds a masters degree in Computer Science (VUB), is CISM certified ISACA member and also engages as ISSA-BE board advisor.


speaker image

Quentyn Taylor

Director of Information Security
Canon EMEA


Quentyn Taylor is Director of Information Security for Canon Europe.

He has a wealth of experience in both the IT and information security arenas and, in recent years, has focused his attention on building business relationships across the world.

Quentyn has driven Canon’s strategy to highlight the importance of document security and help business customers to minimise their security risk. Quentyn strongly believes in educating users about the importance of a comprehensive, overall security framework that will allow Canon’s business customers to improve security in a cost-effective way.

During his career, Quentyn has worked in a variety of industries for a number of organisations including outsourced service providers, Internet service providers as well as Dotcom businesses, before moving to Canon in 2000.

speaker image

Martijn Nykerk

IT Compliance Manager
Randstad Holding

speaker image

Michiel Benda

Group CISO
TMF Group BV

speaker image

John Fokker

Digital Team Coordinator
Politie Landelijke Eenheid (Netherlands Police Agency)


John Fokker leads a team of 15 analysts and investigators of the National High Tech Crime Unit(NHTCU), the Dutch federal police unit dedicated to investigating advanced forms of national and international cybercrime.  He is a project leader for the NoMoreRansom initiative, a public-private project founded by the NHTCU, Europol’s European Cybercrime Center, Kaspersky Lab and Intel Security, to disrupt cybercriminals spreading ransomware and to aid victims of ransomware. He started his career with the Netherlands Police Agency as a digital forensics investigator within a task force against organized crime. Prior to joining the national police, he served in the special ops and counterterrorism group of the Royal Netherlands Marine Corps. He took part in several deployments worldwide between 2004 and 2012. He started his career as an IP Engineer at Xantic, a satellite broadband Internet provider. He has a masters in criminal investigation and a BS in computer science. 

speaker image

Erik van de Sandt

Intelligence Analyst
Politie Landelijke Eenheid

speaker image

Kick Fronenbroek

Director Costumer Internet Security
Liberty Global

speaker image

Plamen Dimitrov

Jacob Douwe Egberts


Plamen is a versatile CISSP certified IT Security Officer who has both a broad and a deep knowledge of the field of information security. He is experienced IT security professional with 20+ years’ experience by delivering excellence in the Enterprise IT. He has solid background in Risk Management, Business Impact Analyses, Information Security, Infrastructure design and support, Service management and Outsourcing. He has worked in a multitude of roles and has experience with devising and arranging security organizations and policies, tactical and strategic security risk management and implementation of processes, procedures and security software. He has a very good grasp of the importance of security in business environments. This has given him the ability to perform in a multitude of security related roles e.g. as a security officer/manager, as a security consultant on topics ranging from strategic to operational level and facilitate and provide guide project managers on large security projects.  He is customer oriented and result driven, focused on the business goals, excellent communications skills. Very experienced in operations across multicultural environment, virtual teams and large organizations.

speaker image

Eric de Smedt

Manager Cyber Security

speaker image

Steven Wilson

Head of Business
EC3 (European Cyber Crime Centre at Europol)


Steven was a Police Officer in Scotland from 1985-2015. During this time, he served with Strathclyde Police, Scottish Crime and Drug Enforcement Agency, Her Majesty’s Inspectorate of Constabulary and, since 2013, with the reorganisation of policing in Scotland into a national force, Police Scotland. 

Steven performed a variety of senior Detective roles and was responsible for the national units in Scotland delivering: witness protection, covert technical policing, fugitives, undercover policing, assisting offender programme and all forms of cybercrime and cyber enabled crime including online child protection. 

Steven was the Scottish representative on UK cyber governmental and policing groups and led on industry and academic partnership groups on cyber resilience in Scotland.  

Steven has also worked in covert policing, major investigations, sex offender management, Counter Terrorism investigations and represented the UK on International policing matters. Steven commenced as Head of EC3 on 18 January 2016. 

speaker image

Jane Frankland

Managing Director
KnewStart & Author


Jane Frankland is an award winning entrepreneur, speaker and consultant. She is also an SC Awards Judge for Europe and the USA, and is one of the top 25 influencers in the UK cyber security market. Jane has 19-years worth of experience in cyber security, has built and sold her own global penetration testing firm, Corsaire, and held senior executive positions at several large PLCs, including the NCC Group. Over the years, through her companies, she has been actively involved in OWASP, CREST, and the Cyber Essentials Scheme, and has served as a Board Advisor for a CISO forum with over 170 senior cyber security leaders. Jane believes passionately in freedom, empowerment, and entrepreneurship, and through her new consultancy, Cyber Security Capital, she is helping cyber security individuals, corporate leaders and entrepreneurs meet their performance objectives. Her book, which is about women in security, is due for release in 2017.

speaker image

Ton Van Dijk

CISO Business Manager
ABN Amro


Ton is an experienced leader in a complex and international IT organisation. He has served in various roles in IT since 1990, of which 24 years in information security and 3 years in IT outsourcing and contract management. In his current role as the chief of staff to the CISO, he and his team drive the strategic development of information security with ABN AMRO.


speaker image

HP Schreinemachers

Directeur Analyse & Strategie/NCTV
Ministry of Security and Justice, The Netherlands


Please see InfoSec Benelux Dialogue Agenda below

To become a solution partner, please send an email to Chris Hugall at

Current Partners


Bomgar connects people and technology securely, providing leading privileged access management and remote support solutions that strengthen security while increasing productivity. Bomgar solutions help support and security professionals improve business performance by enabling secure, controlled access to any device or system, anywhere in the world.


Created to protect the most high-risk organizations in the world, Cyberbit secures enterprises and critical infrastructure against advanced cyber threats. The company’s battle-hardened cyber security solutions detect, analyze and respond to the most advanced, complex and targeted threats. Cyberbit employs a formidable and diverse team from both the public and private sector including PhDs, hackers, former CISOs and SOC managers, as well as seasoned veterans of the intelligence and military communities. With offices in Texas and Israel, Cyberbit is a subsidiary of Elbit Systems Ltd. (NASDAQ: ESLT) and has more than 500 employees in the United States, Europe and Asia.

Specialties: Endpoint Protection, SCADA Security, Security Operations Centre, Security Training and Simulation, and Critical Infrastructure Security.

DUO Security

We are Duo, and we’re here to democratize security. We were born from a hacker ethos and a desire to make the Internet a secure place. Our mission is to protect the mission of our customers by making security simple for everyone. Our team is our secret weapon. We’re a diverse crew of makers and builders, skaters and coders, filmmakers and DJ’s, teachers and students brought together by a shared belief in adding value to the world. That diversity allows us to bring an empathetic approach to solve some of the most complex global business and security challenges faced today. Our roots and values were forged in the Midwest. We believe in enabling and empowering people to follow their passion, inside and outside of the office. Change is a constant we anticipate and embrace. These are some of the things that make us unique and drive our team to be the most loved company in security.‎



FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,000 customers across 67 countries, including more than 650 of the Forbes Global 2000.


Forcepoint, powered by Ray theon, safeguards users, data and networks against the most determined adversaries, from accidental or malicious insider threats to outside attackers, across the entire threat lifecycle. Forcepoint protects data everywhere – in the cloud, on the road, in the office – simplifying compliance and enabling better decision-making and more efficient remediation. Forcepoint empowers organizations to concentrate on what’s most important to them while automating routine security tasks. More than 20,000 organizations around the world rely on Forcepoint. Based in Austin, Texas, with worldwide sales, service, security laboratories and product development, Forcepoint is a joint venture of the Raytheon Company and Vista Equity Partners.


Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. We are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organisations to control and secure their networks from the core—enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements. With Infoblox, organisations can protect against the rising flood of malware and cyberattacks that target networks; overcome complexity by creating a single point of control across traditional data centres as well as public and private cloud deployments; establish a single point of enforcement for security and compliance policies; and deliver actionable insights for making networks more reliable, efficient, and effective. Infoblox is headquartered in Santa Clara, California, and has operations in over 25 countries.

Juniper Networks

Juniper Networks enables its customers true advantage over their competition, whether that’s bringing new, revenue-generating services to market in minutes instead of months, reducing network costs, or providing security and protection for their most valuable assets. Juniper’s routing, switching, security, SDN, NFV and other software solutions can be used to meet your networking requirements in the following areas:

  • Data Center: all of the networking components for a Data Center from a few racks to the largest in the world
  • Wide Area Network: routing and security for all size sizes from a single branch to a high speed core network
  • Campus & branch: build a secure and reliable network right out to your employee
  • Security: moving beyond a perimeter based approach to a software defined secure network

The world’s biggest financial services organizations, wired and wireless service providers, cloud and data center providers run on Juniper Networks.

Why Juniper Networks? Quite simply, because we provide the kind of innovative thinking, performance, automation and commitment that enable the world’s best networks. If your business depends on the network to deliver mission-critical transactions, applications, and services, you do business with Juniper Networks. Now more than ever, the world relies on secure, high-performance networks that can scale to meet ever-changing business demands. And now more than ever, the world needs network innovation to unleash our full potential


Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing  complete visibility, enforcing sophisticated policies, and protecting data in cloud apps. The Netskope Active Platform performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can move fast, with confidence. Serving a broad customer base including leading healthcare, financial services, high technology, and retail enterprises, Netskope has been named to CIO Magazine's top 10 cloud security startups and featured in such business media as CBS News, Wall Street Journal, and Forbes. Netskope is headquartered in Los Altos, California. Visit us at and follow us on Twitter @Netskope.

The Netskope Cloud Confidence Index is a database of more than 5,000 cloud apps that Netskope has evaluated based on 35+ objective criteria adapted from Cloud Security Alliance guidance. These criteria indicate apps' enterprise-readiness, taking into consideration security, auditability, and business continuity. Each app is assigned a score of 0-100 and placed into one of five Cloud Confidence Levels - excellent, high, medium, low or poor. Netskope customers can use the Cloud Confidence Index score to make cloud app selection decisions, create custom criteria weightings in accordance with their business policies (e.g., weigh encryption of data at rest more heavily in the score), and enforce real-time policies based on Level (e.g., "Don't let users share content in cloud storage apps rated medium or below").


Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. 

Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. 

More than 2,000 customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.


PhishMe® is the leading provider of threat management for organizations concerned about human susceptibility to targeted attacks. PhishMe’s intelligence-driven solutions empower employees to be an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. PhishMe integrates into the security technology stack, delivering measurable results to help inform and adapt an organization’s security programs. PhishMe’s customers include the defense industrial base, energy, financial services, healthcare, and manufacturing industries, as well as other Global 1000 entities that understand changing user security behavior improves security, aids incident response, and reduces the risk of compromise.


Proofpoint protects people, data, and brands from today’s advanced threats and compliance risks. It’s a critical responsibility. And we’re looking for the best people in the business to help us: • Build and enhance our proven security platform

  • Blend innovation and speed in a constantly evolving cloud architecture
  • Analyze new threats and offer deep insight through data-driven intel
  • Collaborate with customers to help solve their toughest security challenges We are singularly devoted to helping our customers protect what matters most. That’s why we’re a leader in next-generation cybersecurity—and why more than half of the Fortune 100 trust us as a security partner.


The company’s singular focus is to develop and deliver solutions that protect data throughout its lifecycle without getting in the way of business. By leveraging the knowledge and experience of leading tokenisation specialists, Protegrity provides unprecedented levels of data security across Big Data clusters, Cloud environments, databases, mainframes, and virtually every other component of the heterogeneous enterprise.


Qualys, is a pioneer and leading provider of cloud-based security and compliance solutions with over 8,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organisations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organisations including Accenture, BT, Cognizant Technology Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, Infosys, NTT, Optiv, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).


More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. Armed with the industry’s most powerful tools, enterprises can better focus on growth, innovation and transformation in today’s volatile business environment.

Specialties: Security, Identity Assurance, Encryption, Key Management, Advanced Threats, Network Monitoring, Network Forensics, Security Analytics, and Adaptive Authentication

Dell SecureWorks

SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to predict, prevent, detect and respond rapidly to cyberattacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform – our advanced data analytics and insights engine – SecureWorks minimises risk and delivers actionable, intelligence-driven security solutions for clients around the world.

Skyhigh Networks

Skyhigh Networks helps organisations safely adopt cloud services while meeting security, compliance and governance requirements. Over 400 enterprises including BP, Astra-Zeneca, The Prudential and Swarovski gain visibility into all cloud services in use and their associated risk; analyse cloud usage to identify security breaches, compromised accounts and insider threats; and seamlessly enforce security policies with encryption, data loss prevention, contextual access control and activity monitoring for sanctioned cloud services such as Office 365,, Box & Google Drive


We deliver global managed security solutions to safeguard enterprises, combining powerful intelligence with an expansive breadth of services – from customisable threat protection, monitoring and analytics, rapid response and incident forensics, DDOS, perimeter security Advanced SOC services , audit, to identity management.

As one of the Fortune top 20 Global companies we have the capability to provide your cyber protection.

Business connections: a strong catalyst for success!

At the Noord Group, we understand the power of face-to-face interactions and their ability to inspire, drive change and do better business.

With this in mind, we individually approach all of our delegates to fully understand their expectations and participation goals. Based on the information collected, our dedicated business matching team devises a personalised itinerary featuring a variety of powerful business interactions such as:

  • One-to-one meetings with our Solution Partners so as to be introduced to the products and services most relevant to energise business growth
  • Quality interactions with other delegates during the frequent time-slots dedicated to participant networking

The event will also provide ample opportunities to mingle with peers in a casual set-up, including during:

  • Coffee breaks
  • Gala dinner
  • Luncheons

These relaxed, informal and interactive networking sessions will guarantee that you make enduring and mutually beneficial connections which will help you expand your network of contacts as well as your sphere of influence.

Ultimately, it is all about making you and your business thrive.