26/03/2024 – Toreon Cyber Café

26.03.24 5:30 PM

CYBER CAFÉ

Hosted by 

Toreon Data Protection Institute
Countdown Expired!

Cyber Café, powered by Toreon & Data protection Insitute

Last year, Toreon and Data Protection Institute joined forces to take our Cyber Café to the next level, and we’re happy to announce that we’re doing it all over again!

We’re excited to announce the third edition of our Cyber Café, which will take place on March 26, 2024!

Founded in 2013, Toreon has established itself as a leading force in the cybersecurity industry, safeguarding clients worldwide and sharing invaluable insights along the way. As part of our ongoing commitment to fostering a strong cybersecurity community, the Cyber Café was brought to life.

Relive the first edition:

An evening filled with cybersecurity topics

Just like last year, we’re relocating the event to bring more of you together in one place. For this Cyber Cafe, we’re delighted to welcome you to ‘Maneblussers City’, located at the newly built Malinas Park in Mechelen, so there will be no need to look for a parking spot! The doors to the Cyber Café will open at 17:30.

Naturally, our Cyber Café would be nothing without our exciting speakers ready to fill your evening with interesting cybersecurity stories. Up first is Tijl Deneut, an experienced Ethical Hacker and Security Lead at E-bo Enterprises, who will review the major differences between an IT and OT environment, and how a company can protect its OT assets. Our second speaker is Michaël Boeckx, CIO at Securex, with a track record of 20 years of IT experience with organizations such as NRB Group, VF Corporation, IRIS ICT, and IBM. During his talk, he will discuss how to create a controllable security practice whilst balancing the risks and budget. Please note that both talks will be held in Dutch.

We conclude our day with an evening café, providing everyone with the opportunity to network and engage with our Toreonites, while enjoying plenty of food and beverages, of course!

Tijl Deneut

How to Secure Your OT Assets: Understanding the Differences & Mitigating Risks.

During this session, Tijl will discuss the major differences between an IT and OT environment, what the risks and vulnerabilities are, and how these can easily be exploited. But foremost: how can a company protect its OT assets and engage in an OPSEC safe way to detect, prevent, and react towards these OT threats. Tijl Deneut has over 8 years of experience in the IT security sector and is an Ethical Hacker and an active EC-Council Certified Instructor. Tijl also teaches at the Howest University College and the Ghent University, where he also leads several research projects.

Tijl has had the privilege to present at several security events, including Info Security (Brussels) and BruCON, and was also the trainer of, amongst others, the Belgian Computer Crime Unit.

Michaël Boeckx

From the board room to the delivery organization: A testimonial on how to try to create a controllable security practice balancing risk and budget.

Boasting an impressive 20-year track record in IT across esteemed organizations like NRB Group, VF Corporation, IRIS ICT, and IBM, Michaël has held various executive roles, including CTO, CSO, and COO, demonstrating his versatility and expertise. Notable accomplishments include industrializing delivery platforms, scaling security service lines, and negotiating substantial supplier contracts.

His talk will focus on establishing a robust security practice while navigating risks and budget constraints, drawing from his extensive background in strategic collaboration and technology innovation.

The agenda

26.03.24 - 5:30 PM

17:30

Welcome

18:30

Talk:
Tijl Deneut

19:15

Small break

20:00

Talk:
Michaël Boeckx

20:45

Evening café

17:30

Welcome

18:30

Talk:
Tijl Deneut

19:15

Small break

20:00

Talk:
Michaël Boeckx

20:45

Evening café

How to book your spot

So, all you have to do is register through the form below to secure your spot at our Cyber Café! There is a maximum capacity, so make sure to sign up on time.

We look forward to sharing an evening packed with cybersecurity insights and knowledge-sharing.

Start typing and press Enter to search

Shopping Cart