Program 2025 – Reception & opening

09:00 - 09:25 Reception
09:30 - 09:55 Limousin 3 Digital resilience is no longer an option – Prepare for the new reality Taco Kluwer, digital resilience manager at the National Inspectorate for Digital Infrastructure (RDI)

Lectures 10.00 – 10.25 am

10:00 AM – 10:25 AM Limousin 3 (EN) How to secure IT/OT convergence and regulatory compliance without compromising your operational stability TXOne Networks + Teijin Aramid
10:00 AM – 10:25 AM Dexter 15 to 18 (EN) A Cultural Shift: The Cyber Resilience Act (CRA) Bridges the Gap from Manufacturer to End User Rayen Riedel and Jeroen Heijkants – Framework
10:00 AM – 10:25 AM Dexter 21 to 24 Asset Discovery as the foundation; not only for OT Cyber Security, but also for Operational Resilience Erwin Schürmann – Claroty
10:00 AM – 10:25 AM Dexter 25 to 28 The Five ICS Cybersecurity Critical Controls Gert Ippel – Actemium – Axians

Morning break

10:30 – 11:25 am Morning break Time to network!

Lectures 11.30 – 11.55 am

11:30 – 11:55 am Dexter 15 to 18 (EN) From Factory Floor to Cloud Core: The Cloud Is Not Wrong in OT Joep van Heumen – iAUTOMATION
11:30 – 11:55 am Limousin 3 Cyber Resilience Act and IEC 62443: practical implementation of the new European requirements for industrial products Kevin Veldman – Hudson Cybertec – a Kiwa Company
11:30 – 11:55 am Dexter 21 to 24 Low-hanging fruit – OT security measures: easy, fast, effective and immediately applicable without major investments Bart Jan Witteveen and Edward van de Langemeen MODELEC
11:30 – 11:55 am Dexter 25 to 28 OT security in practice: detecting and responding to real threats Lex Crielaars – mnemonic

Lectures 12.00 – 12.25 hrs

12:00 – 12:25 Dexter 15 to 18 OT and IT, two disciplines, one cybersecurity mission Michael Theuerzeit – SEQRIT
12:00 – 12:25 Limousin 3 How do you demonstrate that your OT cybersecurity is in order? Practical experiences Sebastiaan Koning and Robbert Staal – ICT Group
12:00 – 12:25 Dexter 21 to 24 How to build Resilience Through Multi-Layered OT Cyber Security Arjan Aelmans – Fortinet
12:00 – 12:25 Dexter 25 to 28 Network architectures under the microscope: what works in practice? Thomas Vasen – HMS Networks

Lunch

12.30 – 1.25 pm Lunch

Lectures 1:30 – 1:55 PM

1:30 PM – 1:55 PM Dexter 15 to 18 The importance of risk management in relation to zoning Bastiaan Roodink – CS2 | Croonwolter&dros
1:30 PM – 1:55 PM Limousin 3 Security Levels according to IEC 62443: what's in it for you? Harm Geurink – Phoenix Contact
1:30 PM – 1:55 PM Dexter 21 to 24 One-way traffic to safety: Data diodes in industrial networks Rob Verseijden – Batenburg Technology
1:30 PM – 1:55 PM Dexter 25 to 28 (EN) Outsmarting Industrial Risk: The AI Advantage for OT & IoT Jeffrey Noya – Nozomi Networks

Lectures 2:00 – 2:25 PM

2:00 PM – 2:25 PM Dexter 15 to 18 From Passive Monitoring to Proactive Risk Management: A New Era in OT Security Harm Teerenstra – Armis
2:00 PM – 2:25 PM Limousin 3 NIS2 in Practice: your clear Guide to OT Compliance Nick Peeters – SoterICS
2:00 PM – 2:25 PM Dexter 21 to 24 How do you make OT monitoring understandable for technology and management? Peter van der Voort – OTconnect
2:00 PM – 2:25 PM Dexter 25 to 28 OT Kickstart: Practical step-by-step plan for an OT Cybersecurity Roadmap Frank Ruedisueli – Bureau Veritas Cybersecurity

Afternoon break

2:25 – 3:00 PM Afternoon break Time to network!

Lectures 3:00 – 3:25 PM

3:00 PM – 3:25 PM Dexter 15 to 18 Secure by Design: Translating Functional Safety Expertise into Cybersecurity Strategy Erik van Wouwe + Clemens van Wiggen, HIMA Benelux BV
3:00 PM – 3:25 PM Limousin 3 How to deal with NIS-2, CRA and Machine Safety Regulation Marcel Hulsen – Orange Cyberdefense and Klaas Wijbenga – Weidmüller
3:00 PM – 3:25 PM Dexter 21 to 24 (EN) EU Cybersecurity Compliance: A strategic path from the RED to the CRA Stan van Duijnhoven – IXON Cloud
3:00 PM – 3:25 PM Dexter 25 to 28 Discover how Digital Twins can strengthen your cybersecurity strategy Menno Cadee, Bert Willemsen – aXite Security Tools 

Closing & Networking drinks

3:30 PM – 3:55 PM Limousin 3 Are we as an industry really secure if we are 'compliant'? Huib Modderkolk, investigative journalist at De Volkskrant
4:00 PM – 4:30 PM Networking drinks
FHI, federatie van technologiebranches
nl_NLNederlands