{"id":24966,"date":"2024-07-09T20:12:10","date_gmt":"2024-07-09T18:12:10","guid":{"rendered":"https:\/\/fhi.nl\/?page_id=24966"},"modified":"2025-10-13T10:09:29","modified_gmt":"2025-10-13T08:09:29","slug":"programma","status":"publish","type":"page","link":"https:\/\/fhi.nl\/en\/industrialcybersecurity\/programma\/","title":{"rendered":"Industrial Cyber Security program"},"content":{"rendered":"<header id=\"header\" class=\"header header--medium header--branch\">\n\n\t\t\t\t\t\t\t\t\t\t<div class=\"header__background header__background--medium\">\n\t\t\t\t\t<img decoding=\"async\" class=\"header__background-image\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/09\/Cybersecurity-1-1728x1080.png\" alt=\"\">\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h6 class=\"header__subtitle\">Program<\/h6>\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tIndustrial Cyber Security\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__description\">\n\t\t\t\t\t\t\t<p>The program for the Industrial Cyber Security event 2026 is already being worked on hard.<br \/>\nSubscribe to the newsletter and stay informed!<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<a class=\"header__button button\" target=\"_self\" href=\"https:\/\/fhi.nl\/en\/industriele-automatisering\/nieuwsbrieven\/\">\n\t\t\t\t\t\t\tStay informed\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Program 2025 \u2013 Reception &amp; opening<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">09:00 - 09:25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Reception<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">09:30 - 09:55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Digital resilience is no longer an option \u2013 Prepare for the new reality<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Taco Kluwer, digital resilience manager at the National Inspectorate for Digital Infrastructure (RDI)<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/digitale-weerbaarheid-is-geen-optie-meer-bereid-je-voor-op-de-nieuwe-realiteit\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lectures 10.00 \u2013 10.25 am<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10:00 AM \u2013 10:25 AM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">(EN) How to secure IT\/OT convergence and regulatory compliance without compromising your operational stability<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">TXOne Networks + Teijin Aramid<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/en-how-to-secure-it-ot-convergence-and-regulatory-compliance-without-compromising-your-operational-stability\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10:00 AM \u2013 10:25 AM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 15 to 18<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">(EN) A Cultural Shift: The Cyber Resilience Act (CRA) Bridges the Gap from Manufacturer to End User<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Rayen Riedel and Jeroen Heijkants \u2013 Framework<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/een-cultuuromslag-cra-trekt-fabrikanten-over-de-kloof-van-producent-naar-de-klant\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10:00 AM \u2013 10:25 AM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 21 to 24<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Asset Discovery as the foundation; not only for OT Cyber Security, but also for Operational Resilience<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Erwin Sch\u00fcrmann \u2013 Claroty<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/asset-discovery-als-het-fundament-niet-alleen-voor-ot-cyber-security-maar-ook-voor-operational-resilience\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10:00 AM \u2013 10:25 AM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 25 to 28<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The Five ICS Cybersecurity Critical Controls<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Gert Ippel \u2013 Actemium \u2013 Axians<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/the-five-ics-cybersecurity-critical-controls\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Morning break <\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">10:30 \u2013 11:25 am<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Morning break <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Time to network!<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lectures 11.30 \u2013 11.55 am<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11:30 \u2013 11:55 am<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 15 to 18<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">(EN) From Factory Floor to Cloud Core: The Cloud Is Not Wrong in OT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Joep van Heumen \u2013 iAUTOMATION<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/en-from-factory-floor-to-cloud-core-de-cloud-is-niet-fout-in-ot\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11:30 \u2013 11:55 am<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Cyber Resilience Act and IEC 62443: practical implementation of the new European requirements for industrial products<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Kevin Veldman \u2013 Hudson Cybertec \u2013 a Kiwa Company<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/cyber-resilience-act-en-iec-62443-praktische-invulling-van-de-nieuwe-europese-eisen-voor-industriele-producten\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11:30 \u2013 11:55 am<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 21 to 24<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Low-hanging fruit \u2013 OT security measures: easy, fast, effective and immediately applicable without major investments<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Bart Jan Witteveen and Edward van de Langemeen MODELEC<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/laaghangend-fruit-ot-securitymaatregelen-makkelijk-snel-effectief-en-zonder-grote-investeringen-direct-toepasbaar\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">11:30 \u2013 11:55 am<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 25 to 28<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">OT security in practice: detecting and responding to real threats<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Lex Crielaars \u2013 mnemonic<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/unpacking-frostygoop-ot-malware-dissection-detection\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lectures 12.00 \u2013 12.25 hrs<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12:00 \u2013 12:25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 15 to 18<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">OT and IT, two disciplines, one cybersecurity mission<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Michael Theuerzeit \u2013 SEQRIT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/ot-and-it-two-disciplines-one-cybersecurity-mission\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12:00 \u2013 12:25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">How do you demonstrate that your OT cybersecurity is in order? Practical experiences<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Sebastiaan Koning and Robbert Staal \u2013 ICT Group<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/hoe-toon-je-aan-dat-je-ot-cybersecurity-geregeld-is-ervaringen-uit-de-praktijk\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12:00 \u2013 12:25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 21 to 24<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">How to build Resilience Through Multi-Layered OT Cyber Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Arjan Aelmans \u2013 Fortinet<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/how-to-build-resilience-through-multi-layered-ot-cyber-security\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12:00 \u2013 12:25<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 25 to 28<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Network architectures under the microscope: what works in practice?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Thomas Vasen \u2013 HMS Networks <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/netwerkarchitecturen-onder-de-loep-wat-werkt-in-de-praktijk\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lunch <\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">12.30 \u2013 1.25 pm<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Lunch <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lectures 1:30 \u2013 1:55 PM<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">1:30 PM \u2013 1:55 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 15 to 18<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">The importance of risk management in relation to zoning<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Bastiaan Roodink \u2013 CS2 | Croonwolter&amp;dros<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/het-belang-van-riskmanagement-in-relatie-tot-zonering\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">1:30 PM \u2013 1:55 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Security Levels according to IEC 62443: what&#039;s in it for you?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Harm Geurink \u2013 Phoenix Contact<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/security-levels-volgens-iec-62443-wat-heb-jij-daar-aan\/\" target=\"_self\"><span class=\"table__link--text\">Security Levels according to IEC 62443: what&#039;s in it for you?<\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">1:30 PM \u2013 1:55 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 21 to 24<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">One-way traffic to safety: Data diodes in industrial networks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Rob Verseijden \u2013 Batenburg Technology<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/eenrichtingsverkeer-naar-veiligheid-data-diodes-in-industriele-netwerken\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">1:30 PM \u2013 1:55 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 25 to 28<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">(EN) Outsmarting Industrial Risk: The AI Advantage for OT &amp; IoT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Jeffrey Noya \u2013 Nozomi Networks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/outsmarting-industrial-risk-the-ai-advantage-for-ot-iot\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lectures 2:00 \u2013 2:25 PM<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">2:00 PM \u2013 2:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 15 to 18<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">From Passive Monitoring to Proactive Risk Management: A New Era in OT Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Harm Teerenstra \u2013 Armis<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/strengthening-ot-security-from-visibility-to-actionable-risk-mitigation\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">2:00 PM \u2013 2:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">NIS2 in Practice: your clear Guide to OT Compliance<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Nick Peeters \u2013 SoterICS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/nis2-in-practice-your-clear-guide-to-ot-compliance\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">2:00 PM \u2013 2:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 21 to 24<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">How do you make OT monitoring understandable for technology and management?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Peter van der Voort \u2013 OTconnect<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/hoe-maak-je-ot-monitoring-begrijpelijk-voor-techniek-en-management\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">2:00 PM \u2013 2:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 25 to 28<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">OT Kickstart: Practical step-by-step plan for an OT Cybersecurity Roadmap<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Frank Ruedisueli \u2013 Bureau Veritas Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/ot-kickstart-praktisch-stappenplan-voor-een-ot-cybersecurity-roadmap\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Afternoon break <\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">2:25 \u2013 3:00 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Afternoon break <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Time to network!<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--white\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Lectures 3:00 \u2013 3:25 PM<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">3:00 PM \u2013 3:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 15 to 18<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Secure by Design: Translating Functional Safety Expertise into Cybersecurity Strategy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Erik van Wouwe + Clemens van Wiggen, HIMA Benelux BV<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/hoe-bereik-je-een-safe-en-secure-data-transfer-in-het-ot-domein-en-naar-buiten-toe\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">3:00 PM \u2013 3:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">How to deal with NIS-2, CRA and Machine Safety Regulation<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Marcel Hulsen \u2013 Orange Cyberdefense and Klaas Wijbenga \u2013 Weidm\u00fcller <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/how-to-deal-with-nis-2-cra-and-machine-safety-regulation\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">3:00 PM \u2013 3:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 21 to 24<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">(EN) EU Cybersecurity Compliance: A strategic path from the RED to the CRA<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Stan van Duijnhoven \u2013 IXON Cloud<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/en-eu-cybersecurity-compliance-a-strategic-path-from-the-red-to-the-cra\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">3:00 PM \u2013 3:25 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Dexter 25 to 28<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Discover how Digital Twins can strengthen your cybersecurity strategy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Menno Cadee, Bert Willemsen \u2013 aXite Security Tools\u00a0<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/ontdek-hoe-digital-twins-uw-cybersecuritystrategie-kan-versterken-2\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>\n\n\n\n\t<div class=\"table__wrapper table__wrapper--offwhite\">\n\t\t<div class=\"container\">\n\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='table__title'>Closing &amp; Networking drinks<\/h2><\/div>\t\t\t\t\t\t\t\t\t<table class=\"table\">\n\t\t\t\t\t\t<colgroup>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--2\">\n\t\t\t\t\t\t\t\t\t\t\t<col class=\"table__col--link\">\n\t\t\t\t\t\t<\/colgroup>\n\t\t\t  \t\t\t\t  \t\t\t\t\t\t\t\t<thead class=\"table__head\">\n\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--1\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<th class=\"table__heading table__heading--2\"><\/th>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t<\/thead>\n\t\t\t  \t\t\t  \t\t\t\t\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">3:30 PM \u2013 3:55 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Limousin 3<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Are we as an industry really secure if we are &#039;compliant&#039;?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__subtext\">Huib Modderkolk, investigative journalist at De Volkskrant<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3 table__cell--link\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"table__link\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/zijn-we-als-industrie-echt-goed-beveiligd-als-we-compliant-zijn\/\" target=\"_self\"><span class=\"table__link--text\"><\/span><span class=\"table__link--arrow\"><svg width=\"27\" height=\"14\" viewbox=\"0 0 27 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M19.031 1.043 25 7l-5.968 5.956M1.587 7H25\" stroke=\"#000\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg><\/span><\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<tr class=\"table__row\">\n\t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">4:00 PM \u2013 4:30 PM<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"table__text\">Networking drinks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t\t\t\t<td class=\"table__cell table__cell--3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t  \t\t\t\t\t  \t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tbody>\n\t\t\t  \t\t\t\t\t<\/table>\n\t\t\t\t<\/div>\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":0,"parent":22797,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"branches":[12],"events":[352],"secretariat":[],"categories":[],"themes_tax":[],"class_list":["post-24966","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial Cyber Security - programma - FHI, federatie van technologiebranches<\/title>\n<meta name=\"description\" content=\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/programma\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cyber Security - programma - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:description\" content=\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/industrialcybersecurity\/programma\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T08:09:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/\",\"url\":\"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/\",\"name\":\"Industrial Cyber Security - programma - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"datePublished\":\"2024-07-09T18:12:10+00:00\",\"dateModified\":\"2025-10-13T08:09:29+00:00\",\"description\":\"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial Cyber Security\",\"item\":\"https:\/\/fhi.nl\/industrialcybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Industrial Cyber Security &#8211; programma\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cyber Security - program - FHI, federation of technology industries","description":"Step into the world of cybersecurity during the Industrial Cybersecurity Event organized by FHI. This meeting highlights the most pressing cybersecurity issues in the industry. Discover whether your company is sufficiently &#039;cyber secure&#039; and identify challenges in the crucial collaboration between IT and OT departments. Learn how to benefit from digital innovations while maintaining control over information security, and discover how to apply regulations, including implementing relevant standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/industrialcybersecurity\/programma\/","og_locale":"en_GB","og_type":"article","og_title":"Industrial Cyber Security - programma - FHI, federatie van technologiebranches","og_description":"Stap binnen in de wereld van cybersecurity tijdens het Industrial Cybersecurity Event georganiseerd door FHI. Deze bijeenkomst belicht de meest urgente kwesties omtrent cyberbeveiliging in de industrie. Ontdek of jouw bedrijf voldoende \u2018cyber secure\u2019 is en identificeer uitdagingen in de cruciale samenwerking tussen IT- en OT-afdelingen. Leer hoe je kunt profiteren van digitale innovaties terwijl je de grip op informatiebeveiliging behoudt, en ontdek hoe je regelgeving toepast, inclusief het implementeren van relevante normen.","og_url":"https:\/\/fhi.nl\/en\/industrialcybersecurity\/programma\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2025-10-13T08:09:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/","url":"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/","name":"Industrial Cyber Security - program - FHI, federation of technology industries","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"datePublished":"2024-07-09T18:12:10+00:00","dateModified":"2025-10-13T08:09:29+00:00","description":"Step into the world of cybersecurity during the Industrial Cybersecurity Event organized by FHI. This meeting highlights the most pressing cybersecurity issues in the industry. Discover whether your company is sufficiently &#039;cyber secure&#039; and identify challenges in the crucial collaboration between IT and OT departments. Learn how to benefit from digital innovations while maintaining control over information security, and discover how to apply regulations, including implementing relevant standards.","breadcrumb":{"@id":"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/industrialcybersecurity\/programma\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/industrialcybersecurity\/programma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Industrial Cyber Security","item":"https:\/\/fhi.nl\/industrialcybersecurity\/"},{"@type":"ListItem","position":3,"name":"Industrial Cyber Security &#8211; programma"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/24966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/comments?post=24966"}],"version-history":[{"count":174,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/24966\/revisions"}],"predecessor-version":[{"id":74077,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/24966\/revisions\/74077"}],"up":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/22797"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=24966"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=24966"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=24966"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=24966"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=24966"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=24966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}