TLC Connect - Benelux CISO Series

10th & 11th March 2026

Amsterdam

10th & 11th March 2026

Benelux CISO Summit

The TLC Connect Benelux CISO Summit brings together senior security leaders from across the region to confront the realities of an increasingly volatile cyber landscape. Over two days, CISOs, security heads and resilience leaders will explore practical strategies for strengthening organisational preparedness, navigating geopolitical uncertainty and enabling secure business growth. The programme combines real-world case studies, peer-led roundtables and executive discussions designed to deliver clarity, perspective and actionable outcomes.

Days
Hours
Minutes
Seconds
Key Themes for 2026

Resilient by Design: Embedding Security into Every Layer of the Enterprise

Cyber Resilience & Operational Continuity

Preparing for disruption with adaptive security models and enterprise-wide resilience planning

Threat Intelligence, Detection & Response

Enhancing visibility, anticipating attacker behaviour, and accelerating response across hybrid environments.

Identity, Access & Zero Trust Execution

Embedding identity-first security, continuous verification, and least-privilege controls across the organisation.

AI, Automation & Secure
Innovation

Implementing AI safely, reducing cyber workload with automation, and enabling secure digital transformation.

Past and Present Speakers

Speaker Name

Alan Lucas

CISO

Worldstream

Speaker Name

Andreas Galatoulas

CISO

De Heus Voeders B.V.

Speaker Name

Wouter Moors

Information Security Officer

Ministry of Justice

Speaker Name

Richard de Vries

Team Lead Blue Cyber Shield Team

Dutch Railway

Speaker Name

Michael Payne

Director Information Security

Landall

Speaker Name

Daniela Lourenco

Global CISO

Hunkemöller

Speaker Name

Andre Adelsba

VP, Group Information and Cyber Security

SES Satellites

Speaker Name

Peter Dorrington

Founder

XMplify Consulting Ltd

Elevate Your Security Dialogue

Summit Agenda Overview

Welcome to the TLC Connect Benelux CISO Summit 2026. Join senior cybersecurity and technology leaders as we unpack the forces reshaping the European threat landscape. Across two focused days, the Benelux CISO Summit examines regulatory change, AI-enabled threats, identity security, Zero Trust evolution, and the next generation of resilient security architectures.
This agenda is built to deliver clarity, accelerate decision-making, and equip CISOs with practical steps to strengthen enterprise-wide resilience.

11.30 - Registration

Arrival, registration and networking lunch

13:00 - Chair's Welcome

Welcome and Agenda Overview

Peter Dorrington – Founder – XMplify Consulting Ltd

13:05 -Headline Keynote: The Evolving Cyber Threat Landscape: Unpredictability and Preparedness

13:35 - Fireside Chat - Strategic Resilience: Leading Cybersecurity Through Global Uncertainty

14.10 - Customer Case Study Workshops - AI vs. AI: Defending Against Machine-Speed Attacks

14.55 - Networking Break & Vendor Exploration

14.10 - Customer Case Study Workshops - AI vs. AI: Defending Against Machine-Speed Attacks

15:15 - Safe AI, Strong Business: Building Trustworthy AI-Driven Enterprises (3 x 15 minutes case studies followed by panel Q&A)

16:15 - Roundtable Discussions

Roundtable Discussion 1: Third Party Risk in the Age of AI Vendors

AI vendors are rapidly entering supply chains, often with opaque models and unclear data practices. Traditional third party risk approaches struggle to assess and manage this new class of supplier.

Moderation Questions:

  1. What’s different about assessing AI vendors compared to traditional suppliers?
  2. How do you verify claims about data handling and model security?
  3. Should regulators mandate AI vendor transparency, or can industry self-regulate?
  4. What’s one control you would never compromise on with an AI supplier?

Roundtable Discussion 2: Insider Threats in Hybrid Workforces

Remote and hybrid work has blurred the boundaries of insider risk. Employees, contractors and partners can access critical systems from almost anywhere, while expectations of trust and privacy remain high.

Moderation Questions:

  1. What’s the most effective insider threat control you’ve implemented?
  2. How do you balance employee trust with monitoring and surveillance?
  3. Should insider threat programmes sit with HR, IT or Security?

Roundtable Discussion 3: Cybersecurity Benchmarking

Benchmarking maturity is essential, but many metrics are vanity figures that don’t drive better decisions. This discussion looks at how to measure what actually matters.

Moderation Questions:

  1. What’s the most meaningful benchmark you use internally?
  2. How do you compare maturity across different industries and geographies?
  3. Should benchmarking be standardised or remain sector-specific?

16.45 - Chair's closing remarks

18.30 - Networking Drinks

19.30 - Gala Dinner and Guest Speaker

08.00 - Registration & Networking Breakfast

08.50 - Chair's Opening and Day 1 Recap

09.00 - ENISA Keynote Regulatory Compliance

09.20 - Panel Discussion - Navigating the Stringent Regulatory Landscape: Governance, Risk Management and Compliance - Cyber Resilience Under Regulation (NIS2, DORA, national rules)On

09.50 - Platinum Keynote - Identity Under Siege: Protecting the New Perimeter

10.20 - Customer Case Study Workshops - Zero Trust at Scale: Lessons from the World’s Largest Cloud Security Deployments

10.40 - Case Study - Dutch Railway: The Cyber Weather Forecast

11.05 - Networking Break & Vendor Exploration

11.20 - Platinum Keynote - The Ransomware Economy: Disrupting the Business Model of Cybercrime

11.50 - Customer Case Study Workshops - The Rise of Machine Identities: Securing the Newest Attack Surface

12.15 - Customer Case Study Workshops - Quantum, Compliance, and the Next Decade of Cyber Risk

12.35 - Networking Lunch & Vendor Exploration

13.35 - Panel Discussion - From Blind Spots to Blueprints: Building Resilient Supply Chain Security

14.15 - Roundtable Discussions : Talent, Wellbeing, and Building Resilient Security Teams

Roundtable Discussion 1: From Burnout to Balance

The relentless pace of change and incident pressure is pushing many cyber teams towards burnout. Leaders must find ways to protect capacity without weakening defence.

Moderation Questions:

  1. Where are you seeing the highest burnout risk in your security organisation?
  2. What practical changes have you made to reduce overload without adding headcount?
  3. How do you make a credible case to the board for wellbeing as a risk factor?

Roundtable Discussion 2: Talent, Skills & Succession

Competition for experienced cyber talent remains fierce, while new skills are needed around cloud, AI and regulatory engagement.

Moderation Questions:

  1. Which roles are the hardest for you to hire or retain right now?
  2. How are you developing internal talent rather than relying solely on the market?
  3. What does a realistic succession plan for the CISO role look like?

Roundtable Discussion 3: The Evolving Role of the CISO

The CISO is no longer just a technical leader – the role now spans strategy, communication, regulation and culture.

Moderation Questions:

  1. How has your relationship with the board and executive team changed in the last 3 years?
  2. Where do you spend most of your time today – technology, people, or business strategy?
  3. What needs to change for the CISO role to be sustainable over the long term?

14.55 - Networking Break & Vendor Exploration

15.15 - Case Study - Ransomware Resilience: Prevention, Response, and Recovery

15.40 - Analyst Closing Keynote: Future-proofing cybersecurity: quantum risk, AI assurance, and Zero Trust at scale

16.05 - Chair's Closing Remarks & Key Takeaways

16.15 - Networking Drinks and Goodbye's

Past & Current Sponsors

Who Should Attend?

Designed for Security & Risk Leaders Strengthening Enterprise Resilience

CISOs & Security Leaders

Chief Information Security Officers, Directors of Security and Heads of Cyber responsible for steering organisational security strategy, reducing risk, strengthening resilience, and ensuring business continuity amid accelerating threats.

Risk, Governance & Compliance Leaders

Leaders overseeing cyber risk, GRC, audit and organisational oversight — focused on aligning security with regulatory expectations, strengthening governance frameworks, and building defensible decision-making structures.

Security Architecture & Engineering Leaders

Professionals designing and operating secure, scalable architectures across hybrid cloud, identity, network, and endpoint environments — tasked with reducing complexity, modernising controls, and enabling transformation at scale.

Threat, SOC & Incident Response Leaders

Heads of Threat Intelligence, SOC, Detection & Response, and Incident Management who are driving capability uplift, preparing for high-impact events, and adopting AI-enabled detection, automation, and proactive defence strategies.
Scroll to Top