TLC Connect - Benelux CISO Series
10th & 11th March 2026
Anantara Grand Hotel Krasnapolsky Amsterdam
Amsterdam
10th & 11th March 2026
Benelux CISO Summit
The TLC Connect Benelux CISO Summit brings together senior security leaders from across the region to confront the realities of an increasingly volatile cyber landscape. Over two days, CISOs, security heads and resilience leaders will explore practical strategies for strengthening organisational preparedness, navigating geopolitical uncertainty and enabling secure business growth. The programme combines real-world case studies, peer-led roundtables and executive discussions designed to deliver clarity, perspective and actionable outcomes.
Key Themes for 2026
Resilient by Design: Embedding Security into Every Layer of the Enterprise
Cyber Resilience & Operational Continuity
Preparing for disruption with adaptive security models and enterprise-wide resilience planning
Threat Intelligence, Detection & Response
Enhancing visibility, anticipating attacker behaviour, and accelerating response across hybrid environments.
Identity, Access & Zero Trust Execution
Embedding identity-first security, continuous verification, and least-privilege controls across the organisation.
AI, Automation & Secure
Innovation
Implementing AI safely, reducing cyber workload with automation, and enabling secure digital transformation.
Our Speakers
Alan Lucas
CISO
Worldstream
Trish McGill
Sr. SME Cyber Security
Royal De Heus
Wouter Moors
Information Security Officer
Ministry of Justice
Richard de Vries
Team Lead Blue Cyber Shield Team
Dutch Railway
Michael Payne
Director Information Security
Landal
Daniela Lourenco
Global CISO
Hunkemöller
Pascal van Verseveld
Chief Information Security Officer
PAY
Peter Dorrington
Founder
XMplify Consulting Ltd
Adrian Geismaier
ITS Information Security Director
Galapagos
Siegfried Moyo
Director Cyber | IT | AI Security
Americold Logistics
Jason Weissbein
CISO & General Counsel
GNX
Koen Hendrix
Director of Product Security
Zendesk
Gal Messinger
Head of Global Security
Signify (Philips Lighting)
Trevor Rudolph
VP Global Digital Policy and Regulation
Schneider Electric
Elevate Your Security Dialogue
Summit Agenda Overview
Welcome to the TLC Connect Benelux CISO Summit 2026. Join senior cybersecurity and technology leaders as we unpack the forces reshaping the European threat landscape. Across two focused days, the Benelux CISO Summit examines regulatory change, AI-enabled threats, identity security, Zero Trust evolution, and the next generation of resilient security architectures.
This agenda is built to deliver clarity, accelerate decision-making, and equip CISOs with practical steps to strengthen enterprise-wide resilience.
12.00 - Registration
Arrival, registration and networking lunch
13:00 - Chair's Welcome
Welcome and Agenda Overview
Peter Dorrington – Founder – XMplify Consulting Ltd
13:05 -Headline Keynote: The Evolving Cyber Threat Landscape: Unpredictability and Preparedness
The cyber threat landscape is shifting faster than most organisations can track. Geopolitical tension, supply chain disruption and increasingly professionalised attackers are creating a level of unpredictability that traditional, static risk models were never designed for.
This headline keynote will explore how CISOs and security leaders can prepare for the unexpected by building situational awareness, testing assumptions and designing security programmes that can flex under pressure rather than break. We’ll look at what “preparedness” really means when the next major incident is unlikely to look like the last.
13:35 - Fireside Chat - Strategic Resilience: Leading Cybersecurity Through Global Uncertainty
Global instability is reshaping the cybersecurity landscape. According to IDC, worldwide security spending is projected to grow by 12.2% in 2025, reaching $377 billion by 2028, as organisations grapple with increasingly complex and politically charged threat environments. Gartner highlights that non-executive directors now view cyber risk as a direct threat to shareholder value, yet many security functions still fail to adapt their strategies when business objectives shift.
Gartner’s 2025 cybersecurity trends also emphasise that resilience — embedding continuity and adaptability into security programmes — is now a top priority for CISOs. The message is clear: cybersecurity is no longer just about defence, it is about strategic resilience in the face of global uncertainty.
This panel will explore how cybersecurity leaders can:
• Anticipate and adapt to geopolitical disruptions, from sanctions to supply chain instability.
• Balance compliance and agility amid diverging regulatory regimes.
• Translate geopolitical risk into board-level strategy, ensuring cyber resilience is seen as a business enabler, not a cost centre.
Sr. SME Cyber Security
Royal De Heus
Chief Information Security Officer
PAY
Chief Information Security Officer
Worldstream
14.10 - Customer Case Study Workshops - AI vs. AI: Defending Against Machine-Speed Attacks
Generative AI is now powering both defenders and attackers. While security teams experiment with AI-driven analytics and automation, adversaries are using the same technologies to scale reconnaissance, craft convincing lures and launch machine-speed attacks.
These workshops will explore how leading organisations are defending against AI-enabled threats – from deepfakes and synthetic phishing to automated exploit chains. Attendees will hear practical examples of how to detect, disrupt and contain machine-speed attacks without overwhelming already stretched SOC teams.
Session: Customer Case Study Workshops – AI vs. AI: Defending Against Machine-Speed Attacks
14.35 - Customer Case Study Workshops - Securing the Edge: Protecting a Borderless Enterprise
As VPNs, IoT and edge devices become prime targets, the attack surface of the distributed enterprise continues to expand. This keynote examines how integrated network and endpoint security can reduce vulnerabilities, enforce policy consistency and protect critical infrastructure as organisations decentralise users, workloads and operations.
These workshops will explore how leading organisations are defending against AI-enabled threats — from deepfakes and synthetic phishing to automated exploit chains — while addressing the challenge of securing users and devices beyond the traditional perimeter. Attendees will hear practical examples of how to detect, disrupt and contain machine-speed attacks without overwhelming already stretched SOC teams.
Session: Customer Case Study Workshops – AI vs. AI: Defending Against Machine-Speed Attacks
14.55 - Networking Break & Vendor Exploration
15:15 - Panel Discussion - From Blind Spots to Blueprints: Building Resilient Supply Chain Security
Supply chain ecosystems have become one of the most exploited entry points for cyber adversaries. According to Gartner, 44% of organisations plan to substantially increase year-over-year spend on supply chain cybersecurity as digitalisation expands and risks multiply. Yet despite this investment, the complexity of multi-tier supplier networks continues to create significant blind spots.
Forrester and IDC both highlight that third- and fourth-party risks are now among the top three concerns for CISOs worldwide, with IDC projecting that by 2026, 45% of organisations will mandate evidence-based cyber resilience reporting from their suppliers.
This session will unpack these often “invisible” risks and explore:
• Practical frameworks for vendor risk management, Zero Trust adoption, and continuous monitoring.
• Collaborative defence models that shift supply chain security from a siloed effort to an ecosystem-wide imperative.
• Real-life learnings and actionable insights from complex supplier environments.
Global CISO
Hunkemöller
Director of Product Security
Zendesk
Director Information Security
Landal
16:15 - Roundtable Discussions
Roundtable Discussion 1: Third Party Risk in the Age of AI Vendors
AI vendors are rapidly entering supply chains, often with opaque models and unclear data practices. Traditional third party risk approaches struggle to assess and manage this new class of supplier.
Moderation Questions:
- What’s different about assessing AI vendors compared to traditional suppliers?
- How do you verify claims about data handling and model security?
- Should regulators mandate AI vendor transparency, or can industry self-regulate?
- What’s one control you would never compromise on with an AI supplier?
Roundtable Discussion 2: Insider Threats in Hybrid Workforces
Remote and hybrid work has blurred the boundaries of insider risk. Employees, contractors and partners can access critical systems from almost anywhere, while expectations of trust and privacy remain high.
Moderation Questions:
- What’s the most effective insider threat control you’ve implemented?
- How do you balance employee trust with monitoring and surveillance?
- Should insider threat programmes sit with HR, IT or Security?
Roundtable Discussion 3: Cybersecurity Benchmarking
Benchmarking maturity is essential, but many metrics are vanity figures that don’t drive better decisions. This discussion looks at how to measure what actually matters.
Moderation Questions:
- What’s the most meaningful benchmark you use internally?
- How do you compare maturity across different industries and geographies?
- Should benchmarking be standardised or remain sector-specific?
16.45 - Chair's closing remarks
18.30 - Networking Drinks
19.30 - Gala Dinner and Guest Speaker
08.00 - Registration
08.50 - Chair's Opening and Day 1 Recap
09.00 - ENISA Keynote Regulatory Compliance
European cybersecurity regulation is tightening fast. From NIS2 and DORA to national rules and sector-specific guidance, CISOs are expected to navigate an increasingly dense web of obligations while still enabling digital growth.
In this keynote, a representative from ENISA will outline the current and upcoming regulatory landscape, highlight where expectations are rising, and share practical guidance on how security leaders can turn compliance into a catalyst for stronger governance and resilience rather than a box-ticking exercise.
09.20 - Panel Discussion - Navigating the Stringent Regulatory Landscape: Governance, Risk Management and Compliance - Cyber Resilience Under Regulation (NIS2, DORA, national rules)On
European cybersecurity regulations are evolving rapidly, and frameworks such as NIS2, the Digital Operational Resilience Act (DORA), and the Cyber Resilience Act are reshaping roles, responsibilities, and expectations for boards and security leaders alike.
This session explores robust governance frameworks, risk management strategies, and compliance best practices required to safeguard organisational assets and reputations in an environment defined by constant change and heightened accountability.
Our panellists will discuss:
• Effective models for cybersecurity governance that embed security at the strategic level.
• Risk management approaches focused on early threat detection, continuous monitoring, and agile response.
• How to build a future-proof compliance strategy that adapts as regulations evolve.
Information Security Officer
Ministry of Justice
CISO & General Counsel
GNX
VP Global Digital Policy and Regulation
Schneider Electric
09.50 - Platinum Keynote - Identity Under Siege: Protecting the New Perimeter
Stolen credentials remain one of the most effective weapons in the attacker playbook. As organisations move to cloud, adopt SaaS at scale and support hybrid work, identity has become the new perimeter – and it is under constant attack.
This keynote will examine how to protect identities in a hyper-connected world: hardening authentication, detecting account takeover, addressing insider risk and defending against AI-powered phishing and social engineering. The focus is on practical controls that reduce real-world breach likelihood, not just theoretical models.
10.20 - Customer Case Study Workshops - Zero Trust at Scale: Lessons from the World’s Largest Cloud Security Deployments
Zero Trust has moved from buzzword to blueprint, but making it work across a complex enterprise is still challenging. Legacy systems, hybrid infrastructure and demanding users can quickly stall progress.
In these workshops, security leaders will share how they are implementing Zero Trust principles in the real world – segmenting critical assets, enforcing least privilege, reducing attack surfaces and measuring progress without compromising user experience or productivity.
10.40 - Case Study - Dutch Railway: The Cyber Weather Forecast
In an era where cyber threats grow ever more sophisticated, simply reacting to incidents is no longer sufficient. For the Security Operations Center at Nederlandse Spoorwegen (NS, Dutch Railways), gearing up for the NATO 2025 summit required a proactive, intelligence-driven approach, with preparation beginning months in advance.
Instead of waiting for incidents to occur, analysts proactively analysed logs, looking for early indicators of emerging threats. In parallel, NS’s Cyber Threat Intelligence teams gathered and assessed intelligence on adversaries that could target the organisation during the summit period.
Collaboration played a pivotal role throughout the process, both internally and externally. NS partnered closely with multiple security agencies to enable strong information sharing and coordinated responses to evolving risks. This multi-layered approach helped protect critical railway infrastructure and supported a safe, seamless travel experience for summit guests and daily commuters alike.
By embracing continuous improvement and anticipating adversarial tactics, NS’s SOC set a new benchmark for proactive cyber defence — demonstrating that vigilance and innovation are essential to staying one step ahead.
Team Lead Blue Cyber Shield Team
Nederlandse Spoorwegen
11.05 - Networking Break & Vendor Exploration
11.20 - Platinum Keynote - The Ransomware Economy: Disrupting the Business Model of Cybercrime
Ransomware groups now operate like mature enterprises, complete with supply chains, affiliate programmes and customer “support”. Paying or not paying is only one part of a much bigger strategic problem.
This keynote will unpack the modern ransomware economy, explain how attackers choose their targets and monetise access, and outline what effective defence looks like today: from hardening identity and backup strategies to intelligence sharing, rapid containment and executive-level playbooks.
11.50 - Customer Case Study Workshops - The Rise of Machine Identities: Securing the Newest Attack Surface
Cloud workloads, containers, IoT devices and automation pipelines have created an explosion of non-human identities. Each certificate, API key and service account is a potential entry point if not properly managed.
These workshops will explore how organisations are getting control of machine identities – discovering where they exist, enforcing lifecycle management, and preventing attackers from exploiting unmanaged or over-privileged machine credentials.
12.15 - Customer Case Study Workshops - Quantum, Compliance, and the Next Decade of Cyber Risk
Cloud workloads, containers, IoT devices and automation pipelines have created an explosion of non-human identities. Each certificate, API key and service account is a potential entry point if not properly managed.
These workshops will explore how organisations are getting control of machine identities – discovering where they exist, enforcing lifecycle management, and preventing attackers from exploiting unmanaged or over-privileged machine credentials.
12.35 - Networking Lunch & Vendor Exploration
13.35 - Safe AI, Strong Business: Building Trustworthy AI-Driven Enterprises (3 x 15 minutes case studies followed by panel Q&A)
As artificial intelligence rapidly reshapes the enterprise landscape, CISOs are under mounting pressure to balance innovation with responsibility. AI is moving faster than governance, controls, and organisational readiness.
PwC’s 2025 Global Digital Trust Insights Survey highlights that AI has emerged as the top cybersecurity investment priority, yet only 6% of organisations consider themselves “very capable” of withstanding cyberattacks across all vulnerabilities. This gap underscores the urgency for enterprises to adopt proven, real-world safeguards rather than experimental or theoretical controls.
This session will feature three 15-minute real-world case studies followed by a dynamic panel Q&A. Speakers will debate lessons learned, share practical safeguards, and explore what “AI-safe” truly means in the context of enterprise resilience.
Speakers:
Siegfried Moyo, Director Cyber | IT | AI Security, Americold Logistics
Gal Messinger, Head of Global Security, Signify (Philips Lighting)
Director Cyber | IT | AI Security
Americold Logistics
Head of Global Security
Signify (Philips Lighting)
14.15 - Roundtable Discussions : Talent, Wellbeing, and Building Resilient Security Teams
Roundtable Discussion 1: From Burnout to Balance
The relentless pace of change and incident pressure is pushing many cyber teams towards burnout. Leaders must find ways to protect capacity without weakening defence.
Moderation Questions:
- Where are you seeing the highest burnout risk in your security organisation?
- What practical changes have you made to reduce overload without adding headcount?
- How do you make a credible case to the board for wellbeing as a risk factor?
Roundtable Discussion 2: Talent, Skills & Succession
Competition for experienced cyber talent remains fierce, while new skills are needed around cloud, AI and regulatory engagement.
Moderation Questions:
- Which roles are the hardest for you to hire or retain right now?
- How are you developing internal talent rather than relying solely on the market?
- What does a realistic succession plan for the CISO role look like?
Roundtable Discussion 3: The Evolving Role of the CISO
The CISO is no longer just a technical leader – the role now spans strategy, communication, regulation and culture.
Moderation Questions:
- How has your relationship with the board and executive team changed in the last 3 years?
- Where do you spend most of your time today – technology, people, or business strategy?
- What needs to change for the CISO role to be sustainable over the long term?
14.55 - Networking Break & Vendor Exploration
15.15 - Case Study - Ransomware Resilience: Prevention, Response, and Recovery
Even with strong controls, ransomware remains a question of “when”, not “if”, for many organisations. The difference between disruption and disaster often comes down to preparation and rehearsal.
This case study will walk through a real-world ransomware scenario, highlighting what worked, what failed, and which investments made the biggest difference to containment and recovery. Attendees will leave with practical ideas to tighten their own resilience plans.
15.40 - Analyst Closing Keynote: Future-proofing cybersecurity: quantum risk, AI assurance, and Zero Trust at scale
The convergence of AI-driven threats, quantum disruption, and hybrid cloud complexity is reshaping the cybersecurity agenda. Accenture’s State of Cybersecurity Resilience 2025 reports that only 36% of technology leaders recognize that AI is outpacing their defences, yet 90% of enterprises lack the maturity to counter AI-enabled threats.
With global cybercrime costs projected to reach $10.5 trillion annually in 2025 (Cybersecurity Ventures), organisations are under pressure to adopt forward-compatible security architectures that can withstand both current and emerging threats.
Quantum computing looms as a systemic risk: RSA and ECC encryption could become obsolete within the decade, exposing sensitive data encrypted today to future compromise. At the same time, Zero Trust adoption is accelerating, with over 60% of large enterprises expected to implement it as a core strategy by 2025 — yet many still battle fragmented identity and access controls.
This closing keynote will map the path from pilot to production across secure AI lifecycle controls, quantum-resistant cryptography readiness, and pragmatic Zero Trust implementation in hybrid estates. Attendees will leave with a phased blueprint that balances innovation with verifiable assurance, grounded in practitioner-grade guidance and benchmarked against global research.
16.05 - Chair's Closing Remarks & Key Takeaways
Past & Current Sponsors
Who Should Attend?
Designed for Security & Risk Leaders Strengthening Enterprise Resilience
