Select your country

Not finding what you are looking for, select your country from our regional selector:

Search

Cybersec Europe | May 20 & 21, Brussels Expo

Navigate the unknown

Anticipate. Detect. Respond.

In the vast expanse of cyberspace, threats behave like black holes: unseen, unpredictable, and capable of pulling entire organizations into chaos. Just as astronauts train rigorously to face the unknown and mission control monitors every signal to ensure a safe journey, modern businesses must rely on precision, coordination, and resilience to stay secure.

To showcase this, we're taking over the Cybersec mainstage at this edition on May 21 to explore a question of growing geopolitical and strategic urgency: Can we still rely on our traditional cyber allies? More info here.

Fly from the mainstage to our booth for an experience that’s out of this world. We’re embarking on a cosmic journey with you through our Cyber Mission Control, which is built around three phases: anticipate, detect, respond.  

    Join us on May 21 & 22 to:

    • Experience live CERT & Cybersoc demos
    • Exchange of ideas with peers while enjoying a drink
    • Get expert advice on protect, detect and response approaches 
    • Get insights from our keynote speaker in the theaters on
      • Third Party Risk Management (TPRM)
      • In the absence of rules, strategy becomes everything
    • Catch us on the mainstage on cyber sovereignty in changing geopolitical landscapes

    Meet our speakers

    In the absence of rules, strategy becomes everything.

    Europe finds itself caught between a fragile dependency on American threat intelligence and mistrust of China, where visibility into cyber threats is virtually nonexistent. We've noticed cybersecurity trust is shifting, and some old rules no longer apply.

    But that doesn’t mean we’re powerless. This keynote takes a stoic view of what we can control: reducing our attack surface, defining and living by a risk standard, and preparing for attacks that, once they hit our turf, do follow our rules.

    No drama. Just clarity, pragmatism, and strategy in the face of chaos. A talk by Charl van der Walt, Head of the Security Research Center at Orange Cyberdefense. 

    May 21 | 3:15 PM May 22 | 3:15 PM

    You gotta fight for your right to third party!

    50% of security incidents are now linked to third parties. It's crucial to urgently reevaluate your third-party risk management strategy.

    This break-out session addresses the following key questions:

    • Which security standards should organisations and third parties follow?
    • Why is it critical to know where your data is stored and who can access it?
    • Why must incident response plans include suppliers?
    • Why are regular audits and clear evidence essential?

    Third-party relationships are growing as companies outsource services to boost performance. With rising regulations, compliance must shift from a burden to an opportunity for improvement. Success depends on a unified risk framework, strong processes, and resilient infrastructure.

    This presentation brings risk management to life with pop culture, music, and video, turning it into a chore you might genuinely enjoy in the future. ;-) A talk by Mathew Caplan, Head of International Professional Services at Orange Cyberdefense.

    May 21 | 2:30 PM May 22 | 2:30 PM

    Discover the demo's at our booth

    We’re simulating real-life attack situations at our booth. Test your reflexes, feel the pressure and discover how we keep control when everything’s on the line.

    CERT Demo

    Step into the shoes of a CISO facing a crisis. In this interactive CERT experience, you’ll be thrown into two high-stakes scenarios:

    • A credential leak exploited by cybercriminals

    • A vulnerability exploit threatening to compromise your systems

    You’ll need to make critical decisions—under pressure and in real time.

    Our CERT experts will be right there with you, unpacking each scenario and demonstrating how we leverage vulnerability intelligence, threat detection, and deep/dark web monitoring to anticipate and neutralize threats before they hit.

    Think fast. Act smart. See how it’s done.

    CyberSOC Demo

    Dive into two live attack scenarios showcasing how skilled cybercriminals exploit vulnerabilities, navigate laterally, and steal sensitive data.

    • The Access Broker: Explore how attackers use phishing emails and vulnerabilities to gain access, escalate privileges and exfiltrate critical information. This simulation highlights the tactics of Initial Access Brokers who sell access to ransomware groups and other malicious actors.
    • Cloud Credential Heist: See how attackers infiltrate a domain controller, inject malicious code into Azure AD Connect, and intercept cloud authentication credentials. This scenario demonstrates the risks of lateral movement, privilege escalation, and credential theft in cloud environments.

    You'll see how CyberSOC experts detect, analyze, and respond to these attacks in real-time, leveraging tools like Microsoft 365 Defender, Palo Alto Cortex XDR, and SIEM to turn cyber chaos into control.

    Mainstage Keynote

    Can we still rely on our traditional cybersecurity allies?

    On Wednesday, May 21 at 2:20 PM, Charl van der Walt, Head of Security Research, will take the mainstage at Cybersec to explore a timely and urgent topic: trust, sovereignty, and what true security really means. In a world that’s increasingly fragmented, Europe’s cybersecurity future hinges on moving beyond strategic dependency and building resilient, autonomous capabilities.

    This keynote will offer a pragmatic perspective on how European leaders and businesses can reduce risk: by diversifying their architectures, investing in local expertise, and forging alliances that respect sovereignty while embracing sustainable interdependence. In the years ahead, it won’t be isolation, but resilience, that defines Europe’s digital strength.

    Don't miss this talk. Add it to your Cybersec agenda

    Incident Response Hotline

    Facing cyber incidents right now?

    Contact our 24/7/365 world wide service incident response hotline.