Subscribe now to our BE-CYBER Experience Sharing Day

In the European Cyber Security Month (ECSM), the Belgian Cyber Security Coalition organizes a BE-CYBER experience sharing event for its members in Brussels. BE-CYBER stands for the Belgian trust-based platform, which we offer to our members emanating from the private sector, public authorities and academic institutions. 

True to our mission of fostering knowledge sharing about cybersecurity, we are finalizing the programme, whereby the morning will be filled with contributions by the public actors of the Belgian cybersecurity ecosystem. In the afternoon, we plan four roundtable discussions on topical subjects whereby we always try to bring in different perspectives in the discussions. 

We hope to welcome you at this event, which will offer you an excellent opportunity to network with your peers.  

Cybersecurity policymaking (9:30 PM)

Phédra Clouner (CCB), Patrick Hauspie (VLAIO), Jéremy Grandclaudon (AdN), Axel Legay (UCLouvain), & Yves Bastaerts (Safe.Brussels).

Panel discussion: AI & Cybersecurity (12:00 PM)

Instead of speculating about the world being taken over by sentient robots, let us take some time to share a common theoretical basis on Artificial Intelligence and discuss realistic outcomes that can help us today in cybersecurity operations.   

Peter Van Hoorenbeeck, moderator (Davinsi Labs); Jesse van der Zweep, Stéphanie Cox (Proximus Ada), Andy De Petter (Exclusive Networks), Johan Galle (Howest)

Panel discussion: Sovereignty and data protection: Evolution of the topic in the current geopolitical context​ (2:00 PM)

Some policy makers have tended to equate Data Sovereignty with Data Residency in the jurisdiction. The situation in Ukraine makes more and more people realize that the debate is more complex than just “my data needs to stay home”. In certain scenarios sovereignty is achieved by having your data secured outside the country in a data embassy or some safe technical enclave. Often too, the notion of sovereignty is not clarified in the form of policy objectives, a threat model, and controls & mechanisms to achieve objectives in the context of a threat model. Therefore, the same word can be used for different things (autarky, resiliency, etc.). There are also plenty of tradeoffs to be made. In this debate we want to address both the technical and geopolitical dimensions of the issue. 

Ulrich Seldeslachts, moderator (LSEC), David Dab, (Microsoft), Laurent Bounameau (General Inspectorate of Federal and Local Police), Vincent Dock (Proximus), Wim Mees (Royal Military Academy), Jamal Shahin (VUB)

Panel discussion: Ransomware: to pay or not to pay? Legal or illegal? ​ (3:30 PM)

Ransomware is still considered to be the number 1 threat to business disruption. Although paying the ransom could be seen as the quickest way to get the data back, unfortunately, this never results in the recovery of all data. On average, only 65% can be recuperated. 

Geert Baudewijns, moderator (Secutec), Trey Darley (Accenture), Thomas Declercq (Allen & Overy (Belgium) LLP), Peter Piccu-Van Speybrouck (Federal Public Prosecutor’s Office), Fanny Van Cappel (HISCOX).

Panel discussion: European digital wallet: the challenges for business implementation (2:00 PM)

Europa is rewriting the Trust Regulation which will include significant changes in the area of Digital Identity. Soon every citizen and legal entity should have a wallet that allows strong identification/ authentication, that allows to present/exchange “electronic attestations of attributes”, that allows digital signing. If large players on the internet will be obliged to accept this EUDI wallet, if remote signing will be omni-available, if (qualified) reliable attestation can be presented directly from the citizen’s EUDI wallet, how will this impact the digital eco-system?  Will online processes finally be capable of being fully digitized? Will banks, for instance, be able to automate their eKYC-processes? Can a Belgian firm finally trade cross border in full confidence? Will online fraud drop and online trust increase? 

Eric Van Zuuren, moderator (Trustcore.eu), Hugo Mania (ANSSI), André de Kok (National Office for Identity Data in the Netherlands), Katryna Dow (Meeco), Jack Hamande (FPS Policy & Support), John van der Heyden (BNP Paribas Fortis).

Panel discussion: European digital wallet: legal and security challenges (3:30 PM)

After having looked at this EUDI-wallet from a functional point of view, what about the trust, security, privacy dimensions? Can we “trust” this eco-system? What are the elements that determine its trust framework?  How can we make sure that an EUDI wallet can really be made very secure on any mobile device?  How can we make sure that the citizen’s privacy will be “by design” protected? What does it mean when the proposal states that it should be made technically impossible to track the usage of the citizen? How will a citizen know that service providers are not asking for too many attributes or attestations from them?  How can a Belgian citizen company determine trust in a service provider in, for instance, Spain it wants to do business with? How will it be able to determine that party’s identity? How to trust its attestations? How will that Spanish service provider strongly authenticate a Belgian EUDI and trust its attestations and signature? 

Eric Van Zuuren, moderator (Trustcore.eu), Hugo Mania (ANSSI), Evgenia Nikolouzou (ENISA), Bogdan Stefan (European Commission), Bart Preneel (KU Leuven).

Date: 

Wednesday, 26 October 2022 from 9:00 AM to 6:00 PM including lunch and closing cocktail reception.

Venue:

VBO-FEB, Rue Ravensteinstraat 4 1000 Brussels

Registration:

You can register for this Experience Sharing Day through this link.

More information?

Contact [email protected]


Sign up for our Cyber Pulse newsletter

Stay tuned to the forthcoming activities of the Coalition community. Cyber Pulse keeps you up-to-date on the latest cybersecurity news, community actions and member stories.

Download Cyber Security Guides


Share this useful content with friends:

Follow us on social networks: