EPN Live
  • Home
  • Future Events
    • 2025 Events
      • Bespoke Evenings
      • AITech Events
      • CyberSec Events
      • CyberSec Virtual
      • Infotech Events
      • InfoTech Virtual
      • Pharma Europe
      • Virtual Round Tables
    • 2026 Events
      • Bespoke Events
      • AITech Events
      • CyberSec Events
      • InfoTech Events
  • Previous Events
    • 2022 Events
      • 2022 Bespoke Evening
      • 2022 CyberSec Events
      • 2022 InfoTech Events
    • 2023 Events
      • 2023 Bespoke Evening
      • 2023 CyberSec Events
      • 2023 InfoTech Events
    • 2024 Events
      • 2024 Bespoke Evenings
      • 2024 CyberSec Events
      • 2024 InfoTech Events
      • 2024 Virtual Events
    • 2025 Events
      • Bespoke Evenings
      • CyberSec Events
      • InfoTech Events
      • Virtual Events
  • Testimonials
    • Solutions
      • Bespoke Dinners
      • Business Intelligence
      • EPN Virtual
      • One-to-One, C-Level, Virtual Meetings
  • Register Interest
  • EPN TV

CyberSec 2025, Amsterdam

  • Home
  • >> 2026 Events>>
  • CyberSec 2025, Amsterdam

WELCOME TO CYBERSEC AMSTERDAM 2025 The Strategic Summit for Cybersecurity Leaders

CyberSec Benelux brings together the region’s leading CISOs, security strategists, and technology innovators for a high-level exchange on the future of cybersecurity. Against the backdrop of increasing regulatory pressure, rapid digitalisation, and ever-evolving cyber threats, this exclusive gathering provides actionable insights, real-world case studies, and peer-to-peer networking to help organisations across Belgium, the Netherlands, and Luxembourg build resilience and stay ahead of adversaries.


PARTNER DETAILS COMING SOON!


ATTENDEE DETAILS COMING SOON!


SPEAKERS, WORKSHOP & ROUNDTABLE LEADERS DETAILS COMING SOON!


150 +
Thought Leaders on Site

20 +
Solutions on Show


Who Should Attend?

Decision-makers, strategic influencers, and technical leaders responsible for organisational cybersecurity, risk management, infrastructure, and data protection:

  • Chief Information Security Officer (CISO)
  • Chief Security Officer (CSO)
  • Chief Information Officer (CIO)
  • Chief Technology Officer (CTO)
  • Chief Risk Officer (CRO)
  • Chief Data Officer (CDO)
  • Chief Compliance Officer (CCO)

KEY TOPICS TO INCLUDE

  • EU NIS2 Directive readiness and its impact on Benelux businesses
  • AI-driven threat detection and defence against advanced persistent threats
  • Cybersecurity challenges in financial services and fintech hubs like Amsterdam and Luxembourg
  • Securing critical infrastructure in logistics, transport, and energy sectors central to the region
  • Building cross-border resilience and collaboration in a tightly interconnected Benelux market

YOUR AGENDA (CLICK BELOW TO EXPAND)

Registration and Coffee

Plenary Keynote Panel — From Disruption to Resilience: Board-Level Technology Priorities for 2026

The opening panel gathers leading European CIOs, CISOs and regulators to explore how accelerated AI adoption, looming post-quantum risks and new EU mandates are reshaping digital value creation. Together they will define a shared playbook for balancing velocity with verifiable trust.

  • Mapping the 2026 risk–opportunity landscape: GenAI, PQC, 6G, and sovereign cloud
  • Aligning IT modernisation roadmaps with NIS2, DORA and the EU AI Act
  • Bridging the talent and culture gap between security and transformation teams
  • Metrics the board actually wants: resilience, ESG impact, and business enablement

Solution Spotlight Sessions

Solution Spotlight #1

Solution Spotlight #2

Solution Spotlight #3

Solution Spotlight #4

Morning Coffee and Networking

CYBERSEC KEYNOTE: Zero Trust 2.0 – Securing the AI-Powered Edge

Edge AI and 6G will explode the number of identities and data flows outside traditional perimeters. Learn how Zero Trust principles are evolving to continuous verification, real-time policy decisioning and AI-assisted enforcement.

  • Extending identity fabric to machines, agents and micro-services
  • Inline risk scoring with context-aware policy engines
  • Tying together SDP, SASE and adaptive MFA for frictionless user journeys
  • Threat-informed validation: using purple-team telemetry to prove efficacy

CYBERSEC KEYNOTE: Post-Quantum Ready: Strategic Transition Pathways and Practical Wins for 2026

As post-quantum cryptography (PQC) standards reach maturity and regulatory attention intensifies, CISOs must lead a measured yet proactive response. The threat posed by “harvest now, decrypt later” attacks is no longer theoretical—and for security leaders, the question is not if but how and when to prepare. This session outlines a roadmap for initiating a sustainable and risk-informed PQC transition that aligns with business resilience goals and technology renewal cycles.

  • Identifying and prioritising cryptographic assets at highest exposure to long-term decryption risk
  • Phasing in hybrid key-establishment techniques to balance protection and performance
  • Refreshing HSM and key infrastructure with future-proofed, standards-aligned solutions
  • Engaging boards and stakeholders with clear narratives on PQC investment as continuity insurance
  • Laying the groundwork for crypto-agility as a long-term strategic capability

Lunch and Networking

CYBERSEC A1: Red-Teaming AI Systems: Testing Resilience in the Age of Intelligent Threats

As AI adoption accelerates across business and IT functions, so does the risk of exploitation. CISOs must proactively identify and mitigate vulnerabilities unique to AI models, pipelines, and logic layers. This session focuses on practical approaches to stress-testing intelligent systems before attackers do.

  • Establishing AI-specific threat models and red-teaming frameworks
  • Detecting prompt injection, model inversion, and data leakage vectors
  • Integrating adversarial testing into MLOps lifecycles
  • Sharing validated findings with vendors and internal teams securely
  • Ensuring ethical boundaries are maintained during offensive simulations

CYBERSEC B1: Continuous Compliance: Managing DORA, NIS2, and AI Act Across Complex Environments

With new EU and UK regulations converging on operational resilience, security leaders face mounting complexity. This round table explores how to embed compliance into workflows—without creating friction or audit fatigue.

  • Automating evidence collection across cloud, hybrid and legacy systems
  • Designing controls once, reporting many times: compliance-as-code in practice
  • Bridging security and risk functions through shared assurance models
  • Aligning internal reporting with regulator expectations
  • Building compliance dashboards that support both operations and the board

CYBERSEC A2: Software Supply Chain Security: Transparency, Trust and Triage at Scale

High-profile attacks have shown the fragility of the software ecosystem. CISOs must now treat software components as critical assets—requiring real-time visibility, traceability, and response capabilities.

  • Leveraging SBOMs and VEX to drive meaningful risk prioritisation
  • Automating third-party software governance in CI/CD pipelines
  • Mitigating risks from open-source, shadow IT, and unmanaged dependencies
  • Creating escalation workflows for known-exploited components
  • Engaging procurement and legal in enforcing supplier accountability

CYBERSEC B2: Securing Operational Technology in the Era of Smart Infrastructure

As critical infrastructure modernises, the OT/IT divide is disappearing—but so are historical security boundaries. This session focuses on strategies to protect physical environments from increasingly sophisticated cyber threats.

  • Extending Zero Trust and network segmentation into industrial systems
  • Bridging the knowledge gap between IT security and OT operations
  • Aligning with sector-specific guidance (e.g., NCSC CAF, NIS2 Annex)
  • Ensuring business continuity during threat response in operational settings
  • Rethinking risk ownership across physical and digital domains

End of Conference

Expert Insights

20 + technology leaders will be delivering data, debate & discussions. Learn from the mistakes & successes of experts from some of the UK’s largest organisations…

Exclusive Features

Match-made meetings, a full day of interactive roundtables, complimentary access to co-located events, and much more to take advantage of…

Like-minded Senior Peers

Meet with CIOs, CISO, CDOs, & CTOs to share experiences & get tangible take-home lessons, in both formal & informal networking opportunities…

New Technologies

Join the expo to see the latest technologies that can transform your business. Product demos available to discover what can work for you…


Who Should Sponsor CyberSec?

CyberSec is the definitive platform for cybersecurity solution providers to connect with senior security decision-makers actively seeking new tools, strategies, and partnerships. If your company supports enterprise security, digital resilience, or compliance, this is where you need to be. By sponsoring CyberSec, vendors gain direct access to CISOs, security architects, and enterprise buyers—positioning their solutions at the heart of the industry’s most influential decision-making forum.

  • Threat Detection & Response
    • XDR / EDR / NDR providers
    • SIEM and SOAR platforms
    • Incident response and threat hunting tools
  • Identity & Access Management (IAM)
    • Single sign-on (SSO) solutions
    • Multi-factor authentication (MFA)
    • Privileged Access Management (PAM)
  • Cloud & Application Security
    • Cloud workload protection (CWP)
    • CASBs and CNAPP platforms
    • Secure application development tools (DevSecOps)
  • Network & Endpoint Security
    • Next-generation firewalls (NGFW)
    • Endpoint protection platforms (EPP)
    • Secure web gateways (SWG) and VPNs
  • Zero Trust Architecture
    • ZTNA and microsegmentation providers
    • Continuous access evaluation platforms
  • Data Security & Privacy
    • Encryption and tokenization tools
    • Data loss prevention (DLP)
    • Data classification and governance platforms
  • Governance, Risk & Compliance (GRC)
    • Risk assessment and audit tools
    • Compliance automation platforms
    • Policy and regulatory change management
  • AI & Automation in Cybersecurity
    • AI-driven threat analytics
    • Automation for security operations
    • Behavioural analytics platforms
  • Security Awareness & Human Risk Management
    • Employee training and phishing simulation tools
    • Insider threat prevention platforms
  • Managed Security Services (MSSPs) & Consulting
    • Managed detection and response (MDR)
    • Cybersecurity consulting and advisory firms
    • Red/blue/purple team providers

YOUR TECHNOLOGY SHOWCASE

If you are focused on the following, then talk to us today about partnership opportunities: Contact the sponsorship team

TITANIUM

  • Exhibition Space in Tier 1 Area
  • Product Demo
  • Host a Roundtable
  • 5 x 121 meetings in the build up and over the course of the day
    Co-branding on All Literature
  • Priority networking
  • Bespoke Thought Leadership Dinner the night before

PLATINUM

  • Exhibition Space in Tier 1 Area
  • Product Demo/ Keynote Speech
  • 5 x 121 meetings in the build up and over the course of the day
  • Co-branding on All Literature
  • Priority networking
  • Host a Roundtable

GOLD

  • Exhibition Space in Tier 1 Area
  • Product Demo
  • 5 x 121 Meetings in the build up and over the course of the day
  • Co-Branding on All Literature
  • Priority Networking

SILVER

  • Exhibition space in Tier 2 Area
  • 3 x 121 Meetings in the build-up and over the course of the day
  • Co-Branding on Some Literature, Networking Sponsorship

BRONZE

  • Exhibition space in Tier 3 Area
  • Co-Branding on Some Literature
  • Networking Sponsorship

ENTRY-LEVEL SPONSORS

  • Branded Table in the Coffee Area
  • Networking Sponsorship

CyberSec Amsterdam 2025 is where leadership meets action, and the future of cybersecurity is mapped.

Top 3 ways you can gain exposure

1: Meet the decision-makers of corporate technology. Get to know the people who create digital success.

2: Save time & money by touching- base with your existing clients, making new contacts, & showcasing your expertise all in one place.

3: We know the power of face-to-face business networking. You should be part of the conversation.

Thought-Leadership

Position yourself among the leading experts of IT development & application. Let the IT community know that you are integral expert in the conversation.

Brand Visibility

Get your foot in the door as IT leaders seek for new applications & technologies by showing the solution is out there… they just need to know what it is.

Demonstrating Value

Take part in the Product Demonstrations & showcase your capabilities, so that your potential clients can learn that you are right for them

Maintain Relationships

Attending our conferences offers invaluable face-to-face networking opportunities, fostering meaningful connections with industry leaders and peers. Additionally, engaging in live discussions enhances learning experiences, ensuring attendees stay ahead in their fields.

Reserve your place at CyberSec 2025 in Amsterdam—your next big move starts here!



Register

SECURE YOUR SEAT

Date: 25th November 2025
  • Call us on 0204 540 4484 & we can process your registration over the phone.
  • Or contact Kate Wood on kwood@epnlive.com
Are you busy on the dates? You can refer a colleague by filling out the recommendation form using the button below & we will get in touch soon.

VENUE:
Park Inn by Radisson Amsterdam City West
La Guardiaweg 59
Amsterdam, Netherlands

MEET THE TEAM


For delegate enquiries:
Kate Wood
kwood@epnlive.com


For operational enquiries:
Zuzana Vrablikova
zvrablikova@epnlive.com

About Us

EPN is a network of C-Level professionals across all functions - IT, IT Security, HR, Finance, Marketing and Operations.

info@epnlive.com

Upcoming Events

  • CyberSec London 2025
  • InfoTech London 2025
  • CyberSec Zurich 2025
  • Infotech Zurich 2025

Info Links

  • Home
  • Events
  • About Us
  • Solutions
  • Contact us

Follow Us

  • Youtube
  • Linkedin
  • Copyright © 2025 EPN Ltd – All Rights Reserved.
  • Privacy Policy and Terms and Conditions
  • EPN Live is a member of The CPD Certification Service
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT