Back to blog

BE-CEC 2025 Q3

BE-CEC 2025 Q3 picture-1On Thursday, September 11, 2025, Pointury organised the second edition of BE-CEC, Belgium’s Cybersecurity Executives Conference, in Dolce, La Hulpe. It was again an inspiring event with top speakers, networking with senior IT and cybersecurity leaders and a delicious walking dinner.

Building Cyber Resilience in Retail

Dirk Beynaerts, CISO at Colruyt Group, discusses the cybersecurity transformation program at Colruyt which resulted in practical tips for the audience.

Dirk 008

Panel Interview

Pascal D'Eer, Chief Risk Officer (CRO) at the Belgian Federal Police,  Interviewed experienced CISOs, focusing on their daily responsibilities and key lessons learned in the field of cybersecurity.

The panel consisted of 

  • Adrian Geismaier, CISO at Galapagos
  • Timothy De Ben, ICT Infrastructure Manager & CISO at DPD Belux
  • Philippe Cornette, CISO at John Cockerill
  • Ruben Wolharn, CISO at Recticel Group

Panel 017

From Logging to Learning – Making SIEM Intelligent and Incident-Ready

Vivin Sathyan, Official Spokesperson at ManageEngine, explained how traditional SIEM (Security Information and Event Management) tools often miss key warning signs. He explained how to make your SIEM smarter and more effective by adding behavior analytics (UEBA), by connecting it with identity systems (IAM), and by using automation to close the gap between detecting and responding.

Vivin 016

Cybersecurity 2040: Quo Vadis?

Johan Kestens looked into the future to see where cybersecurity is heading. Johan is an award-winning public speaker, who has amongst others been CISO of Bank of New York Mellon, CIO of BNY Mellon European Bank, CIO of ING Belgium, Partner at A.T. Kearney, Member of the Executive Committee at SWIFT and Principal at McKinsey.

Read Johan's full presentation here

Johan 006

The Dual Disruption: Generative AI and Quantum Computing in Cybersecurity

Bart Salaets, EMEA Field CTO at F5, reflected on Generative AI and quantum computing, transforming the cybersecurity landscape, which is creating both opportunities as well as critical challenges. He explored how generative AI is reshaping the overall threat spectrum while quantum computing poses new risks to modern cryptographic standards.

Bart 019

Show me the data

In this high-stakes challenge, our sponsors were challenged to each bring one compelling statistic or trend to the table and then discuss its significance, impact, and implications for cybersecurity leaders.

Canopee 007

 

Contact Us