In this session, we are bringing you inspiration from two Beltug partners and two real-life cases. Fortinet will describe the security posture that can bring us to ‘cyber security Nirvana’, while the Software Improvement Group will discuss what makes security-by-design so difficult to achieve.

Then we’ll hear the story of EpiCURA, as it created a security strategy to protect against cyber criminals who target healthcare providers. Finally, we’ll get further information from Picanol about how the learnings from their ransomware attack were used to create their ‘zero-trust’ action plan.



Welcome and introduction

Levi Nietvelt, Business Manager, Beltug (English)


Cyber security Nirvana: the sum is greater than the parts

With security at the forefront of successful digital transformations, new platforms and data sharing are essential to have a comprehensive security posture across environments and edges. Join us to hear about key trends, security challenges, and how consolidation improves the security posture.

Ricardo Ferreira, Field CISO EMEA, Fortinet (English)


Security by design: How to make it work

Many organisations are trying to achieve ‘security by design’, or ‘shift left’, and almost all of them struggle. Yet, the February 2022 ISO 27002 standard update makes it clear that security by design is the new duty of care. Why is this so hard to accomplish, and what can we learn from SIG’s experience with organisations that have succeeded? In this talk, you will find answers to questions such as how to fit security into agile, how to enable developers to include security as a building block of their work, and how to provide evidence of that you are in control?

Rob van der Veer, Senior principal expert, Software Improvement Group (SIG) (English)


Break, with the possibility to participate in the moderated discussion

Levi Nietvelt, Business Manager, Beltug (English)


User story: Cyber security, a hospital challenge between lobbying, best practices & resources

Hospitals face a serious security dichotomy: on the one hand, budgets are constrained and on the other, they are one of the most ‘desirable’ targets for cyber criminals. How in this environment can you define the path to a secure-by-design, robust and reliable information system? Between market lobbying, user behaviours, legal constraint, multiple triggers and an important maturity gap, the journey is not easy. It is possible, but it requires more that technology. Using an enterprise class methodology, the ‘right’ choice of partners, and pragmatical technologies that don’t place constraints on care workers, you’ll hear how EpiCURA dealt with the timeline not aligned with cyber threats.

Bruno Lienard, CIO, EpiCURA (English)


User story: Picanol’s zero trust action plan

In 2020, the virtual servers at Picanol rebooted automatically displaying the message of a ransomware attack. Production went down. The horror scenario many of the Beltug members train against, but still fear, became reality. But the adage ‘What doesn’t kill you, makes you stronger’ held true for Picanol. After re-examining their entire cybersecurity strategy and rolling out a ‘zero trust’ approach, they are now stronger than ever before. Discover the action plan, built on the real-life experiences of overcoming an attack.

Marc Colman, Infrastructure Manager, Picanol (English)


Your experiences, your questions and best practices


Wrap up and end

1 Step 1

If you are registering more than one person from your organisation, or need to indicate that another person will be replacing you at the event, please fill in a separate registration page for each person.

FormCraft - WordPress form builder