Using Security by Design to increase efficiency (Users-Only X-change)

Location:virtual meeting



When building an infrastructure, we want it of course to be as free of vulnerabilities and as immune to cybercrime as possible. In a world with technologies such as edge computing and IoT, one approach we can use to achieve this immunity can be found in 'Security by Design'.


During this virtual session, we will first hear Greenyard’s approach to the concept of Security by Design, then have an open discussion for your insights, questions and experiences. To ensure an uninhibited discussion, this X-change will be open to digital technology users only (not providers).






This event will be held as a virtual meeting. The link will be provided in the Confirmation email.




13:30 Introduction


13:40 Case: Security by Design, beyond the code


Security for applications requires reaching far beyond DevSecOps; data flows must also be integrated in the security requirements. To protect all data flows in the supply chain, Greenyard is securing the network infrastructure as well as the external connections. In this presentation, you’ll find out about their approach to achieving this.


Johan Stronkhorst, Group ICT Security Manager, Greenyard (English)


14:10 Interactive discussion


Moderated by Danielle Jacobs, CEO, Beltug.


We would like to hear more about the questions and pitfalls you face, and the experiences you can share for this issue – which is ranked in the Top 5 of security priorities of our members.


Some of the topics we already have in mind for the discussion include:


  • Where to start in your strategy: should you take a top-down or bottom-up approach?
  • Challenges in achieving the 100% by design security
  • Security by (Design AND/OR Configuration)

These are only a few of the elements we can address: please email your additional topics to Ann so we can prepare this session in an optimal way.


Discussion in French & Dutch.


15:00 Wrap up & end