The information and networking event for the security professional about Cyber Security

This year’s conference will be looking into the latest evolutions with regard to cybersecurity, the upcoming of the Internet of Threats and will be helping you to identify how to protect your valuable data and other key assets in that context.

For organizations it’s no longer the question whether but rather when they will be getting hacked or when they will have to manage a (cyber)incident. The “new normal” even seems to be “assume that you are already hacked”… and hope you’ll discover fast enough instead of like one year later.

During this conference we will give the attendees a view of the current state of affairs shared by true experts in the field, we will glance at upcoming regulations which will give guidance to organizations and, as is the heart of Heliview’s cybersecurity conference, discuss the state of affairs with regard to currently available solutions which organizations can apply to increase their resilience against (cyber-) threats – see list of this year’s key subjects.

About the conference
  • Small business congress with a strong focus on subjects like regulation, identification, protection, detection, repair and recovery.
  • The opportunity to have one-on-one conversations.
  • Inspirational speakers and organisations share their experiences in informative case studies.
Conference news

New keynote added to the programme!

A new keynote has been added to the programme of the Cyber Security Conference. Robert McArdle from Trend Micro’s will join the conference and discuss the differences in major cybercriminal undergrounds in his keynote 'Exploring the differences in major cybercriminal undergrounds'.

Lees het volledige bericht
Conference news

The Why and How of Ransomware

Ransomware is undeniably becoming one of the biggest threats facing businesses today. The last year or so has seen an incredible rise in the number of ransomware attacks; some reports have claimed that 40% of businesses have been hit within the last year, encrypting files and data until a ransom is paid. 

Lees het volledige bericht

On the password paradox and authentication innovation

Chances are that the device on which you’re reading this blog was accessed through one form of authentication or the other. One of the most wide-spread of those methods are passwords. They’ve become such an integral part of our lives that we often don’t think about them anymore. However, danger lurks right around the corner if we drop our guard. 

Lees het volledige bericht
Danny Hughes

Keynote Ditrinet: Combatting IoT Malware

This presentation will provide background on real-world IoT systems and explore the current state-of-practice in IoT security, with a focus on defending against IoT malware. Based upon this analysis, imec-DistriNet presents a vision for defending against IoT malware using a combination of hardware and software techniques.

Lees het volledige bericht

Gold partners

Silver partners