Benelux security and privacy meeting 2025
from
Monday 20 October 2025 (12:00)
to
Tuesday 21 October 2025 (16:40)
Monday 20 October 2025
12:00
Arrival and lunch
Arrival and lunch
12:00 - 13:00
Room: Ellipse
13:15
Post-it session
Post-it session
13:15 - 13:45
Room: Ellipse
13:45
Session: Artificial intelligence
-
Serge Linckels
(
Digital Learning Hub Luxembourg
)
Sümeyye Elif Biber
(
University of Luxembourg
)
Nesryne Mejri
(
University of Luxembourg
)
Session: Artificial intelligence
Serge Linckels
(
Digital Learning Hub Luxembourg
)
Sümeyye Elif Biber
(
University of Luxembourg
)
Nesryne Mejri
(
University of Luxembourg
)
13:45 - 15:00
Room: Ellipse
15:00
Coffee break
Coffee break
15:00 - 15:30
Room: Ellipse
15:30
Session: Quantum communications
-
Aysajan Abidin
(
KU Leuven
)
Giacomo Carrara
(
imec
)
Session: Quantum communications
Aysajan Abidin
(
KU Leuven
)
Giacomo Carrara
(
imec
)
15:30 - 17:00
Room: Ellipse
Quantum computers are no longer just science fiction: they pose real challenges to the cryptographic foundations of today’s digital world. In this session, our guest speakers will first provide a high-level introduction to quantum computing and the security risks it brings. They will then explore two key approaches to safeguard the future - Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD) - highlighting their strengths, limitations, and potential impact.
17:00
Wrap-up - Discuss take aways
Wrap-up - Discuss take aways
17:00 - 17:30
Room: Ellipse
17:30
Hotel check-in
Hotel check-in
17:30 - 19:00
Room: Ellipse
19:00
Dinner
Dinner
19:00 - 22:00
Room: Ellipse
Tuesday 21 October 2025
09:00
Arrival with coffee and tea
Arrival with coffee and tea
09:00 - 09:30
Room: Ellipse
09:30
Keynote talk: AI factory
-
Pascal Steichen
(
European Cybersecurity Competence Center
)
Keynote talk: AI factory
Pascal Steichen
(
European Cybersecurity Competence Center
)
09:30 - 10:30
Room: Ellipse
10:30
Coffee break
Coffee break
10:30 - 10:45
Room: Ellipse
10:45
Technical Investigation in Compliance Assessments
-
Jan Landsaat
(
SURF
)
Technical Investigation in Compliance Assessments
Jan Landsaat
(
SURF
)
10:45 - 12:00
Room: Ellipse
Discover the power of technical investigation in compliance assessments. In this interactive workshop we analyse the technical workings of a fictional digital service provider. In small groups, guided by the SURF compliance experts, we explore findings from digital analysis, learn how to interpret them and assess their legal impact. Enhance your technical skills and discover how this type of investigation can be a valuable addition to your compliance framework.
12:00
Lunch
Lunch
12:00 - 13:00
Room: Ellipse
13:00
Security incidents and data breaches
-
Stefan Eestermans
(
Belnet
)
Wim Biemolt
(
SURF
)
Marc Ludwig
(
Lycée Guillaume Kroll
)
Security incidents and data breaches
Stefan Eestermans
(
Belnet
)
Wim Biemolt
(
SURF
)
Marc Ludwig
(
Lycée Guillaume Kroll
)
13:00 - 14:30
Room: Ellipse
Session 1: Lessons learned from a Belnet cyberincident - Speaker: Stefan Eestermans, Security Manager at Belnet Session 2: DDoS: cause and solutions - speaker: Wim Biemolt, Network Expert at SURF The SURF network experienced the largest DDoS attack ever. Although our usual motto is “the more gigabits, the better,” this attack was quite extreme and caused serious disruption on the SURF network. In this talk, SURFcert will discuss what was so special about this attack, what was needed to bring it under control, and which measures have been taken and will be taken to become more resilient.
14:30
Coffee break
Coffee break
14:30 - 15:00
Room: Ellipse
15:00
Governance and responsabilities
-
Raoul Winkens
(
Maastricht University
)
Arvin Khozooei
(
TU Delft
)
Governance and responsabilities
Raoul Winkens
(
Maastricht University
)
Arvin Khozooei
(
TU Delft
)
15:00 - 16:00
Room: Ellipse
15.00 - 15.30 Ownership of data, governance (and a bit of AI). What do we mean exactly? Speaker: Raoul Winkens, DPO at Maastricht University The terms ownership and governance are widely used. In case of ownership often confusing. Can you own a system, a process, a project or (personal) data? Governance is often used without knowing what governance actually is. Lessons learned from security, data protection might help avoiding these pitfalls when it comes to “AI”, the new kid in town. Formalities with words or getting things right? You be the judge. 15.30 - 16.00 Handbook on shaping AI Governance at Dutch universities Speaker: Arvin Khozooei, AI Governance Lead at TU Delft AI Governance helps universities to integrate AI into their core tasks in a responsible, effective, and future-proof manner. In practice, universities often look to the Chief Privacy Officer (CPO) primarily to explain the rules and ensure compliance of AI systems with legislation, such as the AI Act (AIA). Although it is not entirely surprising that the CPO is approached for this due to their experience gained from implementing the General Data Protection Regulation, managing privacy is only one part of implementing a compliant AI system and meeting regulatory requirements.
16:00
Wrap up
Wrap up
16:00 - 16:30
Room: Ellipse
16:30
End of the meeting
End of the meeting
16:30 - 16:40
Room: Ellipse