PhD in secure software engineering from the KU Leuven
15 years of experience in cybersecurity and secure software engineering
What does Thomas do?
When he is not active as a trainer, Thomas is engaged as a security architect and threat modeling practitioner for a number of clients, mostly in the energy sector. He focuses on helping his clients on a strategic level, by identifying cybersecurity risks linked to business goals, creating roadmaps to address those risks, and following up on their implementation.
Thomas at the Data Protection Institute
Thomas is a fervent advocate of threat modeling. Apart from his teaching activities, he also provides security awareness presentations for various events, including non-technical audiences and management.
Thomas as a teacher
Thomas is a firm believer in doing what you teach, and teaching what you do. He has personally applied the material that he teaches in various contexts, and uses these personal experiences (what went well, what could have gone better) throughout the course. He is always open for a good discussion!
With more than 20 years of hands-on technical and executive leadership experience in IT security architecture & technology, Security Operations Centres, Managed Security Services (MSSP), and Industrial Control security, Gert is convinced that you can make your cybersecurity work for you as a gain instead of a pain.
He has always advocated for IT security solutions that are business-aligned, focused, and cost-effective. Hence, he founded together with Tom Van den Eynde Cybervalue. We are passionate about security solutions that provide value to an organization’s performance, reliability, agility, and its reputation.
Before his current role, Gert was CTO at a dedicated security ‘scale-up’ in London focused on providing Managed Detection and Response services. Before that, Gert acted as Verizon’s Subject Matter Expert in security analytics, SOC, and SCADA/ICS protection and led a global team of Practice Leaders focused on designing and delivering threat management solutions.
With more than 20 years of hands-on technical and executive leadership experience in IT Security Architecture & Technology, Security Operations Centres (SOC), Managed Security Services (MSSP), Information Security Strategy and Governance (CISO), Incident Response and OT Security, Tom is convinced that you can make Cyber Security working for you as a gain instead of a pain.
Prior to his current role as co-founder and managing partner at Cybervalue, Tom was technical operations executive and CISO at a dedicated security ‘scale-up’ in London focused on providing Managed Detection and Response services. Before that, Tom was CISO at Worldline and performed strategic consulting roles at both HPE and IBM. Tom led Verizon’s global consulting practice focused on security analytics, SOC, SCADA/ICS protection and threat management solutions.
Christian holds a PhD in Sciences from the University of Brussels and works as an independent consultant, auditor and coach.
Since more than 25 years, he is supporting executives and leaders looking to increase their own resilience as well as the resilience, continuity and sustainability of their enterprises.
He’s been working in very diverse and international environments abroad and in Belgium (BNPParibasFortis, Record Bank / ING, Sibelga, PwC, NMBS, Baloise, Etablissements Français du Sang, Roche pharma, Hamon, …).
Christian’s vision and experience from the field is that best resilient enterprises stay in business and grow by also caring about their people, technologies and environment. Hence the need for a winning sustainability strategy supports fight against climate change and reduction of the environmental footprint.
On a more personal touch, he is the proud father of 2 teen girls, and that’s another strong thrive for developing resilient paths on a daily base and offering his family a better future.
Stephen has some 25 years of experience in IT and 12 years in OT cyber risk management, with experience in business strategy, competitive analysis and cyber risk management. He has been working as an independent consultant for 22 years.
Stefaan’s professional journey started way back in 1988 as an engineer in the R&D unit of Agfa Gevaert. After some intermediate company changes, Stefaan joined IBM in 1997 as Architect for Systems management solutions first, and since 2001 for (cyber)security solutions. In his role as Security Architect, he fulfilled several positions in Benelux, Europe and at global level. Also, he achieved in 2015 his Level 3 Architect Certification (Open Group Distinguished Architect) and since 2021 he is the Benelux Architect Profession leader (across all IT domains). In his current role as member of a WW team, he assists IBM Clients with security innovative projects.
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
De technische opslag of toegang is strikt noodzakelijk voor het legitieme doel het gebruik mogelijk te maken van een specifieke dienst waarom de abonnee of gebruiker uitdrukkelijk heeft gevraagd, of met als enig doel de uitvoering van de transmissie van een communicatie over een elektronisch communicatienetwerk.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.De technische opslag of toegang die uitsluitend wordt gebruikt voor anonieme statistische doeleinden. Zonder dagvaarding, vrijwillige naleving door uw Internet Service Provider, of aanvullende gegevens van een derde partij, kan informatie die alleen voor dit doel wordt opgeslagen of opgehaald gewoonlijk niet worden gebruikt om je te identificeren.
De technische opslag of toegang is nodig om gebruikersprofielen op te stellen voor het verzenden van reclame, of om de gebruiker op een website of over verschillende websites te volgen voor soortgelijke marketingdoeleinden.