Master degree in applied Computer science at the University of Ghent
20+ years of experience in cybersecurity and privacy
Co-founder and CTO at Toreon
Threat modeling trainer at Black Hat
Co-founder and chapter leader of OWASP Belgium
What does Sebastien do?
With a background in development and many years of experience in security, he has trained countless developers to create software more securely. He has led OWASP projects such as OWASP SAMM, thereby truly making the world a little bit safer. Now he is adapting application security models to the evolving field of DevOps and is also focused on bringing Threat Modeling to a wider audience.
Sebastien at the Data Protection Institute
Sebastien is working within DPI to develop a brand-new training program for Chief Information Security Officers (CISOs). DPI customers will also have access to Toreon’s current training sessions, including the internationally renowned Threat Modeling training.
“Sebastien delivered! One of the best workshop instructors I’ve ever had.” – Black Hat training participant
Sebastien as a teacher
Sebastien is a firm believer in “learning by doing”, i.e. that we learn more when we actually “do” the activity. That is why our threat modeling training is based on practical use cases drawn from real live experience.
With more than 20 years of hands-on technical and executive leadership experience in IT security architecture & technology, Security Operations Centres, Managed Security Services (MSSP), and Industrial Control security, Gert is convinced that you can make your cybersecurity working for you as a gain instead of a pain.
He has always been an advocate of IT security solutions that are business-aligned, focused, and cost-effective, hence he founded together with Tom Van den Eynde Cybervalue. We are passionate about security solutions that provide value to an organisation’s performance, reliability, agility and its reputation.
Prior to his current role, Gert was CTO at a dedicated security ‘scale-up’ in London focused on providing Managed Detection and Response services, and before that Gert acted as Verizon’s Subject Matter Expert in security analytics, SOC, SCADA/ICS protection, and led a global team of Practice Leaders focused on designing and delivering threat management solutions.
With more than 20 years of hands-on technical and executive leadership experience in IT Security Architecture & Technology, Security Operations Centres (SOC), Managed Security Services (MSSP), Information Security Strategy and Governance (CISO), Incident Response and OT Security, Tom is convinced that you can make Cyber Security working for you as a gain instead of a pain.
Prior to his current role as co-founder and managing partner at Cybervalue, Tom was technical operations executive and CISO at a dedicated security ‘scale-up’ in London focused on providing Managed Detection and Response services. Before that, Tom was CISO at Worldline and performed strategic consulting roles at both HPE and IBM. Tom led Verizon’s global consulting practice focused on security analytics, SOC, SCADA/ICS protection and threat management solutions.
Christian holds a PhD in Sciences from the University of Brussels and works as an independent consultant, auditor and coach.
Since more than 25 years, he is supporting executives and leaders looking to increase their own resilience as well as the resilience, continuity and sustainability of their enterprises.
He’s been working in very diverse and international environments abroad and in Belgium (BNPParibasFortis, Record Bank / ING, Sibelga, PwC, NMBS, Baloise, Etablissements Français du Sang, Roche pharma, Hamon, …).
Christian’s vision and experience from the field is that best resilient enterprises stay in business and grow by also caring about their people, technologies and environment. Hence the need for a winning sustainability strategy supports fight against climate change and reduction of the environmental footprint.
On a more personal touch, he is the proud father of 2 teen girls, and that’s another strong thrive for developing resilient paths on a daily base and offering his family a better future.
Stephen has some 25 years of experience in IT and 12 years in OT cyber risk management, with experience in business strategy, competitive analysis and cyber risk management. He has been working as an independent consultant for 22 years.
Stefaan’s professional journey started way back in 1988 as an engineer in the R&D unit of Agfa Gevaert. After some intermediate company changes, Stefaan joined IBM in 1997 as Architect for Systems management solutions first, and since 2001 for (cyber)security solutions. In his role as Security Architect, he fulfilled several positions in Benelux, Europe and at global level. Also, he achieved in 2015 his Level 3 Architect Certification (Open Group Distinguished Architect) and since 2021 he is the Benelux Architect Profession leader (across all IT domains). In his current role as member of a WW team, he assists IBM Clients with security innovative projects.
Active in the field of information security and data protection since 2002
Security advisor/auditor with broad knowledge of all aspects of information security and with extensive eGov experience (social security, ehealth, military, …) in various roles (security consultant/officer, IT security researcher, CISO/DPO as-a-service)
Since 2022 Expert Cybersecurity & Certification at the Centre for Cybersecurity Belgium (CCB).
Commissioner-investigator at the Belgian Supervisory Body of Police Information
Employed for more than 20 years in the Belgian Federal Police in different positions both at national and regional level, always related to the management of operational police information, including public order and judicial police
Involved in the development of a national ANPR network
Head of service at the Communication and Information Service of the District of Halle Vilvoorde
Worked as chief operations for the Belgian Air Support Unit and for the Intelligence Department of the National Public Order Directorate.
Involved in the functional development of several police applications, and acted as a representative in working groups with regards to police law and national guidelines for the processing of police information
Occasionally sent abroad to participate in international information exchange centers established at the occasion of large scale international events such as G8 Summits and NATO meetings
Participated to several international seminars and trainings
Participate to several international courses and seminars
Sent to Burundi twice in order to contribute to the training of local police officers and in order to develop a national communication center with regards to the 2015 national elections
Guest lecturer at different police academies with regards to police information matters
Blijf in contact met ons laatste nieuws, aanbiedingen en beschikbare opleidingen.
Wij gebruiken technologieën zoals cookies om informatie over uw apparaat op te slaan en/of te raadplegen. We doen dit met als doel om de beste ervaring te bieden en om gepersonaliseerde en niet-gepersonaliseerde advertenties te tonen. Door in te stemmen met deze technologieën kunnen wij gegevens zoals surfgedrag of unieke ID's op deze site verwerken. Als u geen toestemming geeft of uw toestemming intrekt, kan dit een nadelige invloed hebben op bepaalde functies en mogelijkheden.
De technische opslag of toegang is strikt noodzakelijk voor het legitieme doel het gebruik mogelijk te maken van een specifieke dienst waarom de abonnee of gebruiker uitdrukkelijk heeft gevraagd, of met als enig doel de uitvoering van de transmissie van een communicatie over een elektronisch communicatienetwerk.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.De technische opslag of toegang die uitsluitend wordt gebruikt voor anonieme statistische doeleinden. Zonder dagvaarding, vrijwillige naleving door uw Internet Service Provider, of aanvullende gegevens van een derde partij, kan informatie die alleen voor dit doel wordt opgeslagen of opgehaald gewoonlijk niet worden gebruikt om je te identificeren.
De technische opslag of toegang is nodig om gebruikersprofielen op te stellen voor het verzenden van reclame, of om de gebruiker op een website of over verschillende websites te volgen voor soortgelijke marketingdoeleinden.