Select your country

Not finding what you are looking for, select your country from our regional selector:

Search

Cybersec Europe | May 20 & 21, Brussels Expo

Navigate the unknown

Anticipate. Detect. Respond.

In the vast expanse of cyberspace, threats behave like black holes: unseen, unpredictable, and capable of pulling entire organizations into chaos. Just as astronauts train rigorously to face the unknown and mission control monitors every signal to ensure a safe journey, modern businesses must rely on precision, coordination, and resilience to stay secure.

At Orange Cyberdefense, we draw inspiration from space missions because in cybersecurity, clarity, control, and vigilance are everything. We'd like to invite you to our booth for an experience that’s out of this world. We’re embarking on a cosmic journey with you through our Cyber Mission Control, which is built around three phases: anticipate, detect, respond.  

    Join us on May 21 & 22 to:

    • Experience live CERT & Cybersoc demos
    • Exchange of ideas with peers while enjoying a drink
    • Get expert advice on protect, detect and response approaches 
    • Get insights from our keynote speaker in the theaters on
      • Third Party Risk Management (TPRM)
      • Cyber sovereignty in changing geopolitical landscapes

    Meet our speakers

    Can we still rely on traditional cyber allies?

    How do we maintain a resilient security infrastructure when global power dynamics are shifting? How do we balance technical excellence with sovereignty?

    Cybersecurity has been built on trust. We trust that our defenses stand strong, that our technical partners safeguard us rather than expose us. But in a world where political landscapes shift unpredictably, traditional allies reassess their priorities, and ethics become more fluid, that trust is facing new challenges. A talk by Charl van der Walt, Head of the Security Research Center at Orange Cyberdefense. 

    May 21 | 3:15 PM May 22 | 3:15 PM

    You gotta fight for your right to third party!

    50% of security incidents are now linked to third parties. It's crucial to urgently reevaluate your third-party risk management strategy.

    This break-out session addresses the following key questions:

    • Which security standards should organisations and third parties follow?
    • Why is it critical to know where your data is stored and who can access it?
    • Why must incident response plans include suppliers?
    • Why are regular audits and clear evidence essential?

    Third-party relationships are growing as companies outsource services to boost performance. With rising regulations, compliance must shift from a burden to an opportunity for improvement. Success depends on a unified risk framework, strong processes, and resilient infrastructure.

    This presentation brings risk management to life with pop culture, music, and video, turning it into a chore you might genuinely enjoy in the future. ;-) A talk by Mathew Caplan, Head of International Professional Services at Orange Cyberdefense.

    May 21 | 2:30 PM May 22 | 2:30 PM

    Discover the demo's at our booth

    We’re simulating real-life attack situations at our booth. Test your reflexes, feel the pressure and discover how we keep control when everything’s on the line.

    CERT Demo

    Step into the shoes of a CISO facing a crisis. In this interactive CERT experience, you’ll be thrown into two high-stakes scenarios:

    • A credential leak exploited by cybercriminals

    • A vulnerability exploit threatening to compromise your systems

    You’ll need to make critical decisions—under pressure and in real time.

    Our CERT experts will be right there with you, unpacking each scenario and demonstrating how we leverage vulnerability intelligence, threat detection, and deep/dark web monitoring to anticipate and neutralize threats before they hit.

    Think fast. Act smart. See how it’s done.

    CyberSOC Demo

    Dive into two live attack scenarios showcasing how skilled cybercriminals exploit vulnerabilities, navigate laterally, and steal sensitive data.

    • The Access Broker: Explore how attackers use phishing emails and vulnerabilities to gain access, escalate privileges and exfiltrate critical information. This simulation highlights the tactics of Initial Access Brokers who sell access to ransomware groups and other malicious actors.
    • Cloud Credential Heist: See how attackers infiltrate a domain controller, inject malicious code into Azure AD Connect, and intercept cloud authentication credentials. This scenario demonstrates the risks of lateral movement, privilege escalation, and credential theft in cloud environments.

    You'll see how CyberSOC experts detect, analyze, and respond to these attacks in real-time, leveraging tools like Microsoft 365 Defender, Palo Alto Cortex XDR, and SIEM to turn cyber chaos into control.

    Incident Response Hotline

    Facing cyber incidents right now?

    Contact our 24/7/365 world wide service incident response hotline.