Don’t miss out

CIOXNetherlands

29 Jan 2026

The Amsterdam Congress Centre, Netherlands

Welcome to CIOXNetherlands, the premier event exclusively designed for accomplished CIOs across The Netherlands. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXNetherlands, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

intro

Speakers

Accelerate your network growth

Secure up to twelve exclusive meetings with relevant leads at CIOXNetherlands maximising your opportunity to forge valuable connections and drive business growth.

Become a sponsor

Learn from industry titans

Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.

Forge meaningful Connections

Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.

Agenda

Discover what awaits you at CIOXNetherlands.

Registration & Networking Breakfast

Welcome & Opening Remarks From EDS

OPENING PANEL: Steering Strategy and Security: How Tech Leaders Can Thrive in 2026’s Volatile Tech Landscape

  • Andrei Ilchenko
    CIO, Personal & Business Banking ABN AMRO Bank
  • Daniel Gebler
    CTO Picnic
  • Gustavo Maniá
    Regional CISO, Information Security and Risk Manager The HEINEKEN Company
  • Luke Quire
    Group Information Security Officer Stage Entertainment
  • Stefan Maron
    Vice President Information Technology ASML

As 2026 unfolds, technology leaders are navigating an environment defined by rapid innovation, regulatory flux, geopolitical tension, and accelerating cyber threats. For CIOs and CISOs across Europe, the challenge is not only to protect the enterprise but to enable transformation with confidence. This panel brings together leading CIOs and CISOs to explore how organizations can align security, innovation, and business strategy amid volatility. From AI governance to digital sovereignty, and from resilient infrastructure to trusted ecosystems, we’ll examine how technology leaders can maintain agility while safeguarding trust. Join us for a pragmatic and forward-looking discussion on how to steer through disruption and build a security-led strategy that fuels growth and innovation in 2026 and beyond.

Key Takeaways:
• Strategic Alignment: How to embed security into enterprise strategy to drive innovation and operational resilience.
• Adaptive Governance: Navigating evolving EU regulations without slowing digital transformation.
• AI and Automation: Leveraging intelligent tools for predictive defence, risk visibility, and smarter decision-making.
• Resilience and Trust: Building an adaptive culture and ecosystem that can thrive amid geopolitical, cyber, and market volatility.

Hacking the Hackers: Proactive Offensive Cybersecurity Strategies


  • Horizon3 AI

Traditional defensive strategies are no longer enough. This session explores how ethical hacking, deception technologies, and offensive security can strengthen cyber resilience.

Key Takeaways:

The role of offensive security in modern cyber defence.
How deception technologies can mislead attackers.
Best practices for integrating ethical hacking into cybersecurity strategies.

SPOTLIGHT FORUM: Secure by Design - Preparing for the EU Cyber Resilience Act Enforcement

  • Frank Van Caenegem
    Vice President Cybersecurity & CISO EMEA Schneider Electric
  • Maarten Merkens
    CISO Boels NL
  • Rene Pluis
    Rene Pluis, Regulatory & Standards Officer, Philips Rene Pluis, Regulatory & Standards Officer, Philips

As the EU Cyber Resilience Act (CRA) moves toward enforcement, organizations across Europe face new compliance obligations that will redefine how digital products are designed, maintained, and secured. This open forum brings together experts from the Rijksdienst Digitale Infrastructuur (RDI) and the National Cyber Security Centre (NCSC-NL) to demystify the upcoming changes, clarify enforcement expectations, and discuss how enterprises can prepare ahead of the September 2026 deadline. We’ll also hear from Maarten Merkens, CISO at Boels NL, who will share a leadership perspective on building a resilient enterprise through culture, exploring what it means to be a resilient leader, foster a security-first mindset, and embed secure-by-design principles within teams and technology alike. This interactive discussion and audience Q&A will give leaders the opportunity to eliminate confusion, gain practical guidance, and align strategy, compliance, and culture in preparation for CRA enforcement.

Key Takeaways:
• Understand the scope, timelines, and enforcement mechanisms of the EU Cyber Resilience Act (CRA).
• Implement “secure-by-design” principles across products, systems, and the full lifecycle.
• Explore how resilient leadership and team culture drive organizational readiness and compliance.
• Clarify reporting obligations and the roles of RDI and NCSC-NL in supporting CRA enforcement by 2026.

AM BREAK & 1:1 Xchange

ROUNDTABLE XCHANGES: Discussions on Shared Challenges

  • Jens Löhmar
    CTO Continental Europe and DACH Workday
  • Jonathan Ehret
    VP of Risk Solutions Mastercard Cybersecurity

  • The Rise of the Digital Workforce: AI Agents in the Enterprise Structure Artificial intelligence is increasingly unfolding its positive impact in the corporate context by boosting productivity and creating entirely new user experiences. The evolution and adoption of applications involving AI agents fundamentally influence a new generation of business applications and the overall enterprise architecture. This roundtable aims to discuss immediately viable approaches, added value, and collectively explore the future of enterprise structures.
  • From Insight to Action: Redefining Cyber Risk with Intelligent Defense As digital ecosystems expand, CISOs face an increasingly complex and dynamic threat landscape. Traditional risk frameworks struggle to keep pace with the scale and speed of attacks. This session explores how threat intelligence, advanced analytics, and AI-driven insights can help organizations predict, prioritize, and prevent cyber risk across internal and third-party environments. Join fellow security leaders to uncover how actionable intelligence and automation can bridge the gap between awareness and response—transforming cyber risk management into a proactive, data-driven discipline. Key Learnings: • Ways to integrate threat intelligence into enterprise and third-party risk programs • Strategies to turn complex data into actionable, real-time defense decisions • Best practices for aligning people, processes, and technology for intelligent resilience
  • Consumer IAM: The AI Browser Era Makes Identity Convergence Inevitable

In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.

From -1 to Threat Models: A DevSecOps Journey You Won't Read in a Book

  • Martin Dimovski
    Principal DevSecOps & Team Lead, CISO DevOps Security Team ABN AMRO Bank N.V.

With 20+ years of experience as a DevOps Engineer and Team Lead, Martin Dimovski stepped into the CISO world to lead a transformation that started not from zero — but from -1. In just 2.5 years, he built a full DevSecOps capability inside one of Europe’s largest banks, aligning over 600+ DevOps teams through culture, tooling, and measurement. This session tells the unfiltered story: from discovering missing solution designs and secrets in pipelines to creating DevOps Security Checklists, launching Threat Modeling at scale, and measuring DevSecOps maturity with DORA-aligned KPIs – all without relying on commercial tools. If you’re curious about what real-world secure transformation looks like – the blockers, the breakthroughs, and the blueprint – this talk is for you. Through collaboration, innovation, and continuous learning, ABN AMRO turned a systemic weakness into a strength, proving that when security becomes integral to DevOps, it drives both resilience and agility.

Securing IT/OT Convergence: Managing Risks in Smart Factories and Connected Enterprises

The merging of IT and operational technology (OT) brings new security risks. This session explores strategies for securing smart factories, industrial IoT, and connected enterprise ecosystems.

Key Takeaways:

Understanding IT/OT convergence risks.
Best practices for securing industrial IoT environments.
Case studies of cybersecurity failures in smart factories.

QUICK TECH TALE: Shaping Data Behaviours - The Key to Successful AI Outcomes

  • Mariyka Zelkovskaya
    Business Data Governance Transformation Director Danone

Effective AI adoption isn’t just about technology—it starts with the people and processes that govern data. In this session, Maria Zelkovskaya, Business Data Governance Transformation Director at Danone, will explore how fostering the right data behaviours across teams drives reliable, ethical, and high-performing AI initiatives. Attendees will learn practical strategies to embed data governance, create a culture of accountability, and ensure AI projects deliver measurable business outcomes while maintaining trust and compliance.

LUNCH & 1:1 Xchange

THE INSIDE STORY: How to Integrate an AI Security Framework into the Existing ISMS

  • Haissam Hariz
    CISO Barentz

Organisations today face the twin challenge of advancing AI-driven capabilities while maintaining a robust information security posture. Many existing Information Security Management Systems (ISMS) struggle to absorb the unique risks introduced by AI – such as model bias, data poisoning, drift, and opaque decision-chains, because traditional frameworks were never designed for these domains. Drawing on the latest AI-specific security frameworks (such as those mapped to ISO/IEC 42001) and real-world experience, Haissam Hariz describes how Barentz successfully integrated an AI security layer into its mature ISMS. The solution involved aligning AI-risk controls with the ISMS control landscape, creating cross-functional governance that spans data science, operations and security, and implementing phased deployment of AI-security tooling and metrics. The result: Barentz achieved greater visibility into its AI-asset inventory, reduced blind-spots around model lifecycle risks, and improved audit-readiness to meet both security and regulatory demands, all while innovating with AI safely.

QUICK TECH TALE: Ensuring Resilient IT Operations: Backup, Recovery, and Data Protection Strategies for Modern Enterprises

QUICK TECH TALE: Governance in Practice - From Policy to Production

  • Munish Sidana
    Associate Director Information Security GRC Brenntag

How do you turn security policy into practical, measurable outcomes across a complex enterprise? In this short tech tale, Munish Sidana shares how he tackled the challenge of bridging the gap between governance frameworks and operational execution. Drawing on his experience at both Rhenus and Brenntag, Munish reveals how aligning policy with real-world processes, technology, and people led to stronger compliance, smoother audits, and improved risk visibility. Attendees will walk away with actionable insights on how to embed governance “in motion” transforming static policies into living controls that drive accountability and measurable results.

QUICK TECH TALE: Identity is the New Perimeter; Combine Prevention and Recovery to Ensure Organisational Survivability During and After an Attack

  • Sami Laurila
    GTM Leader Northern Europe, Identity & AI Technology RUBRIK

Data & Identity Focus: How to implement robust cyber-recovery and threat containment across your data and identity estate
Beyond prevention: Ensure rapid response and recovery to minimise downtime and business disruption
Stay operational under attack: How zero-trust architecture helps you maintain control and protect critical data – even during ransomware events

Trust in Motion: Securing the Era of Agentic AI


  • Ping Identity

Agentic AI is here and it’s changing how work happens. AI agents are now making decisions, initiating transactions, and autonomously accessing data across enterprise ecosystems. For CIOs and CISOs, this evolution demands a new kind of security thinking: one where trust is dynamic, continuous, and identity-driven.

In this session, Ping Identity explores how identity becomes the foundation for securing agentic AI ensuring that every digital action, human or machine, is authenticated, authorised, and aligned with enterprise governance. Learn how to future-proof your security architecture for an AI-first world where trust must stay in motion.

PM BREAK & 1:1 Xchange

COMMUNITY CONVERSATIONS

  • Frans Jorna
    CIO City of Apeldoorn
  • Ardie Kleijn
    CISO - Security & BCM Expert Dutch Land Registry
  • Daniela Almeida Lourenço
    Global CISO Hunkemöller
  • Co-creating Value in Dataspaces - As digital transformation accelerates, connecting and operationalizing data across systems and partners has become a true differentiator. This session explores how enterprises are building secure, collaborative data ecosystems that drive innovation and business value. Learn how leaders can align technology, security, and data strategy to balance governance with agility and accelerate transformation.
  • Bringing Business to the Backend: Aligning Technical Teams with Strategic Goals - Many conversatios focus on explaining technology to the business - but this roundtable flips the script. Leaders will explore how to communicate business strategy effectively to technical teams, helping them understand organizational goals and priorities. Participants will share practical approaches for translating strategy into actionable guidance, improving alignment, and fostering collaboration so technology can deliver meaningful impact across the enterprise.
  • The Hidden Cost of Neglect: Closing Cybersecurity Gaps Before They Become Business Risks - As digital transformation accelerates, cybersecurity risks are too often deprioritized in the boardroom, treated as technical issues instead of strategic business concern - until a crisis brings them sharply into focus. This roundtable explores how overlooked vulnerabilities evolve into costly incidents and how stronger communication between IT, risk, and business leaders can turn cybersecurity into a true pillar of enterprise resilience.

In this second roundtable breakout, enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through roundtables discussions, driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.

What CIOs Really Need to Know About Employee Experience

CLOSING DEBATE: Show Me the Value? Quantifying Risk and Justifying Tech Investments in 2026

  • Stella Gambin
    Director Information Technology Operations Yusen Logistics (Europe)
  • Martijn Nykerk
    CISO Randstad
  • Marco Eijsackers
    Global Head of Tech Strategy (CTO) ING

In an era of increasing volatility and scrutiny, IT and Security leaders must demonstrate that every euro spent delivers measurable business value. This interactive debate will explore how to translate technology and cybersecurity risk into financial impact, enabling leaders to justify budgets, prioritise investments, and communicate risk in terms that resonate with Finance leaders and boards. Join us for this final conversation, to share and uncover strategies for aligning your 2026 investments, spanning AI, cloud, and resilience, with business growth and organisational risk appetite.

Closing Remarks

Drinks Recption

Apply to Attend

Location

Amsterdam Congress Center, La Guardiaweg, Amsterdam, Netherlands

Amsterdam Congress Center, La Guardiaweg, Amsterdam, Netherlands

Past Events

Testimonials

See what attendees, speakers and sponsors say about our events.

FAQs

Who attends?

Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.

What does my delegate pass include?

Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.

What are the one-on-one meetings?

These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.

What is the dress code?

Professional business attire is appropriate.

Do I need to prepare anything?

No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.

Why attend?

Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.

Have any more questions?

Get in touch here

Have any more questions?

Get in touch