{"id":4214,"date":"2026-04-22T13:54:11","date_gmt":"2026-04-22T11:54:11","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=4214"},"modified":"2026-04-22T16:57:07","modified_gmt":"2026-04-22T14:57:07","slug":"speakers","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/en\/speakers\/","title":{"rendered":"Speakers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4214\" class=\"elementor elementor-4214\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fea9543 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fea9543\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:4217,&quot;url&quot;:&quot;https:\\\/\\\/industrial-cybersec.com\\\/wp-content\\\/uploads\\\/4152128-0-83276600-1774995971-shutterstock_2347235209.webp&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9e00211\" data-id=\"9e00211\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4235038 elementor-widget elementor-widget-spacer\" data-id=\"4235038\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9b16a3 elementor-widget elementor-widget-spacer\" data-id=\"f9b16a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86cf858 elementor-widget elementor-widget-spacer\" data-id=\"86cf858\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b1b80b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b1b80b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c600189\" data-id=\"c600189\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-167cb07 elementor-widget elementor-widget-spacer\" data-id=\"167cb07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6ac34f elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b6ac34f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">En savoir plus sur les speakers de la journ\u00e9e :<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6858956 elementor-widget elementor-widget-spacer\" data-id=\"6858956\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1fe3b50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fe3b50\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-60063f8\" data-id=\"60063f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-649b5f4 elementor-widget elementor-widget-image\" data-id=\"649b5f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/cornette\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1300\" height=\"806\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.03.39.png\" class=\"attachment-large size-large wp-image-3980\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.03.39.png 1300w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.03.39-768x476.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.03.39-18x12.png 18w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6f649e8\" data-id=\"6f649e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83b8432 elementor-widget elementor-widget-text-editor\" data-id=\"83b8432\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"74\" data-end=\"439\"><strong>Philippe Cornette<\/strong> est une figure reconnue de la cybers\u00e9curit\u00e9 en Belgique, \u00e9lu <strong data-start=\"153\" data-end=\"178\">CISO of the Year 2025<\/strong>, et fondateur de <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">DigiS\u00f4ter<\/span><\/span>. Fort de plus de 35 ans d\u2019exp\u00e9rience en informatique, cybers\u00e9curit\u00e9 et gestion des risques, il accompagne les organisations dans la transformation du risque cyber en levier de r\u00e9silience et de gouvernance.<\/p><p data-start=\"441\" data-end=\"773\">\u00c0 travers <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">DigiS\u00f4ter<\/span><\/span>, il intervient en tant que CISO as-a-Service pour le groupe <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">John Cockerill<\/span><\/span>, acteur industriel international majeur. Son expertise couvre la gouvernance cyber, la conformit\u00e9 r\u00e9glementaire, la protection du savoir-faire industriel et la r\u00e9silience op\u00e9rationnelle.<\/p><p data-start=\"775\" data-end=\"1128\" data-is-last-node=\"\" data-is-only-node=\"\">Ancien dirigeant au sein d\u2019organisations telles que <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">AT&amp;T<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">SWIFT<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Euroclear<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">AXA<\/span><\/span> et <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">ING<\/span><\/span>, il se distingue par sa capacit\u00e9 \u00e0 relier enjeux techniques, vision strat\u00e9gique et gouvernance ex\u00e9cutive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2499efb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2499efb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-42ec9d4\" data-id=\"42ec9d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6dc5765 elementor-widget elementor-widget-image\" data-id=\"6dc5765\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"790\" height=\"490\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.39.32.png\" class=\"attachment-large size-large wp-image-4101\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.39.32.png 790w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.39.32-768x476.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.39.32-18x12.png 18w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fec0582\" data-id=\"fec0582\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e7f026 elementor-widget elementor-widget-spacer\" data-id=\"3e7f026\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7630a67 elementor-widget elementor-widget-text-editor\" data-id=\"7630a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Taco Mulder<\/strong> currently holds the role of Federal CISO.<\/p><p>In this role, he supports federal organizations in increasing information security maturity through governance, cooperation, and coordination in major information-and cybersecurity initiatives.<\/p><p>His NIS2 centered moto is:<i>\u00a0\u201ccompliance through security, NOT security through compliance\u201d<\/i>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4491244 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4491244\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-45117f1\" data-id=\"45117f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c430f75 elementor-widget elementor-widget-image\" data-id=\"c430f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/steven-maas-1718321\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1576\" height=\"972\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.00.52.png\" class=\"attachment-large size-large wp-image-4221\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.00.52.png 1576w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.00.52-768x474.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.00.52-1536x947.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.00.52-18x12.png 18w\" sizes=\"(max-width: 1576px) 100vw, 1576px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9f68b5c\" data-id=\"9f68b5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18b00c6 elementor-widget elementor-widget-text-editor\" data-id=\"18b00c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-(--header-height)\" dir=\"auto\" data-turn-id=\"34cfe9b2-b70b-4011-8b7d-9dd65b43d93a\" data-testid=\"conversation-turn-1\" data-scroll-anchor=\"false\" data-turn=\"user\"><\/section><section class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:0c10c988-3f1b-4bd3-80df-d3b6b10584d3-0\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"false\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm\/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg\/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\"><div class=\"flex max-w-full flex-col gap-4 grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;]:mt-1\" dir=\"auto\" tabindex=\"0\" data-message-author-role=\"assistant\" data-message-id=\"16104a86-3a6b-4bc6-bf21-6a5c5f4915a7\" data-message-model-slug=\"gpt-5-3\" data-turn-start-message=\"true\"><div class=\"flex w-full flex-col gap-1 empty:hidden\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"0\" data-end=\"182\"><strong>Steven Maas<\/strong> est un professionnel de la s\u00e9curit\u00e9 des donn\u00e9es chez <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Thales<\/span><\/span>, acteur majeur des technologies avanc\u00e9es (d\u00e9fense, a\u00e9rospatial, cybers\u00e9curit\u00e9).<\/p><p data-start=\"184\" data-end=\"348\">En tant que Regional Sales Director BeNeLux, il d\u00e9veloppe des solutions \u00e0 forte valeur pour des environnements critiques, au service des secteurs publics et priv\u00e9s.<\/p><p data-start=\"350\" data-end=\"497\">Il se distingue par sa capacit\u00e9 \u00e0 piloter des projets techniques complexes avec un haut niveau d\u2019exigence en mati\u00e8re de s\u00e9curit\u00e9 et de performance.<\/p><p data-start=\"499\" data-end=\"620\" data-is-last-node=\"\" data-is-only-node=\"\">Il intervient notamment sur des sujets comme la cryptographie post-quantique, la souverainet\u00e9 num\u00e9rique et la conformit\u00e9.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-950a9dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"950a9dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-706b655\" data-id=\"706b655\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed0b2c4 elementor-widget elementor-widget-image\" data-id=\"ed0b2c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/ignacio-berrozpe\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1580\" height=\"990\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.02.45.png\" class=\"attachment-large size-large wp-image-4225\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.02.45.png 1580w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.02.45-768x481.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.02.45-1536x962.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.02.45-18x12.png 18w\" sizes=\"(max-width: 1580px) 100vw, 1580px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3222bee\" data-id=\"3222bee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12cc22a elementor-widget elementor-widget-text-editor\" data-id=\"12cc22a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"126\"><strong>Ignacio Berrozpe<\/strong> est ing\u00e9nieur en \u00e9lectronique et t\u00e9l\u00e9communications avec 25 ans d\u2019exp\u00e9rience dans les r\u00e9seaux et la s\u00e9curit\u00e9.<\/p><p data-start=\"128\" data-end=\"389\">Il a occup\u00e9 des postes \u00e0 responsabilit\u00e9 chez <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Nortel<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Nokia<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Check Point Software Technologies<\/span><\/span> et <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">RSA Security<\/span><\/span>, principalement en Sales Engineering et gestion de projets.<\/p><p data-start=\"391\" data-end=\"571\" data-is-last-node=\"\" data-is-only-node=\"\">Depuis 2016, il travaille chez <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Thales<\/span><\/span> comme conseiller technique sur les solutions de chiffrement, cloud, protection des donn\u00e9es et gestion des cl\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc21f50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc21f50\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2cc8ab1\" data-id=\"2cc8ab1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc23f1f elementor-widget elementor-widget-image\" data-id=\"fc23f1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/ronmukherjee\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1304\" height=\"808\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.48.23.png\" class=\"attachment-large size-large wp-image-3993\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.48.23.png 1304w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.48.23-768x476.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.48.23-18x12.png 18w\" sizes=\"(max-width: 1304px) 100vw, 1304px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1e9f729\" data-id=\"1e9f729\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a44cefe elementor-widget elementor-widget-text-editor\" data-id=\"a44cefe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"172\" data-end=\"574\"><strong>Ron Mukherjee<\/strong> poss\u00e8de 28 ans d\u2019exp\u00e9rience en d\u00e9veloppement commercial international et en management. Depuis 2016, il est sp\u00e9cialis\u00e9 en cybers\u00e9curit\u00e9 et en blockchain, et exerce aujourd\u2019hui en tant que Cyber Security Consultant chez <strong><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">ESET<\/span><\/span> Belux<\/strong>, o\u00f9 il accompagne les organisations dans leur transformation et leur croissance dans un environnement en constante \u00e9volution.<\/p><p data-start=\"576\" data-end=\"948\" data-is-last-node=\"\" data-is-only-node=\"\">Fort d\u2019un r\u00e9seau \u00e9tendu dans les r\u00e9gions du Benelux et du DACH, il accompagne les entreprises dans la concr\u00e9tisation de leur vision strat\u00e9gique. Ses domaines d\u2019expertise incluent la cybers\u00e9curit\u00e9 et la confiance num\u00e9rique, le threat intelligence, la conformit\u00e9 europ\u00e9enne, le conseil cloud, la s\u00e9curit\u00e9 OT-IoT, la blockchain, ainsi que la transformation digitale et agile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c56445 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c56445\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0d27814\" data-id=\"0d27814\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-893b218 elementor-widget elementor-widget-image\" data-id=\"893b218\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/julienwinkin\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1302\" height=\"806\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.54.19.png\" class=\"attachment-large size-large wp-image-3998\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.54.19.png 1302w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.54.19-768x475.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.54.19-18x12.png 18w\" sizes=\"(max-width: 1302px) 100vw, 1302px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c42d9b0\" data-id=\"c42d9b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-442b9c2 elementor-widget elementor-widget-text-editor\" data-id=\"442b9c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"84\" data-end=\"444\"><strong>Julien Winkin<\/strong> accompagne depuis plus de dix ans les organisations publiques et priv\u00e9es dans la structuration de leur cybers\u00e9curit\u00e9 et de leur conformit\u00e9 r\u00e9glementaire au sein de <strong><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Luxgap<\/span><\/span><\/strong>.<\/p><p data-start=\"84\" data-end=\"444\">\u00c9lu DPO de l\u2019ann\u00e9e 2023, il intervient en tant que DPO et CISO externe, avec une approche r\u00e9solument orient\u00e9e vers les r\u00e9sultats op\u00e9rationnels.<\/p><p data-start=\"446\" data-end=\"693\">Son expertise couvre la protection des donn\u00e9es, le threat intelligence, la continuit\u00e9 d\u2019activit\u00e9 ainsi que l\u2019anticipation des cybermenaces, en conformit\u00e9 avec les principaux cadres r\u00e9glementaires europ\u00e9ens tels que le RGPD, NIS2, DORA et l\u2019AI Act.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-207ddd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"207ddd7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dcf4f40\" data-id=\"dcf4f40\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a42d18e elementor-widget elementor-widget-image\" data-id=\"a42d18e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/toonvandenbergh\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1306\" height=\"814\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.58.16.png\" class=\"attachment-large size-large wp-image-4003\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.58.16.png 1306w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.58.16-768x479.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-11.58.16-18x12.png 18w\" sizes=\"(max-width: 1306px) 100vw, 1306px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-962aa49\" data-id=\"962aa49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fffe72 elementor-widget elementor-widget-text-editor\" data-id=\"9fffe72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"186\" data-end=\"590\"><strong>Toon Van den Bergh<\/strong> \u00e9volue depuis plus de 20 ans \u00e0 l\u2019intersection des technologies logicielles, de la cybers\u00e9curit\u00e9 et des environnements internationaux.<\/p><p data-start=\"186\" data-end=\"590\">Aujourd\u2019hui Senior Account Manager chez <strong><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">OpenText<\/span><\/span> Cybersecurity<\/strong>, il accompagne les organisations sur les enjeux li\u00e9s \u00e0 la s\u00e9curit\u00e9 applicative, \u00e0 la r\u00e9silience num\u00e9rique et \u00e0 la transformation des syst\u00e8mes d\u2019information.<\/p><p data-start=\"592\" data-end=\"1091\">Son parcours\u00a0lui a permis de d\u00e9velopper une vision \u00e0 la fois strat\u00e9gique et op\u00e9rationnelle des d\u00e9fis cyber contemporains. Habitu\u00e9 aux \u00e9changes avec les \u00e9quipes dirigeantes comme avec les \u00e9quipes techniques, il apporte un regard structur\u00e9 sur l\u2019\u00e9volution des menaces, la s\u00e9curisation des environnements num\u00e9riques et les transformations induites par l\u2019IA et le DevSecOps.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e00b86a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e00b86a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2626e3b\" data-id=\"2626e3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8984e2c elementor-widget elementor-widget-image\" data-id=\"8984e2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/gw%C3%A9na%C3%ABlle-herv%C3%A9-295b2b37\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1300\" height=\"806\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-12.05.23.png\" class=\"attachment-large size-large wp-image-4008\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-12.05.23.png 1300w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-12.05.23-768x476.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-12.05.23-18x12.png 18w\" sizes=\"(max-width: 1300px) 100vw, 1300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7174eaf\" data-id=\"7174eaf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5075f6d elementor-widget elementor-widget-text-editor\" data-id=\"5075f6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"90\" data-end=\"496\"><strong>Gw\u00e9na\u00eblle Herv\u00e9<\/strong> pilote \u00e0 l\u2019\u00e9chelle du Benelux la strat\u00e9gie de <strong><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Proximus NXT<\/span><\/span><\/strong> en mati\u00e8re de cloud souverain. \u00c0 la t\u00eate d\u2019une \u00e9quipe transverse interr\u00e9gionale, elle d\u00e9finit les orientations strat\u00e9giques, les choix d\u2019investissement et l\u2019approche march\u00e9 visant \u00e0 renforcer le positionnement de <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Proximus NXT<\/span><\/span> comme acteur de r\u00e9f\u00e9rence de la souverainet\u00e9 num\u00e9rique.<\/p><p data-start=\"498\" data-end=\"902\" data-is-last-node=\"\" data-is-only-node=\"\">Son r\u00f4le l\u2019am\u00e8ne \u00e0 intervenir au croisement des enjeux technologiques, r\u00e9glementaires et g\u00e9ostrat\u00e9giques li\u00e9s \u00e0 la ma\u00eetrise des infrastructures num\u00e9riques et \u00e0 la protection des donn\u00e9es. Gr\u00e2ce \u00e0 une vision \u00e0 la fois strat\u00e9gique et op\u00e9rationnelle, elle accompagne la transformation des organisations face aux d\u00e9fis croissants du cloud, de la r\u00e9silience num\u00e9rique et de l\u2019autonomie technologique en Europe.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8ec0d55 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8ec0d55\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d4ce51f\" data-id=\"d4ce51f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31516d4 elementor-widget elementor-widget-image\" data-id=\"31516d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/christian-deboeck\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.26.56.png\" title=\"Capture d\u2019e\u0301cran 2026-04-14 a\u0300 10.26.56\" alt=\"Capture d\u2019e\u0301cran 2026-04-14 a\u0300 10.26.56\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3cdaa11\" data-id=\"3cdaa11\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-699789e elementor-widget elementor-widget-text-editor\" data-id=\"699789e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Christian De Boeck<\/strong> est expert en r\u00e9silience organisationnelle, gestion de crise et transformation strat\u00e9gique, avec plus de 25 ans d\u2019exp\u00e9rience.\u00a0<\/p><p>Avec<strong> SYNERGIT<\/strong>, il accompagne depuis plus de 11 ans les entreprises dans l\u2019anticipation et la gestion de crises li\u00e9es aux risques IT, organisationnels, humains et environnementaux.\u00a0<\/p><p>Son expertise couvre principalement la continuit\u00e9 d\u2019activit\u00e9, la cyber-r\u00e9silience, le coaching du leadership et la transition bas carbone, avec une approche transversale et pragmatique orient\u00e9e vers des solutions durables.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d750a1a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d750a1a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1eb0ed5\" data-id=\"1eb0ed5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0d4c94 elementor-widget elementor-widget-image\" data-id=\"b0d4c94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/gregory-descamps-mbci-73080660\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1582\" height=\"980\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.32.40.png\" class=\"attachment-large size-large wp-image-3939\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.32.40.png 1582w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.32.40-768x476.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.32.40-1536x952.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.32.40-18x12.png 18w\" sizes=\"(max-width: 1582px) 100vw, 1582px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fd68371\" data-id=\"fd68371\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e2d2067 elementor-widget elementor-widget-text-editor\" data-id=\"e2d2067\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"57\" data-end=\"473\"><strong>Gregory Descamps<\/strong> est un expert en continuit\u00e9 d\u2019activit\u00e9, gestion de crise et r\u00e9silience organisationnelle, avec plus de dix ans d\u2019exp\u00e9rience au sein de groupes internationaux tels que UCB et GSK. En tant qu\u2019Enterprise Business Continuity Lead chez UCB, il accompagne les organisations dans l\u2019anticipation des risques, la protection des op\u00e9rations critiques et le renforcement de leur r\u00e9silience face aux disruptions.<\/p><p data-start=\"475\" data-end=\"833\" data-is-last-node=\"\" data-is-only-node=\"\">Reconnu pour son approche strat\u00e9gique et humaine, il intervient r\u00e9guli\u00e8rement sur les enjeux de gestion de crise et contribue activement au d\u00e9veloppement de la communaut\u00e9 professionnelle, notamment \u00e0 travers le chapitre belge du Business Continuity Institute (BCI). Son expertise allie vision strat\u00e9gique, excellence op\u00e9rationnelle et accompagnement du changement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-604624b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"604624b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b437df1\" data-id=\"b437df1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1122e13 elementor-widget elementor-widget-image\" data-id=\"1122e13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/fabien-beneteau\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1588\" height=\"982\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.27.21.png\" class=\"attachment-large size-large wp-image-3928\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.27.21.png 1588w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.27.21-768x475.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.27.21-1536x950.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.27.21-18x12.png 18w\" sizes=\"(max-width: 1588px) 100vw, 1588px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b2309e1\" data-id=\"b2309e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a47cb77 elementor-widget elementor-widget-text-editor\" data-id=\"a47cb77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"492\"><strong>Fabien B\u00e9n\u00e9teau<\/strong> a rejoint <strong>F24<\/strong> en mai 2018 et occupe d\u00e9sormais le poste de responsable des ventes et du marketing pour le Benelux. Fort d\u2019une solide expertise du march\u00e9 et d\u2019une compr\u00e9hension approfondie des enjeux sp\u00e9cifiques \u00e0 la r\u00e9gion, il joue un r\u00f4le cl\u00e9 dans le d\u00e9veloppement strat\u00e9gique de F24. Fabien se distingue par sa capacit\u00e9 \u00e0 analyser les besoins des organisations, \u00e0 anticiper les tendances du secteur et \u00e0 proposer des solutions alliant innovation et efficacit\u00e9 op\u00e9rationnelle.<\/p><p data-start=\"0\" data-end=\"492\">Reconnu pour son approche collaborative et centr\u00e9e sur l\u2019humain, il construit des relations durables avec les clients et les partenaires tout en favorisant la confiance indispensable \u00e0 la r\u00e9ussite de projets d\u2019envergure. Fabien incarne pleinement les valeurs d\u2019excellence, d\u2019engagement et de performance qui font le succ\u00e8s de F24.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1556179 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1556179\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4a02cfb\" data-id=\"4a02cfb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91f5357 elementor-widget elementor-widget-image\" data-id=\"91f5357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/roycoppieters\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"788\" height=\"489\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.30.13.png\" class=\"attachment-large size-large wp-image-4074\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.30.13.png 788w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.30.13-768x477.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-16-a-14.30.13-18x12.png 18w\" sizes=\"(max-width: 788px) 100vw, 788px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-96da6c5\" data-id=\"96da6c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15ed35e elementor-widget elementor-widget-text-editor\" data-id=\"15ed35e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"101\" data-end=\"480\"><strong>Roy Coppieters<\/strong> est directeur sp\u00e9cialis\u00e9 en r\u00e9silience organisationnelle, continuit\u00e9 d\u2019activit\u00e9 et gestion de crise. Fort de plus de 17 ans d\u2019exp\u00e9rience dans les secteurs public et priv\u00e9, \u00e0 l\u2019\u00e9chelle nationale et internationale, \u00e0 a t\u00eate de l\u2019\u00e9quipe r\u00e9silience en Belgique, il accompagne chez <strong>PwC<\/strong> les organisations dans leur capacit\u00e9 \u00e0 anticiper, g\u00e9rer et surmonter les disruptions majeures.<\/p><p data-start=\"482\" data-end=\"856\">Dipl\u00f4m\u00e9 en criminologie, il associe une solide expertise analytique \u00e0 une forte sensibilit\u00e9 aux enjeux technologiques et strat\u00e9giques. Son exp\u00e9rience couvre la mise en \u0153uvre de cadres de r\u00e9silience, la gestion des risques op\u00e9rationnels, les simulations de crise, le coaching de dirigeants ainsi que la protection des infrastructures critiques face aux menaces g\u00e9opolitiques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aab8297 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aab8297\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-992e2e2\" data-id=\"992e2e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd359e2 elementor-widget elementor-widget-image\" data-id=\"cd359e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/olivier-labbe-capdc\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1586\" height=\"984\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.46.08.png\" class=\"attachment-large size-large wp-image-3958\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.46.08.png 1586w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.46.08-768x476.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.46.08-1536x953.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-14-a-10.46.08-18x12.png 18w\" sizes=\"(max-width: 1586px) 100vw, 1586px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e701919\" data-id=\"e701919\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6da871 elementor-widget elementor-widget-text-editor\" data-id=\"b6da871\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"127\" data-end=\"443\"><strong>Olivier Labb\u00e9<\/strong> est un expert reconnu dans le secteur des infrastructures num\u00e9riques et des datacenters. Pr\u00e9sident de <strong><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">VIA DC<\/span><\/span><\/strong>, il accompagne investisseurs, op\u00e9rateurs et institutions dans le d\u00e9veloppement, la s\u00e9curisation et l\u2019optimisation de projets de datacenters \u00e0 travers l\u2019Europe.<\/p><p data-start=\"445\" data-end=\"962\" data-is-last-node=\"\" data-is-only-node=\"\">Fort d\u2019un parcours construit autour des infrastructures informatiques et du d\u00e9veloppement strat\u00e9gique, il allie expertise technique, vision internationale et engagement fort pour l\u2019innovation durable. Il se distingue notamment par son travail sur la performance \u00e9nerg\u00e9tique des datacenters et par son implication dans des solutions visant \u00e0 r\u00e9duire l\u2019empreinte environnementale du num\u00e9rique. Sa connaissance approfondie du march\u00e9 europ\u00e9en fait de lui une r\u00e9f\u00e9rence dans le d\u00e9veloppement des infrastructures critiques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-900aed3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"900aed3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7d64145\" data-id=\"7d64145\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a964c72 elementor-widget elementor-widget-image\" data-id=\"a964c72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/yann-pitollet-46b24230\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"792\" height=\"493\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-16.53.34.png\" class=\"attachment-large size-large wp-image-4249\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-16.53.34.png 792w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-16.53.34-768x478.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-16.53.34-18x12.png 18w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-355709a\" data-id=\"355709a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c23ab23 elementor-widget elementor-widget-text-editor\" data-id=\"c23ab23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong data-start=\"57\" data-end=\"98\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Yann PITOLLET<\/span><\/span><\/strong> est le CEO de <strong>Nord France Invest<\/strong> \u2013 l\u2019agence de promotion \u00e9conomique de la r\u00e9gion Hauts-de-France. \u00c0 ce poste depuis janvier 2017, il pilote l\u2019attractivit\u00e9 du territoire aupr\u00e8s des investisseurs internationaux, suite \u00e0 la fusion des anciennes r\u00e9gions Nord-Pas-de-Calais et Picardie.<\/p><p>Bas\u00e9 \u00e0 Lille, il cumule plus de 15 ans d\u2019exp\u00e9rience au sein de l\u2019organisation et \u0153uvre au d\u00e9veloppement \u00e9conomique r\u00e9gional en accompagnant l\u2019implantation d\u2019entreprises \u00e9trang\u00e8res, contribuant ainsi au dynamisme d\u2019un territoire qui accueille d\u00e9j\u00e0 plus de 1 800 soci\u00e9t\u00e9s internationales.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f1d6176 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1d6176\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f8f5ae8\" data-id=\"f8f5ae8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3bfb9b elementor-widget elementor-widget-image\" data-id=\"f3bfb9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/jprooseleer\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1580\" height=\"974\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.15.25.png\" class=\"attachment-large size-large wp-image-4234\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.15.25.png 1580w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.15.25-768x473.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.15.25-1536x947.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.15.25-18x12.png 18w\" sizes=\"(max-width: 1580px) 100vw, 1580px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-52c9fd3\" data-id=\"52c9fd3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32c1e43 elementor-widget elementor-widget-text-editor\" data-id=\"32c1e43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"197\" data-end=\"429\"><strong>Jean Paul Rooseleer<\/strong> est un professionnel bas\u00e9 en Belgique, avec plus de 13 ans d\u2019exp\u00e9rience chez <strong><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Reichle &amp; De-Massari<\/span><\/span><\/strong>, o\u00f9 il a contribu\u00e9 au d\u00e9veloppement commercial dans des environnements exigeants et en constante \u00e9volution.<\/p><p data-start=\"431\" data-end=\"629\">Sp\u00e9cialiste du management commercial et des strat\u00e9gies go-to-market, il accompagne les organisations dans l\u2019optimisation de leur performance et le d\u00e9ploiement efficace de leurs offres sur le march\u00e9.<\/p><p data-start=\"631\" data-end=\"840\">Entre vision strat\u00e9gique et ex\u00e9cution op\u00e9rationnelle, il se distingue par son leadership, son sens du r\u00e9sultat et sa capacit\u00e9 \u00e0 piloter des initiatives \u00e0 fort impact dans des contextes complexes.<\/p><p data-start=\"842\" data-end=\"966\" data-is-last-node=\"\" data-is-only-node=\"\">Trilingue (n\u00e9erlandais, anglais, fran\u00e7ais), il \u00e9volue avec aisance dans des environnements internationaux et multiculturels.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6fe2c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6fe2c1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e77920f\" data-id=\"e77920f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b72f6d7 elementor-widget elementor-widget-image\" data-id=\"b72f6d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/cdehaeze\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1588\" height=\"988\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.20.33.png\" class=\"attachment-large size-large wp-image-4239\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.20.33.png 1588w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.20.33-768x478.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.20.33-1536x956.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Capture-decran-2026-04-22-a-14.20.33-18x12.png 18w\" sizes=\"(max-width: 1588px) 100vw, 1588px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8fe5ce8\" data-id=\"8fe5ce8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a51fbe8 elementor-widget elementor-widget-text-editor\" data-id=\"a51fbe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"0\" data-end=\"215\">Ing\u00e9nieur de formation, <strong>Charles Dehaeze<\/strong> a repris <strong>Straton DCIM<\/strong> en 2022 et conduit depuis son expansion en Europe, en positionnant la solution comme un levier strat\u00e9gique pour la gestion des infrastructures critiques.<\/p><p data-start=\"217\" data-end=\"443\">\u00c0 la crois\u00e9e des enjeux techniques et op\u00e9rationnels, il accompagne les exploitants de datacenters dans la ma\u00eetrise de leurs environnements complexes, en proposant des outils concrets, orient\u00e9s performance et prise de d\u00e9cision.<\/p><p data-start=\"445\" data-end=\"669\" data-is-last-node=\"\" data-is-only-node=\"\">Son approche, ancr\u00e9e dans une forte culture d\u2019ing\u00e9nierie, vise \u00e0 simplifier le pilotage quotidien, am\u00e9liorer la visibilit\u00e9 sur les op\u00e9rations et renforcer l\u2019efficacit\u00e9 globale des \u00e9quipes dans des contextes \u00e0 haute exigence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>En savoir plus sur les speakers de la journ\u00e9e : Philippe Cornette est une figure reconnue de la cybers\u00e9curit\u00e9 en Belgique, \u00e9lu CISO of the Year 2025, et fondateur de DigiS\u00f4ter. Fort de plus de 35 ans d\u2019exp\u00e9rience en informatique, cybers\u00e9curit\u00e9 et gestion des risques, il accompagne les organisations dans la transformation du risque cyber [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4214","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/4214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/comments?post=4214"}],"version-history":[{"count":19,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/4214\/revisions"}],"predecessor-version":[{"id":4253,"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/pages\/4214\/revisions\/4253"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/en\/wp-json\/wp\/v2\/media?parent=4214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}