25 September 2025 | Van der Valk Gent
Cyber threats are evolving fast. Networks are growing more complex by the day. It’s time to step up, to unleash your superpowers, and become the driving force behind your organisation’s resilience. Let’s join forces and unite our strengths at Spotit Inspire 2025.
At Spotit Inspire, industry leaders, experts, and innovators come together to share the latest insights in cybersecurity and networking so you can stay ahead of the curve.
Expect a full day of inspiring keynotes, interactive sessions, and hands-on strategies to help you stay super connected and super secured. Because with the right knowledge and the right tools, your superpowers can truly shine, empowering you to connect and protect what matters most to your organisation.
25 September 2025
Van der Valk Gent
More info will follow soon!
1. Gain exclusive insights from key-note speakers and industry professionals
2. Get up to speed with the latest trends in cybersecurity & networking
3. Meet professionals, industry leaders, and peers
4. Get first-hand experience and knowledge from real-life customer cases
5. Enjoy our mysterious special act ;)
Agenda
Get ready for a day packed with actionable insights and forward-thinking strategies in cybersecurity and networking.
At Spotit Inspire 2025, we’ll dive into today’s most urgent challenges and tomorrow’s biggest opportunities. While the full agenda is still under wraps, here’s a first look at some of the topics you can expect:
🔹 The evolving landscape of identity protection
🔹 Intelligent automation in network operations
🔹 Keeping critical infrastructure safe with OT security
🔹 How to leverage AI securely in your organisation
🔹 Real-world trends, data, and challenges shaping the industry
🔹 A behind-the-scenes look at red and blue teaming in action
These sessions will offer practical advice, expert insights, and real-life use cases to help you stay super connected and super secured.
11:30 - 13:00 | Welcome & lunch | ||
13:00 - 13:20 | Why you are a true cybersecurity & networking hero - by spotit CEO Steven Vynckier | ||
13:20 - 14:00 | Looking back and forward on the Belgian cybersecurity landscape - by CCB director-general Miguel De Bruycker | ||
14:00 - 14:25 | From complexity to clarity: the latest innovations in cybersecurity - by Palo Alto Networks | ||
14:25 - 14:45 | Beyond connectivity: the future of the network as intelligent, secure and agile business enabler - by Cisco | ||
Start break-out sessions | |||
14:55 - 15:25 | Passkeys: the only way to get phish-resistant? | Smart Automation in Network Operations: tips & use cases | Enabling the secure use of AI in your organization |
15:40 - 16:10 | Rebuilding your virtual security perimeter to modern user scenario | Robust OT Network & Security solutions to protect your supply chain | The Silent Breach: cyber security blind spots in leadership teams |
End break-out sessions | |||
16:20 - 16:50 | Customer testimonial | ||
16:50 - 17:30 | Red/Blue teaming: how to be the hero in case of a cyber attack - by spotit offensive security team | ||
17:30 - 17:45 | Closing - what insights must I absolutely tell to my colleagues, boss & friends? | ||
17:45 - 18:15 | Raising a glass together | ||
18:15 - 19:00 | Special act | ||
19:00 - 21:00 | Walking dinner & networking event |
Passkeys: the only way to get phish-resistant
Phishing remains a top threat, even with MFA. Passkeys offer a breakthrough: a user-friendly, secure login method that eliminates shared secrets and resists phishing by design. Backed by the FIDO Alliance and integrated into platforms like Microsoft Entra ID, passkeys are reshaping authentication. This session explores their strategic value and practical implementation to help future-proof your identity security.
Rebuilding your virtual security perimeter to modern user scenario
What's the worst that could happen? A contractor on a personal device. An employee checking email on their phone. We’ve all seen the blurred lines between personal and professional — and we know the risks.
This session dives into real scenarios where traditional IT policies fall short, and how Prisma Access Browser is changing the game. It’s a practical look at what secure browsing can do — not in theory, but in daily operations.
Smart Automation in Network Operations: tips & use cases
Manual configurations are slow, error-prone, and leave little room to keep up with change. Automation flips the script — delivering speed, consistency, and built-in security without the risks of human error. From faster onboarding to seamless policy enforcement and effortless compliance, automation builds a scalable IT environment that’s not just efficient, but future-proof.
Robust OT Network & Security solutions to protect your supply chain
OT environments have never faced more pressure. Between growing cyber threats and fragile supply chains, the stakes have never been higher.
In this session, we’ll walk you through how organisations like yours are building resilient OT infrastructures — drawing from hands-on projects we’ve delivered over the past year. You’ll discover how the right mix of network design, monitoring, and layered protection can turn operational chaos into secure continuity.
Enabling the secure use of AI in your organization
AI is a hot topic. It offers vast possibilities and comes with equally vast challenges and risks. In this presentation, we separate fact from hype, go over the organisational and technical ways to enable the secure usage of AI, and put you on track to develop an AI Strategy for your organisation.
The Silent Breach: cyber security blind spots in leadership teams
Cyberwolf CEO Daan Gheysens takes you through the remarkable results of 100+ cyber exposure assessments for top executives worldwide.
How to be the hero in case of a cyber attack
In this duo presentation, the spotit offensive security team will demonstrate real-world attack techniques used by adversaries, while the spotit SOC team will break down how to detect, prevent, and respond to them effectively. You'll gain insight into the attacker mindset and the corresponding defensive strategies that can stop threats in their tracks, and walk away with practical knowledge on common attack vectors, how they unfold, and actionable steps to strengthen your security posture. This session bridges the gap between offense and defense because understanding both sides is key to staying ahead.