Unite your superpowers at

Spotit Inspire

25 September 2025 | Van der Valk Gent

Super connected. Super secured.

Cyber threats are evolving fast. Networks are growing more complex by the day. It’s time to step up, to unleash your superpowers, and become the driving force behind your organisation’s resilience. Let’s join forces and unite our strengths at Spotit Inspire 2025.

 

At Spotit Inspire, industry leaders, experts, and innovators come together to share the latest insights in cybersecurity and networking so you can stay ahead of the curve.

 

Expect a full day of inspiring keynotes, interactive sessions, and hands-on strategies to help you stay super connected and super secured. Because with the right knowledge and the right tools, your superpowers can truly shine, empowering you to connect and protect what matters most to your organisation.

 

25 September 2025

Van der Valk Gent

 

More info will follow soon!

5 reasons why you should attend

1. Gain exclusive insights from key-note speakers and industry professionals

2. Get up to speed with the latest trends in cybersecurity & networking

3. Meet professionals, industry leaders, and peers

4. Get first-hand experience and knowledge from real-life customer cases

5. Enjoy our mysterious special act ;)

Register now

Agenda

Get ready for a day packed with actionable insights and forward-thinking strategies in cybersecurity and networking.

At Spotit Inspire 2025, we’ll dive into today’s most urgent challenges and tomorrow’s biggest opportunities. While the full agenda is still under wraps, here’s a first look at some of the topics you can expect:

🔹 The evolving landscape of identity protection

🔹 Intelligent automation in network operations

🔹 Keeping critical infrastructure safe with OT security

🔹 How to leverage AI securely in your organisation

🔹 Real-world trends, data, and challenges shaping the industry

🔹 A behind-the-scenes look at red and blue teaming in action

These sessions will offer practical advice, expert insights, and real-life use cases to help you stay super connected and super secured.

 

11:30 - 13:00 Welcome & lunch
13:00 - 13:20 Why you are a true cybersecurity & networking hero - by spotit CEO Steven Vynckier
13:20 - 14:00 Looking back and forward on the Belgian cybersecurity landscape - by CCB director-general Miguel De Bruycker
14:00 - 14:25 From complexity to clarity: the latest innovations in cybersecurity - by Palo Alto Networks
14:25 - 14:45 Beyond connectivity: the future of the network as intelligent, secure and agile business enabler - by Cisco
Start break-out sessions
14:55 - 15:25 Passkeys: the only way to get phish-resistant? Smart Automation in Network Operations: tips & use cases Enabling the secure use of AI in your organization
15:40 - 16:10 Rebuilding your virtual security perimeter to modern user scenario Robust OT Network & Security solutions to protect your supply chain The Silent Breach: cyber security blind spots in leadership teams 
End break-out sessions
16:20 - 16:50 Customer testimonial
16:50 - 17:30 Red/Blue teaming: how to be the hero in case of a cyber attack - by spotit offensive security team
17:30 - 17:45 Closing - what insights must I absolutely tell to my colleagues, boss & friends?
17:45 - 18:15 Raising a glass together
18:15 - 19:00 Special act
19:00 - 21:00 Walking dinner & networking event

 

Learn more about the break-out sessions:

Passkeys: the only way to get phish-resistant 

Phishing remains a top threat, even with MFA. Passkeys offer a breakthrough: a user-friendly, secure login method that eliminates shared secrets and resists phishing by design. Backed by the FIDO Alliance and integrated into platforms like Microsoft Entra ID, passkeys are reshaping authentication. This session explores their strategic value and practical implementation to help future-proof your identity security.

Rebuilding your virtual security perimeter to modern user scenario

What's the worst that could happen? A contractor on a personal device. An employee checking email on their phone. We’ve all seen the blurred lines between personal and professional — and we know the risks.
This session dives into real scenarios where traditional IT policies fall short, and how Prisma Access Browser is changing the game. It’s a practical look at what secure browsing can do — not in theory, but in daily operations.

Smart Automation in Network Operations: tips & use cases

Manual configurations are slow, error-prone, and leave little room to keep up with change. Automation flips the script — delivering speed, consistency, and built-in security without the risks of human error. From faster onboarding to seamless policy enforcement and effortless compliance, automation builds a scalable IT environment that’s not just efficient, but future-proof.

Robust OT Network & Security solutions to protect your supply chain

OT environments have never faced more pressure. Between growing cyber threats and fragile supply chains, the stakes have never been higher.
In this session, we’ll walk you through how organisations like yours are building resilient OT infrastructures — drawing from hands-on projects we’ve delivered over the past year. You’ll discover how the right mix of network design, monitoring, and layered protection can turn operational chaos into secure continuity.

Enabling the secure use of AI in your organization

AI is a hot topic. It offers vast possibilities and comes with equally vast challenges and risks. In this presentation, we separate fact from hype, go over the organisational and technical ways to enable the secure usage of AI, and put you on track to develop an AI Strategy for your organisation.

The Silent Breach: cyber security blind spots in leadership teams

Cyberwolf CEO Daan Gheysens takes you through the remarkable results of 100+ cyber exposure assessments for top executives worldwide.

How to be the hero in case of a cyber attack

In this duo presentation, the spotit offensive security team will demonstrate real-world attack techniques used by adversaries, while the spotit SOC team will break down how to detect, prevent, and respond to them effectively. You'll gain insight into the attacker mindset and the corresponding defensive strategies that can stop threats in their tracks, and walk away with practical knowledge on common attack vectors, how they unfold, and actionable steps to strengthen your security posture. This session bridges the gap between offense and defense because understanding both sides is key to staying ahead.

Sponsors-Spotit-Inspire-2025