Ulrich Seldeslachts

Ulrich Seldeslachts

Landscape 5G FENG2 

Session 8 : June 2nd : 5G security use cases and how 5G can trigger new security businesses and opportunities - 5G Series part 4 - Zhang Feng, Manager Research Support Center China Mobile

5G entails new cybersecurity technique such as network virtualization and slicing and dicing. Different techniques inteneded to furter solidify mobile data and voice traffic. Buth 5G is also fast and unlocks new potential of many other use cases.   Through this webinar, you will discover a detailed overview of the functioning of 5G Cybersecurity functionality, how 3GPP organization is defining high-demanding standard in terms of security, applicable to all telco vendors and a concrete example of key security features and approach implemented by one of the major telco vendors.


The other LSEC Webinar Series : 

* LSEC CyberSecurity Experts from Home : with FireEye, Mandiant, Huawei, G Data CyberDefense, ... 
* LSEC Industrial CyberSecurity Series : with Engie Cybersecurity, Mandiant, Trend Micro, Phoenix Contact, Flanders Food
* LSEC Data Protection Series & GDPR Salon : with KU Leuven, Co-Dex.eu and Isabel
* LSEC Identity & Access Management Series  : with ForgeRock, PwC, ScaledAccess, ...  


Landscape Stalkerware

Since April, we've published our series of webinars, some of them mindblowing and eye opening, some other giving practical and interesting insights and expertise.  

Find them in the different themes, subscribe to all of them or any single one, replay them for your reference and insight and share them with your peers and colleagues. 

April 28th : 

9am : Stalkerware : Eddy Willems; G Data CyberDefense
12pm : Industrial protection against cyberattacks and ransomware : Jan Tietze, SentinelOne and Dieter Sarrazyn, SECUDEA

The LSEC Webinar Series : 

* LSEC CyberSecurity Experts from Home : with FireEye, Mandiant, Huawei, G Data CyberDefense, ... 
* LSEC Industrial CyberSecurity Series : with Engie Cybersecurity, Mandiant, Trend Micro, Phoenix Contact, Flanders Food
* LSEC Data Protection Series & GDPR Salon : with KU Leuven, Co-Dex.eu and Isabel
* LSEC Identity & Access Management Series  : with ForgeRock, PwC, ScaledAccess, ...  



Register and reserve your seat to get access here : 

Registration URL





970 bannr cybersecurityhome

Extraordinary circumstances require extraordinary measures. Over the last weeks we’ve all progressed from conference call to conference call, and we’re inviting you to join just a couple more …

Notwithstanding that we won’t be able to meet face to face for the next couple of weeks, we believe it is important to continue to be connected to your peers and continue to learn from ongoing developments, best practices and up and coming challenges.

The LSEC Webinars from Home aim to provide you key insights in Cybersecurity Management in lockdown, while preparing for recovery. We will be focusing on Cybersecurity developments and Innovations taking place, presenting you a forward looking perspective on new technologies impacting CyberSecurity and Innovations in CyberSecurity, we will be hosting GDPR Salon from the salon, Cloud Security developments, ID&AM developments and industrial cybersecurity.

In a first series, taking place every Tuesday from next April 7th 9AM onwards, we will be focusing on CyberSecurity Management from Home, having experts explaining their better approaches and CyberSecurity Managers’ testimonials with best practices and challenges they’re facing in daily operations with their online teams.



- April 7th : with Bart Vanautgaerden from Mandiant and David Grout CTO from FireEye on current Threat landscapes under COVID-19 and  Managing Cybersecurity from home, managing investigations remotely. 
- April 14th : 5G CyberSecurity capabilties and technologies, an introduction and prospecive for CyberSecurity measures

- April 21st : Managing CyberSecurity teams and dashboarding from home, managing incidents and interventions, CISO panel discussion

- April 28th : How to prepare for a reinstate, reviving from lockdown. A list of things to do. TBD




Register and reserve your seat to get access here : 

Registration URL





Saturday, 21 March 2020 11:00

Cybersecurity from Home - March 19, 2020

thanks to Europol, ENISA and the EC, 2020

In just a couple of weeks, sometimes days we have been introduced to social distancing, isolation and quarantain measures, curfew has been put in place and measures to prevent direct contact in ways we could have only imagined in our worst nightmares. Let's arm ourselves for the next months to see the world mostly from home office, considering a global economy ... 

If you're working from home, or isolated from the office, consider participating in our LSEC from home webinars on cybersecurity, identity, gdpr, and our related topics. 

Wednesday, 29 January 2020 06:05

LSEC CTI 2020, 7th Cyber Threat Intelligence


Already for the 7th time, our annual Cyber Threat Intelligence event attracted cyber security specialists from local organizations and abroad, with speakers from CA, US, Czech Republik, The Netherlands and Germany. Reflections on the use of Cyber Threat Intelligence, and its place in the SOC and Incident Management world, as an integrated part of Cyber Security Management. Whether large or small organizations, and large or small cybersecurity teams, all companies will require some level of oversight and insight in the security threats and related risks posed to them. Cyber Threat Intelligence, supported by multiple platforms in open source (MISP, OpenCTI, ...) or with tools available in the market (EclecticIQ, Maltego, IBM, ...) insight in threat actors, strategies, playbooks, cve's, IoC's and how they relate to you and your organization can be facilitated. Joe Woodruff kicked off with an interesting economical insight into the value for information sharing. Dominik Smoniewski presented the top Red Teaming activities from the ECB and the NBB from TIBER and their impact on the financial institutions, with a call for broadening this activity amongst mature financial services organisations and other sectors. Aaron Cherrington brought to our attention the importance for business continuity in today's challenging Corona Virus dominated news, and warned us to be carefull for hackers stuck at home and developing new ransomware flavors or launching phising campaigns. Both Aish from Maltego and Jason Keirstead from IBM presented their view on intelligence management platforms. An open source oriented perspective, focusing on system integration versus a complete platform including OSINT and commercial feeds. Jan an Nikolaos from Avast gave a perspective on the evolutions of the mobile malwares and how to deal with them. Alain Sanchez presented an inside perspective on Fortinet's apprach and use of ML and AI. Presentations available to participants and members. This email address is being protected from spambots. You need JavaScript enabled to view it. for the link. 

130c78f4 5615 4c4e 8680 21290ee290da 


 For more information and access to the registration pages. 

Friday, 09 August 2019 15:40

ISSE 2019, November 6-7th


ISSE is Europe’s leading independent, interdisciplinary, unbiased and European focused conference. It features the presentation and discussion of technical, commercial, organisational, legal and political challenges for information security as well as privacy and data protection.

Organised by EEMA, a not for profit, independent, pan-European Think Tank, ISSE has built an unrivalled reputation for world-class speakers and a truly independent perspective on the e-security market across Europe. It attracts hundreds of professionals including industry experts, commercial end-users and government policy-makers. In 2018 ISSE returns to Brussels and takes place 6/7th November.


 For more information and access to the registration pages. 

LSEC together with its partners 3IF.be and iot-convention.be organized the 5th 3IF.eu conference and closed the 3IF.be project, but continues with the 3IF.be activities such as the Condition Based Maintenance Fieldlab, the Industrial Dataspace, the Connected Factories activities and the Trinity Cybersecurity for Robotics activities. LSEC and 3IF.eu aim to continue to provide their expertise to companies looking for Industry4.0 related expertise and assistance, either in selecting, discovering, deploying or operating their Industry 4.0 activities. 

LSEC organized the 3IF.eu activities and had many different talks at the 3IF.be conference 2019. For some more pictures, access to presentations and video contents, please visit the program page. 

We welcome you again at the next 3IF.eu conference organized together with iot-convention in 2020, on Wednesday June 10th.  

IoTConvention 2019 02 06 05 31 39

93fb1087 a148 485f ba0b 0e21bb1009dd

Flemish Minister for Innovation Philipp Muyters together with LSEC - 3IF.eu Ulrich Seldeslachts and Guy Verrue, together with Bernard Schrevens, Kulapro; Johan Dekeyzer, Dekeyzer-Ossaer.

3IF Annual Conference 2019 agenda and links.


On November 18-19th, LSEC and the Baqsue Cybersecurity Cluster in cooperation with ECSO organize the first CyberSecurity for Robotics conference in Bilbao, Spain. The conference will be organized in conjunction with the Basque Cybersecurity days November 20 and 21st and the Basque Industry 4.0 The Meeting Point at the Bilbao Exhibition Center - BEC.

This event is organized in close collaboration with the Trinity project and is a result of the workshops organized at the European Robotics Forum 2019. 

The event is intended to both industry and academic cybersecurity experts, users, robotic experts and researchers and aims to bring together all ongoing research acitivities in cybersecurity for robotics, delivering a state of the art and perspectives on future developments.


basqueindustry4 BCSD cabecera solo en  TRINITY right


For an overview of the day and presentation, and the call for papers, take a look at the CSfr2019 Conference Call for papers pages. 

Save the date and join the event. Registrations will be open soon. LSEC Members and 3IF.eu partners will be invited and receiving guest entry for free. 




A day of CSA (Cloud Security Alliance) Belux and LSEC Cloud Security. From vulnerability assessements best practices (Toreon) in the cloud to secdeveops and agile (Bitsensor). From containers and kubernetes developments and their security management challenges (Trend Micro) to key management and hardware keys (ATOS), from Cloud Act to GDPR Code of Conduct (CSA) and Cloud Services Providers certification (TimeLex & LSEC). From cloud application governance (KBC) to layer seven solutions encapsulating all security risks (Symantec). The cloud is omnipresent and not caring is being plain ignorant on some of the most exciting current security developments and related opportunities. Take a look at the perspectives presented on May 14th in Brussels at the Vandervalk Hotel in Diegem. 

Toreon Steven

For an overview of the day and presentation, including a way to contact the presentors and participants, take a look on the day page.



In 2019 customers and partners should be presented one single interface to all of the backend systems of their services providers. They should be able to choose between the different multifactor applications they have, whenever they want and whereever they are. Back and identity and access systems should be agnostic about this and should be ready to be distributed, decentralized, utilising OTP (one time password) and MFA (multifactor authentication) or step up authentication. Not only customers, but systems should be able to provision the complexity of devices, systems, applications and other services. Technologies, expertise and experiences exist to support this in order to reduce digital identity theft, malicious access attempts and still reducing the burden of the customer access control. Identity and Access in the 21st centurt support the digital transformation of organizations, systems and technologies in a seamless way. Financial institutions organize themselves to reduce the administrative burden for their business customers (Isabel) by facilitating KYC (know your customer) amongst themselves, and the respective mandates for financial services. Technologies (Forgerock) support the ease of the single customer accessing multiple legacy back-end services seamlessly. Decentralized and distributed authentication, identification are being made possible (Trustbuilder and KEYP) going towards Zero Knowledge Proof and reducing the burden for personal dataprotection, and providing seamless multifator possibilities. Proving compliance and controlling access throughout multiple systems and cloud environments (Brainwave) for management, audit and DPO can be made easy. Multifactor authentication and OTP increase the security levels, but technologies have lowered the barriers for customers to use them (InWebo). With developments in industry (IDSA) this won't be limited to data interactions within an organization. Walls are being teared down to access company confidential data. A short impression of a day at the races of the LSEC Digital Identities Forum 2019 held on April 25th in Brussels at the Vandervalk Hotel in Diegem. 

For an overview of the day and presentation, including a way to contact the presentors and participants, take a look a the agenda at a glance. 



Page 1 of 9

LSEC for Security Professionals


LSEC for Security Companies


LSEC for enterprise & government


LSEC for academia & research institutes


Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here


Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +