Common Belgium Cybersecurity Day 22 Sept

Common Belgium Cybersecurity Day
(An in-person event)

Monday 22 September 2025, 12:30 – 22:00 hours CEST

Venue – BrewDog Brussels – 150 steps from Brussels’ Central station
(Save CO2, take the train)

REGISTER NOW

Agenda

    1. 12:30 – 13:30 Buffet sandwich Lunch
    2. 13:30 – 13:40 Introducing the day – Philippe Vanden Bussche, President Common Belgium
    3. 13:40 – 14:30 Cybersecurity beyond the traditional actions – Johan Galle, Professor, Howest University of Applied Sciences, Bruges
    4. 14:30 – 15:20 State of IBM I Cybersecurity in 2025 and beyond – Carol Woodbury, CISSP, CRISC, IBM i Security SME and Senior Advisor, Kisco Systems, USA
    5. 15:20 – 15:40 Networking Coffee break
    6. 15:40 – 16:30 Power 11 HW announcements focused on security features, MFA, Cybervault and Storage – Ludovic Gasc, Open Source and AI Solutions Architect on IBM Power IBM, Belgium
    7. 16:30 – 17:20 Using Function Usage to Add another Layer of Security to your IBM i Configuration – Carol Woodbury, CISSP, CRISC, IBM i Security SME and Senior Advisor, Kisco Systems, USA
    8. 17:30 – 17:40 Tiny Stretch/Bio break
    9. 17:40 – 18:20 Speakers and participants panel discussion – Carol Woodbury, Ludovic Gasc and Corneel Theben Tervile, Professor, Howest University. Moderator – Ranga Deshpande, VP, Common Belgium 
    10. 18:20 – 19:00 Networking drinks
    11. 19:00 – 22:00 Networking sitting dinner

REGISTER NOW

Session abstracts –
Cybersecurity beyond the traditional actions – Johan Galle –
We are all aware of today’s cybersecurity threats and by now, we know about the traditional cybersecurity defense (Multi-factor authentication, offline back-ups, advanced endpoint malware protection, etc.). But what are the next steps? What do top organizations do to extend their cybersecurity resilience even further? What are the cybersecurity competences that you should invest in today to be ready for tomorrow’s threats? This talk is based on analysis of recent (2024-2-25) attacks and the activities that are required to stop them. Of course, cybersecurity remains a never ending journey.

State of IBM I Cybersecurity in 2025 and beyond – Carol Woodbury –
Abstract – During this session Carol Woodbury will explore the world of IBM i Security. She will highlight recently added capabilities, the benefits of using IBM i features to secure your data as well as the security challenges facing the system and IT as a whole.

Power 11 HW Announcements: Security, MFA & Cybervault – Ludovic Gasc –
Discover how IBM Power 11 enhances enterprise security and resilience with features like IBM i MFA 7.6, Power Cybervault and Safeguarded Copy.
This session covers zero downtime capabilities, and orchestration with IBM Concert.
Few videos of demos will showcase how Power 11 and IBM Storage work together to protect mission-critical workloads.

Using Function Usage to Add another Layer of Security to your IBM i Configuration – Carol Woodbury – 
During this session Carol will describe what Function Usage (formerly known as Application Administration) is, how to access it, how to implement settings to add an additional layer of security to your IBM i Security strategy and how discover or report on current settings. Carol will also discuss the audit journal entries that are generated by function usage and describe several ways to utilize this information. Information on the functions added in the recent releases – along with this, its connection to the new MFA feature – will also be discussed.

Speakers: 

Carol Woodbury – With over 30 years’ experience in the area of IT security, Carol is known worldwide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate about sharing her knowledge of IBM i Security and helping clients make improvements to their IBM i Security one-step at a time. Carol is currently IBM i Security SME and Senior Advisor to Kisco Systems. Previously, she co-founded two companies, SkyView Partners, and most recently, DXR Security, a firm specializing in performing IBM i penetration tests. Carol has been an IBM Power Champion since 2018.
Carol is an educator, architect, designer, implementer and an award-winning speaker, specializing in IBM i Security.
Carol is a Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) and a member of the ISACA organization.
Carol has written many books. IBM i Security and Administration, 3rd edition is available at MCPressOnline or amazon.com. Her latest book, Mastering IBM i Security is a ‘how to’ guide for implementing and managing security using SQL Services, New Nav and ACS. It includes all the latest in IBM i 7.5 and can be ordered from MCPressOnline https://www.mc-store.com/products/mastering-ibm-i-security or amazon.

Johan Galle – Johan is lecturer in the cybersecurity section of the Applied Informatics department of Howest University in Brugge. He teaches cryptography, security management and privacy. In these courses, his main goal is to construct the bridge from theory to practice. Before joining Howest, he has worked in various CTO, CISO, CEO and CIO roles in Belgium, and always with an emphasis on security and governance.

 

 

Ludovic Gasc – Passionate about Open Source and AI for over 20 years, Ludovic Gasc specializes in modernizing critical systems and building secure, efficient infrastructures. Ten years before the rise of Generative AI, he led the migration of a 1.5M-line Erlang telecom application to a streamlined Python/PostgreSQL solution. Today, he focuses on IBM Power modernization with an Open Source and AI-first approach.

 

Corneel Theben Tervile – Corneel began his career as Lecturer at Howest University of Applied Sciences, Bruges, Belgium, teaching IBM i (AS/400) Systems before expanding into mainstream programming languages such as Java. With expertise in analysis and object-oriented development, he pairs deep technical knowledge with strong leadership experience, having successfully grown and managed academic programs. As the architect of the Cybersecurity Major at Howest University, he transformed his vision into a unique and in-demand Bachelor’s program—now recognized as a benchmark in Flanders, Belgium, and beyond.

REGISTER NOW

We extend our heartfelt appreciation
to our speakers and their organizations

 Carol Woodbury – Kisco Systems

Johan Galle & Corneel Theben Tervile – HOWEST University of Applied Sciences

Ludovic Gasc – IBM Belgium

Philippe Vanden Bussche and Shrirang “Ranga” Deshpande, Common Belgium