TIOZ Howest

Howest Logo

Projects about
#Cybersecurity

Example project image

Proeftuin ICIL4.0

The Living Lab ICI4.0 has taught us that a translation of a legal text of a regulation such as the NIS should proceed in 2 phases namely we need to provide a management / business approach (provided budget) with the focus what does it bring to the business and a technology approach (use budget).

Example project image

ISOC Infrastructure

The Security Operations Center (SOC) is an essential part of the "Cyber 3.0 Lab" research group at Howest. In this blog article, we would like to provide more insight into the installation, financing obtained from VLAIO, and other important aspects of our SOC project.

Example project image

Offshore4sure

The development of a CO2 neutral energy system with less dependency on gas is a challenge at local, regional, national and European level. We feel the urgency to accelerate innovations and jointly create the conditions for scaling up, in order to make a serious contribution to a sustainable offshore energy transition.

Example project image

Proeftuin ICI4.0

Our living lab : Innovative Cybersecurity for Industry 4.0, with main partners the Howest and UGent, together with subcontractors Living Tomorrow vzw and Cyber Security Coalition vzw, will pursue three main objectives

Example project image

EFRO - Vertiports

Via dit project worden onderzoek, innovatie, testing en communityversterking naar BVLOS (Beyond Visual Line of Sight) vluchten met drones in variërende weersomstandigheden en over lange afstanden op structurele en geautomatiseerde manier concreet gemaakt.

Example project image

Tetra: GAICIA

GAICIA stands for Behavior-Based Artificial Intelligence against Cyber ​​Industrial Attacks and is a Tetra project about today's industrial security and the possible added value that AI could bring to this.

News about
#Cybersecurity

Example project image

Internship at Cyber 3 Lab: Four Future Cyber Security Professionals Take the Lead

Four Applied Computer Science students will intern at Howest's Cyber 3 Lab, focusing on cybersecurity. They'll explore social engineering resistance, AI's role in cybersecurity, and hardware security through reverse engineering. This practical experience will enhance their cybersecurity knowledge and skills.

Example project image

Howest launches second episode of the GAICIA podcast series

Howest launches second episode about GAICIA, where we do research on the added value of AI in monitoring OT networks to detect active OT security attacks. In this episode, Tijl Deneut dives deeper into the security aspects of the GAICIA project.

Example project image

Howest launches first episode of the GAICIA podcast series

GAICIA stands for Behavior-Based Artificial Intelligence against Cyber ​​Industrial Attacks and is a Tetra project about today's industrial security and the possible added value that AI could bring to this.

Example project image

Say hello to our new security operations center

The Security Operations Center (SOC) is an essential part of the "Cyber 3.0 Lab" research group at Howest. In this blog article, we would like to provide more insight into the installation, financing obtained from VLAIO, and other important aspects of our SOC project.

People that talk about
#Cybersecurity

Picture of Gert-Jan Wille

Gert-Jan Wille

LinkedIn logo

Cyber Security Research & SOC Manager

Gert-Jan Wille is a passionate professional in the field of Cybersecurity and IT. With his extensive background in Cybersecurity, IT, and Finance, he has built up a wealth of knowledge and experience. Currently, he works as a Cyber Security Research & SOC manager at the Cyber 3.0 Lab research group. Gert-Jan is dedicated to promoting cybersecurity and developing innovative solutions to protect organizations against cyber threats. His expertise extends to managing Security Operations Centers (SOCs) and conducting advanced research in the field of Cybersecurity. With his strong analytical skills and passion for the profession, Gert-Jan continues to strive for creating a safer digital world.

Picture of William Schokkelé

William Schokkelé

LinkedIn logo

Academic Director cluster Computer Science & Technology

As the Academic Director of Computer Science & Technology at Howest University of Applied Sciences, William is dedicated to advancing education and research in this dynamic field. His focus is on creating an innovative learning environment that equips students for the challenges of the digital age. Our expertise includes Cyber Security, AI, Web3, App Development, and Systems/Networking. Prioritizing the wellbeing of the team, he fosters a supportive work environment for creativity and growth. Actively engaging in cluster cooperation, he cultivates collaborative relationships for innovation and knowledge exchange. Through this role, he aims to inspire the next generation of tech professionals and contribute to the technological landscape.

Picture of Thomas Lefevre

Thomas Lefevre

Cybersecurity Researcher

to be added

Picture of Laurens Singier

Laurens Singier

LinkedIn logo

Security Researcher & Ethical hacker

Meet Laurens Singier, a dynamic and talented young professional in the field of cybersecurity specializing in both Operational Technology (OT) and Information Technology (IT) systems. Laurens holds a degree in Computer Science, laying the foundation for a career dedicated to safeguarding critical systems against cyber threats & helping companies grow into the digital age. With a passion for staying at the forefront of technological advancements, Laurens actively engages in the world of ethical hacking and penetration testing. A regular participant on platforms like Hack The Box, Laurens thrives on the challenges presented by real-world scenarios, honing skills that are crucial in fortifying digital infrastructures.

Picture of Kyra Van Den Eynde

Kyra Van Den Eynde

LinkedIn logo

AI/CS Researcher, AI Lead

Kyra Van Den Eynde has a bachelor's degree in Cyber ​​Security and one in Artificial Intelligence. Within Howest's research groups, she therefore mainly focuses on projects that investigate what the added value of AI could be for today's cyber security. In addition, she mainly has a background in computer vision, but also does general AI projects.

Picture of Robby Goetinck

Robby Goetinck

Devops & Web3

Robby Goetinck is a Security Researcher and Web3 Engineer at Howest University of Applied Sciences. With a background in Infrastructure, DevOps and Web3, he's been actively involved in deploying Self-Sovereign Identity (SSI) solutions for Howest student passes as verifiable credentials on the European Blockchain Services Infrastructure (EBSI).

Picture of Wim Van Renterghem

Wim Van Renterghem

LinkedIn logo

Web3 Program Manager, Researcher & Lecturer

I am a mobile developer at heart, working on mobile apps since 2015. Ever since I followed the blockchain@home course at Howest in 2018, I knew I wanted to become a blockchain/Web3 developer. Since then, I have taught the same courses I followed, researched blockchain technology in the BLING project, and most recently have become the program manager of our Web3 courses. I am also focused on life long learning, most recently with a cyber security education.

Picture of David Prada

David Prada

LinkedIn logo

Cybersecurity Researcher

Ethical Hacker with over 4 years of experience in information security, risk management, incident response, computer forensics and web development. Specializes in IT/OT penetration testing and Cybersecurity research. Fluent in both Spanish and English, has worked with diverse clients across industries, including small businesses and large corporations, particularly in the oil & gas, military, and police sectors, in various countries.

Picture of Tijl Atoui

Tijl Atoui

LinkedIn logo

SOC operator and Security lecturer

After his studies in cyber security at Howest, Tijl became an industrial cybersecurity researcher. He followed his dream to transfer his knowledge about OT security to students and became a lecturer for the Bachelor Applied Computer science.

Picture of Kurt Schoenmaekers

Kurt Schoenmaekers

Cybersecurity Researcher

Kurt Schoenmaekers graduated with a master of science degree in Electrical Engineering with a specialization in digital automation from the University of Leuven, where he started his career as a research assistant. He then started as consultant for one of the first security companies in the world (Cryptech) and stayed in the IT security business for his now 30+ years career. He founded a security start-up in 1992 where amongst others the inventors of the encryption standard AES worked for some time . Kurt later worked in several other IT security companies like Uti-maco SafeWare (now Sophos), SafeBoot, McAfee, Intel and more, always in a leading role and focusing on IT Security. He has been living in France, Sweden and Belgium. Currently Kurt teaches Cyber Security Fundamentals at Howest, where he is also a cybersecurity researcher.