TIOZ Howest

Howest Logo

Projects about
#Cybersecurity

Example project image

Proeftuin ICIL4.0

The Living Lab ICI4.0 has taught us that a translation of a legal text of a regulation such as the NIS should proceed in 2 phases namely we need to provide a management / business approach (provided budget) with the focus what does it bring to the business and a technology approach (use budget).

Example project image

ISOC Infrastructure

The Security Operations Center (SOC) is an essential part of the "Cyber 3.0 Lab" research group at Howest. In this blog article, we would like to provide more insight into the installation, financing obtained from VLAIO, and other important aspects of our SOC project.

Example project image

Offshore4sure

The development of a CO2 neutral energy system with less dependency on gas is a challenge at local, regional, national and European level. We feel the urgency to accelerate innovations and jointly create the conditions for scaling up, in order to make a serious contribution to a sustainable offshore energy transition.

Example project image

EDIH Digitalis

The European Digital Innovation Hub DIGITALIS aims to help both groups of industrial companies. Traditional SMEs with the adoption of new digital technologies and tech savvy SMEs with connecting them in building up a competitive advantage in the globalized marketplace.

Example project image

Proeftuin ICI4.0

Our living lab : Innovative Cybersecurity for Industry 4.0, with main partners the Howest and UGent, together with subcontractors Living Tomorrow vzw and Cyber Security Coalition vzw, will pursue three main objectives

Example project image

EFRO - Manufacturing Excellence

Manufacturing Excellence 4.0 helpt productiebedrijven concurrerend te blijven door continu te verbeteren in kwaliteit, kosten, leverbetrouwbaarheid en duurzaamheid. Het project biedt mobiele en lab-infrastructuur om technologie ter plaatse te demonstreren en specifieke cases te valideren.

Example project image

EFRO - Vertiports

Via dit project worden onderzoek, innovatie, testing en communityversterking naar BVLOS (Beyond Visual Line of Sight) vluchten met drones in variërende weersomstandigheden en over lange afstanden op structurele en geautomatiseerde manier concreet gemaakt.

Example project image

Tetra: GAICIA

GAICIA stands for Behavior-Based Artificial Intelligence against Cyber ​​Industrial Attacks and is a Tetra project about today's industrial security and the possible added value that AI could bring to this.

News about
#Cybersecurity

Example project image

Increase your company's digital resilience with NIS2

NIS2 is a European directive ("Directive (EU) 2022/2555", adopted on 14 December 2022), aimed at improving the cybersecurity of critical infrastructure and digital service providers in the European Union.

Example project image

Internship at Cyber 3 Lab: Four Future Cyber Security Professionals Take the Lead

Four Applied Computer Science students will intern at Howest's Cyber 3 Lab, focusing on cybersecurity. They'll explore social engineering resistance, AI's role in cybersecurity, and hardware security through reverse engineering. This practical experience will enhance their cybersecurity knowledge and skills.

Example project image

Howest launches second episode of the GAICIA podcast series

Howest launches second episode about GAICIA, where we do research on the added value of AI in monitoring OT networks to detect active OT security attacks. In this episode, Tijl Deneut dives deeper into the security aspects of the GAICIA project.

Example project image

Howest launches first episode of the GAICIA podcast series

GAICIA stands for Behavior-Based Artificial Intelligence against Cyber ​​Industrial Attacks and is a Tetra project about today's industrial security and the possible added value that AI could bring to this.

Example project image

Say hello to our new security operations center

The Security Operations Center (SOC) is an essential part of the "Cyber 3.0 Lab" research group at Howest. In this blog article, we would like to provide more insight into the installation, financing obtained from VLAIO, and other important aspects of our SOC project.

Events about
#Cybersecurity

Example project image

Ontdek samen met Howest en UGent de toekomst van industriële cyberbeveiliging

Tijdens dit kennis- en netwerkevent van Howest en UGent stellen we onze voorlopige onderzoeksresultaten voor aan bedrijven en leveranciers voor OT/IT en logistiek, en bespreken we de trends in OT security, en bespreken we onze volgende stappen op basis van jullie input en uitdagingen.

Example project image

Free NIS2 Afternoon Seminar in Cooperation with Beltug

In the afternoon of May 23rd (13h30-17h30), we organize a seminar with several top experts in cybersecurity and NIS2, two very interesting case studies, and a lot of discussion and advice on how to prepare for NIS2.

Example project image

NIS2 in de Praktijk

NIS2 wordt een grote uitdaging voor kleine en middelgrote bedrijven. Daarom organiseren we een meetup op 23 mei bij Howest Brugge, waar je kan luisteren naar en discussiëren met NIS2 experten.

Example project image

CyberActive's free training sessions: "Understanding Threat Modeling and Cybersecurity Basics" and "Network and IT security guide for digital services"

Cybersecurity of Digital Services is becoming crucially important. Learn the essential skills and strategies needed to navigate the complex landscape of digital threats and protect your organization's digital assets effectively in this #CyberActive training session.

Example project image

De Toekomst van Industriële Cyberveiligheid met AI

OT cybersecurity is cruciaal voor het beschermen van industriële systemen en kritieke infrastructuur tegen cyberdreigingen in het tijdperk van Industrie 4.0, AI en NIS2. Tijdens deze studiedag onderzoeken we de rol van AI in OT Security, en stellen we de resultaten van het project GAICIA voor.

People that talk about
#Cybersecurity

Picture of Gert-Jan Wille

Gert-Jan Wille

LinkedIn logo

Cyber Security Research & SOC Manager

Gert-Jan Wille is a passionate professional in the field of Cybersecurity and IT. With his extensive background in Cybersecurity, IT, and Finance, he has built up a wealth of knowledge and experience. Currently, he works as a Cyber Security Research & SOC manager at the Cyber 3.0 Lab research group. Gert-Jan is dedicated to promoting cybersecurity and developing innovative solutions to protect organizations against cyber threats. His expertise extends to managing Security Operations Centers (SOCs) and conducting advanced research in the field of Cybersecurity. With his strong analytical skills and passion for the profession, Gert-Jan continues to strive for creating a safer digital world.

Picture of William Schokkelé

William Schokkelé

LinkedIn logo

Academic Director cluster Computer Science & Technology

As the Academic Director of Computer Science & Technology at Howest University of Applied Sciences, William is dedicated to advancing education and research in this dynamic field. His focus is on creating an innovative learning environment that equips students for the challenges of the digital age. Our expertise includes Cyber Security, AI, Web3, App Development, and Systems/Networking. Prioritizing the wellbeing of the team, he fosters a supportive work environment for creativity and growth. Actively engaging in cluster cooperation, he cultivates collaborative relationships for innovation and knowledge exchange. Through this role, he aims to inspire the next generation of tech professionals and contribute to the technological landscape.

Picture of Thomas Lefevre

Thomas Lefevre

Cybersecurity Researcher

to be added

Picture of Laurens Singier

Laurens Singier

LinkedIn logo

Security Researcher & Ethical hacker

Meet Laurens Singier, a dynamic and talented young professional in the field of cybersecurity specializing in both Operational Technology (OT) and Information Technology (IT) systems. Laurens holds a degree in Computer Science, laying the foundation for a career dedicated to safeguarding critical systems against cyber threats & helping companies grow into the digital age. With a passion for staying at the forefront of technological advancements, Laurens actively engages in the world of ethical hacking and penetration testing. A regular participant on platforms like Hack The Box, Laurens thrives on the challenges presented by real-world scenarios, honing skills that are crucial in fortifying digital infrastructures.

Picture of Kyra Van Den Eynde

Kyra Van Den Eynde

LinkedIn logo

AI/CS Researcher, AI Lead

Kyra Van Den Eynde has a bachelor's degree in Cyber ​​Security and one in Artificial Intelligence. Within Howest's research groups, she therefore mainly focuses on projects that investigate what the added value of AI could be for today's cyber security. In addition, she mainly has a background in computer vision, but also does general AI projects.

Picture of Robby Goetinck

Robby Goetinck

Devops & Web3

Robby Goetinck is a Security Researcher and Web3 Engineer at Howest University of Applied Sciences. With a background in Infrastructure, DevOps and Web3, he's been actively involved in deploying Self-Sovereign Identity (SSI) solutions for Howest student passes as verifiable credentials on the European Blockchain Services Infrastructure (EBSI).

Picture of Wim Van Renterghem

Wim Van Renterghem

LinkedIn logo

Web3 Program Manager, Researcher & Lecturer

I am a mobile developer at heart, working on mobile apps since 2015. Ever since I followed the blockchain@home course at Howest in 2018, I knew I wanted to become a blockchain/Web3 developer. Since then, I have taught the same courses I followed, researched blockchain technology in the BLING project, and most recently have become the program manager of our Web3 courses. I am also focused on life long learning, most recently with a cyber security education.

Picture of David Prada

David Prada

LinkedIn logo

Cybersecurity Researcher

Ethical Hacker with over 4 years of experience in information security, risk management, incident response, computer forensics and web development. Specializes in IT/OT penetration testing and Cybersecurity research. Fluent in both Spanish and English, has worked with diverse clients across industries, including small businesses and large corporations, particularly in the oil & gas, military, and police sectors, in various countries.

Picture of Tijl Atoui

Tijl Atoui

LinkedIn logo

SOC operator and Security lecturer

After his studies in cyber security at Howest, Tijl became an industrial cybersecurity researcher. He followed his dream to transfer his knowledge about OT security to students and became a lecturer for the Bachelor Applied Computer science.

Picture of Kurt Schoenmaekers

Kurt Schoenmaekers

Cybersecurity Researcher

Kurt Schoenmaekers graduated with a master of science degree in Electrical Engineering with a specialization in digital automation from the University of Leuven, where he started his career as a research assistant. He then started as consultant for one of the first security companies in the world (Cryptech) and stayed in the IT security business for his now 30+ years career. He founded a security start-up in 1992 where amongst others the inventors of the encryption standard AES worked for some time . Kurt later worked in several other IT security companies like Uti-maco SafeWare (now Sophos), SafeBoot, McAfee, Intel and more, always in a leading role and focusing on IT Security. He has been living in France, Sweden and Belgium. Currently Kurt teaches Cyber Security Fundamentals at Howest, where he is also a cybersecurity researcher.