TIOZ Howest

Howest Logo

Projects about
#OT Security

Example project image

Proeftuin ICIL4.0

The Living Lab ICI4.0 has taught us that a translation of a legal text of a regulation such as the NIS should proceed in 2 phases namely we need to provide a management / business approach (provided budget) with the focus what does it bring to the business and a technology approach (use budget).

Example project image

Proeftuin ICI4.0

Our living lab : Innovative Cybersecurity for Industry 4.0, with main partners the Howest and UGent, together with subcontractors Living Tomorrow vzw and Cyber Security Coalition vzw, will pursue three main objectives

News about
#OT Security

Example project image

Howest launches the third episode of the GAICIA podcast series

Howest launches third episode about GAICIA, where we do research on the added value of AI in monitoring OT networks to detect active OT security attacks. In this episode, Kyra Van Den Eynde explains the results of the GAICIA project.

Example project image

Internship at Cyber 3 Lab: Four Future Cyber Security Professionals Take the Lead

Four Applied Computer Science students will intern at Howest's Cyber 3 Lab, focusing on cybersecurity. They'll explore social engineering resistance, AI's role in cybersecurity, and hardware security through reverse engineering. This practical experience will enhance their cybersecurity knowledge and skills.

Events about
#OT Security

Example project image

OT Security in de Praktijk - Meetup @ Howest

Tijdens onze meetup leer je hoe je jouw productie- en logistieke omgeving kunt beschermen tegen deze bedreigingen en hoe je direct aan de slag kunt gaan met effectieve OT-beveiliging.

Example project image

Ontdek samen met Howest en UGent de toekomst van industriƫle cyberbeveiliging

Tijdens dit kennis- en netwerkevent van Howest en UGent stellen we onze voorlopige onderzoeksresultaten voor aan bedrijven en leveranciers voor OT/IT en logistiek, en bespreken we de trends in OT security, en bespreken we onze volgende stappen op basis van jullie input en uitdagingen.

People that talk about
#OT Security

Picture of Gert-Jan Wille

Gert-Jan Wille

LinkedIn logo

Cyber Security Research & SOC Manager

Gert-Jan Wille is a passionate professional in the field of Cybersecurity and IT. With his extensive background in Cybersecurity, IT, and Finance, he has built up a wealth of knowledge and experience. Currently, he works as a Cyber Security Research & SOC manager at the Cyber 3.0 Lab research group. Gert-Jan is dedicated to promoting cybersecurity and developing innovative solutions to protect organizations against cyber threats. His expertise extends to managing Security Operations Centers (SOCs) and conducting advanced research in the field of Cybersecurity. With his strong analytical skills and passion for the profession, Gert-Jan continues to strive for creating a safer digital world.

Picture of Laurens Singier

Laurens Singier

LinkedIn logo

Security Researcher & Ethical hacker

Meet Laurens Singier, a dynamic and talented young professional in the field of cybersecurity specializing in both Operational Technology (OT) and Information Technology (IT) systems. Laurens holds a degree in Computer Science, laying the foundation for a career dedicated to safeguarding critical systems against cyber threats & helping companies grow into the digital age. With a passion for staying at the forefront of technological advancements, Laurens actively engages in the world of ethical hacking and penetration testing. A regular participant on platforms like Hack The Box, Laurens thrives on the challenges presented by real-world scenarios, honing skills that are crucial in fortifying digital infrastructures.

Picture of David Prada

David Prada

LinkedIn logo

Cybersecurity Researcher

Ethical Hacker with over 4 years of experience in information security, risk management, incident response, computer forensics and web development. Specializes in IT/OT penetration testing and Cybersecurity research. Fluent in both Spanish and English, has worked with diverse clients across industries, including small businesses and large corporations, particularly in the oil & gas, military, and police sectors, in various countries.

Picture of Tijl Atoui

Tijl Atoui

LinkedIn logo

SOC operator and Security lecturer

After his studies in cyber security at Howest, Tijl became an industrial cybersecurity researcher. He followed his dream to transfer his knowledge about OT security to students and became a lecturer for the Bachelor Applied Computer science.