This is the 3rd edition of the Cyber Booked Event. A joint event organized by the local Dutch Security Chapters of ISACA and ISC2 and NOREA. This unique event offers an opportunity to become familiar with Cyber security books, learn from the authors and meet & greet with the authors who have been known to contribute to the security industry for decades.
We have a great line-up of 4 Cyber security authors and their books:
- Vincent van Dijk, The Next-Gen Information Security Professional – From Technical Expert to Strategic Security Leader in an AI-driven world
- Mark Tissink, Lead from control – What to do when you’re responsible and not in charge
- Roel van Rijsewijk, Cyberrisk as opportunity (The Upside of Cyber Risk) – Why the security officer became the most unpopular person in the boardroom — and how to fix it
- Fundamentals of information security – And why sovereignty is a security matter
Each author will have 30 minutes in which to present their book(s), thoughts & opinions and contribution.
This year the Cyber Booked Event is on the 20th of May 2026 in Breukelen at the Hotel van der Valk from 17 – 22pm. We will open the event with a light dinner (sandwiches) and kick-off the event at 17:45. The event is in English.
The hotel offers free parking and is located nearby an NS railway station.
Programme
17:00 Sandwich buffet
17:45 Kick-off Cyber Booked
18:00 The Next-Gen Information Security Professional – From Technical Expert to Strategic Security Leader in an AI-driven world – Vincent van Dijk
18:30 Lead from control – What to do when you’re responsible and not in charge – Mark Tissink
19:00 Short Break
19:15 Cyberrisk as opportunity (The Upside of Cyber Risk) – Why the security officer became
the most unpopular person in the boardroom — and how to fix it -Roel van Rijsewijk
19:45 Fundamentals of information security – And why sovereignty is a security matter – Brenno de Winter
20:15 Closing & Drinks
22:00 End of Event
Subject and Speakers
The Next-Gen Information Security Professional – From Technical Expert to Strategic Security Leader in an AI-driven world – Vincent van Dijk
Explore how modern cybersecurity professionals can evolve beyond technical expertise to become strategic business leaders. Drawing from The Next-Gen Information Security Professional, it highlights the importance of mindset, communication, and value-driven thinking in driving real organizational impact. Attendees will learn how to align security with business goals, influence stakeholders, and move from identifying risks to shaping outcomes—becoming not just protectors of systems, but enablers of growth and resilience.
Lead from control – What to do when you’re responsible and not in charge – Mark Tissink
Security, risk, compliance, privacy, control and audit. You’re responsible for outcomes you don’t control. You advise, challenge, escalate, all without line authority. This is the daily reality of second- and thrid-line work, and no existing leadership model addresses it head-on.
Lead from Control is a framework for professional effectiveness in exactly that position. This session introduces the six behavioural domains that define it (IMPACT: Integrity, Mental resilience, Positioning, Action courage, Communication, Temporisation) and the CLIQ, the psychometric instrument built to measure them. You leave with language for the tension you’ve always felt, and a mirror to hold up to your own practice.
Cyberrisk as opportunity (The Upside of Cyber Risk) – Why the security officer became the most unpopular person in the boardroom — and how to fix it – Roel van Rijsewijk
Roel wrote this book in 2016 because he was genuinely baffled. Why was security sold like a visit to the dentist — expensive, painful but necessary? Why did fear dominate the business model of an entire industry?
The security industry never took the boardroom seriously. It sold anxiety instead of opportunity. And so the boardroom did what any rational decision-maker does with a cost centre that can’t prove its value: it minimised it.
The book is old. Some examples are dated. What he writes about AI is almost charming in hindsight. But the core argument is more relevant than ever. Roel is writing the sequel — Mission-Critical Security. This session is where the old book meets the new one
Fundamentals of information security – And why sovereignty is a security matter – Brenno de Winter
In this talk, Brenno de Winter explores the foundations of information security through the lens of regulation, organization, and technology (ROT). He connects these fundamentals to the growing importance of digital sovereignty: understanding dependencies, maintaining control, and ensuring resilience. With concrete examples and practical frameworks, the session shows how organizations can move beyond compliance to real control. Attendees gain actionable insights into aligning security with strategy in a world shaped by geopolitical tensions, complex supply chains, and increasing reliance on external providers.







