A Cybersecurity Programme for every role in your organization

The Cyber resilience training not only deepens knowledge for IT professionals but also inspires managers and other stakeholders to take a more active role in securing their organisations. With its focus on current topics and the flexibility to divide sessions among team members, the programme is a must for organisations looking to empower their entire team in the rapidly evolving field of cybersecurity.
Expanding horizons in cybersecurity best practices
Pieter Goemaere (IT specialist at MWingz) and Piet Cordemans (software engineer at Televic) attended the first edition of Cybersecurity Excellence – now renamed Cyber resilience -, which provided them with new insights and practical tools. Pieter particularly appreciated the broad approach to cybersecurity. “The sessions went beyond just technical aspects,” he said. “It was a mix of IT, management, and legal perspectives. This gave me, as a technical professional, a valuable new outlook on how cybersecurity is approached across different domains.”
Flexibility to share sessions
At Televic, Piet Cordemans and his team chose to divide the sessions among themselves. “We reviewed which topics were most relevant for each colleague,” Piet explained. “This way, we could assign sessions to the person with specific interests or expertise. It allowed us to gain targeted knowledge and share it internally afterwards.”
At MWingz, a different approach was taken. Pieter Goemaere attended all the sessions himself, as the team is small and he wanted to use the training to expand his own expertise. “In hindsight, I might have been better off delegating some of the practical sessions to colleagues,” reflected Pieter. “Some parts were fairly basic for me but would have been more valuable for others. It was hard to gauge the level of the sessions in advance.”
Stimulating themes for the team
For Piet and his team, dividing the sessions also sparked productive internal discussions. “Topics like crypto-agility and post-quantum cryptography made us think,” he said. “It helped us better map out which cryptographic techniques we’re using, leading to concrete discussions about improving our approach.”
Blending technical and strategic insights
Both participants agree that the training is valuable for a wide range of audiences. “The theoretical sessions are accessible and highly recommended for managers,” said Piet. “They help build a common language between technical experts and leadership.” Pieter added, “For lawyers working with regulations such as NIS2, the programme is also relevant, as it offers insights into how these regulations are applied in practice.”
Cyber resilience | series 2025
- Tackling cybersecurity challenges: a complex security puzzle
- ‘Privacy by design': a technical approach to privacy risk
- Efficient use of a 'network protocol analyzer' in cyber threats
- Hacking and protecting embedded devices
- EU cybersecurity standards and regulation for IoT ecosystems and Industrial Control
- NIS2 & cyber legislation
- Cyberattack response
- Post-quantum cryptography
More information
Website: puc.kuleuven.be