{"id":564,"date":"2020-01-28T17:16:07","date_gmt":"2020-01-28T16:16:07","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/exhibition"},"modified":"2026-03-30T15:59:15","modified_gmt":"2026-03-30T13:59:15","slug":"meetings","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/meetings\/","title":{"rendered":"Meetings"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-564\" data-title=\"Meetings\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-564-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>ONE TO ONE MEETINGS<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-564-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row][vc_column]\t<div class=\"wyvc-anchors\">\r\n\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#concept\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Concept<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#keynumbers\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Key numbers<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#participants\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Participants<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#partners\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Partners<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n[\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-7248\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>The concept<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-7248.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center\"><strong>Why the unique concept of One to One meetings exhibition created by Weyou Group has become the undisputed benchmark for One to One events for both Hosted Buyers and exhibitors.<\/strong><\/p>\n<p>[\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1730969928525{margin-top: 90px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6448&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730907312780{margin-top: 10px !important;}&#8221;]<div id=\"wyvc-section-title-4500\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p><strong>BUSINESS MEETINGS<\/strong><\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]Business meetings between top European and international hosted buyers and business promoters qualified by our teams, and European and international exhibitors.<\/p>\n<p>These business meetings reflect the shared desire of hosted buyers and exhibitors to meet thanks to our matchmaking platform, the only one of its kind in Europe.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730905868380{margin-top: 30px !important;}&#8221;]<div id=\"wyvc-section-title-6334\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p><strong>These meetings take place on the exhibitor\u2019s stand throughout the day<\/strong><\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]and are timed precisely using the meetings agenda given to the Hosted Buyers.<\/p>\n<p>Hosted Buyers can also visit the exhibition and see the exhibitors they wish between their meetings : IT &amp; Cybersecurity Meetings is in fact an exhibition where each exhibitor has a real stand.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6440&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6442&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730907557034{margin-top: 50px !important;}&#8221;]<div id=\"wyvc-section-title-1179\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p><strong>HIGH-LEVEL CONFERENCES<\/strong><\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: left\">A schedule of high-level conferences is organised at the exhibition at certain times of the day.<\/p>\n<p style=\"text-align: left\">No meetings are scheduled or organised during the conferences.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"wyvc-section-title-5890\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p><strong>Hosted buyers are completely taken care of<\/strong><\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: left\">by the organisers : transport, accommodation and catering.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6444&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6453&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730908088359{margin-top: 0px !important;}&#8221;]<div id=\"wyvc-section-title-2214\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p><strong>The Networking<\/strong><\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: left\">Networking between exhibitors and hosted buyers takes place throughout the meetings :<\/p>\n<p>&#8211; On the first evening at the welcome cocktail reception<\/p>\n<p>&#8211; On the second evening, during a free evening for exhibitors to invite their customers and\/or prospects to dinner or drinks<\/p>\n<p>&#8211; On the last evening, a gala evening including a cocktail dinner.[\/vc_column_text][\/vc_column_inner][vc_column_inner][vc_empty_space][\/vc_column_inner][\/vc_row_inner]<div id=\"wyvc-section-title-5304\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p><strong>The result of this concept<\/strong><\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text]<\/p>\n<ul>\n<li style=\"text-align: left\">In the end, the concept allows hosted buyers to solve their problems and find the company or companies they need quickly, which saves them an enormous amount of time.<\/li>\n<li style=\"text-align: left\">For exhibitors, it means they can find new customers and meet top buyers who need their products or solutions, unlike at a traditional trade show.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_row_inner disable_element=&#8221;yes&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6147&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\"><strong>Hosted Buyers<\/strong> with expressed projects<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6149&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">meet experts with solutions<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6151&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">during pre-organised and adapted appointments.<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;6153&#8243; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<h4 style=\"text-align: center\">for three days in Amsterdam<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; parallax=&#8221;content-moving&#8221; parallax_image=&#8221;349&#8243; parallax_speed_bg=&#8221;2&#8243;][vc_column][vc_empty_space height=&#8221;400&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1584717464507{margin-top: -150px !important;background-color: #ffffff !important;border-radius: 1px !important;}&#8221;][vc_column]<div id=\"wyvc-section-title-3647\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Your business meeting!<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;4387&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<strong>IT &amp; CYBERSECURITY MEETINGS<\/strong> offers a unique framework for professionals enabling them to find new service providers, suppliers, innovations and to differentiate themselves from their competitors.<\/p>\n<p>A real business fair dedicated to professionals, our objective is to promote direct\u00a0<strong>\u201cface to face\u201d meetings<\/strong> between Hosted Buyers and exhibitors through pre-organised and highly qualified <strong>business meetings<\/strong> prior to the event.[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/exhibit\/\" title=\"Exhibit\">\r\n\t\t<span class=\"wyvc-btn-text\">learn more to exhibit<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; el_id=&#8221;keynumbers&#8221;][vc_column]<div id=\"wyvc-section-title-9971\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>KEY NUMBERS<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-9971.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"wyvc-counter wyvc-shortcode \" style=\"text-align: center\">\r\n\t<div class=\"wyvc-c-inner\">\r\n\t\t\t\t\t<div class=\"number-wrapper\">\r\n\t\t\t\t\t\t\t\t<span class=\"wyvc-c-digit\" >80<\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<p class=\"wyvc-c-title\" >\r\n\t\t\t\tEXHIBITORS STANDS\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-counter wyvc-shortcode \" style=\"text-align: center\">\r\n\t<div class=\"wyvc-c-inner\">\r\n\t\t\t\t\t<div class=\"number-wrapper\">\r\n\t\t\t\t\t\t\t\t<span class=\"wyvc-c-digit\" >150<\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<p class=\"wyvc-c-title\" >\r\n\t\t\t\tHOSTED BUYERS\t\t\t<\/p>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"wyvc-media-text-wrapper img-txt-btn\">\r\n\t<div class=\"wyvc-media-text wyvc-shortcode\">\r\n\t\t\t<div class=\"wyvc-text\"><p>The 2026 edition, which will be held on <strong>September 7th, 8th &amp; 9th 2026 <\/strong>at <strong>the Beurs Van Berlage, Amsterdam<\/strong>, will be punctuated by two days of business meetings, lunches, conferences, evenings\u2026 for a concentrate of business, networking and conviviality!<\/p>\n<p><u><b>THE OBJECTIVE :<\/b><\/u> to promote the <strong>One to One<\/strong> between exhibitors and Hosted Buyers through pre-organized meetings.<\/p>\n<\/div> \r\n\t<\/div>\r\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_id=&#8221;participants&#8221;][vc_column][vc_empty_space]<div id=\"wyvc-section-title-3233\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>The participants<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-3233.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"wyvc-section-title-7822\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Hosted buyers profiles<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Information Systems Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Information Systems Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Networks and Telecoms Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Infrastructure Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-icon-list wyvc-shortcode \">\r\n\t<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">IT Productions Department<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Head of Information Systems Security<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Technical IT Manager \/ Logistic Manager<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-il-item \">\r\n\t<div class=\"wyvc-ili-inner\">\r\n\t\t<span class=\"wyvc-ili-icon-wrapper\">\r\n\t<span class=\"wyvc-ili-icon\"><\/span>\r\n<\/span>\r\n\t\t\t\t\t<span class=\"wyvc-ili-text\">Buyer and prescriber of solutions \/ products at the reseller<\/span>\r\n\t\t<\/div>\r\n<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner]<div class=\"wyvc-testimonials wyvc-shortcode \">\r\n\t<div class=\"wyvc-t-inner wyvc-owl-carousel clearfix\" data-enable-loop=\"yes\" data-enable-autoplay=\"no\" data-enable-autoplay-hover-pause=\"no\" data-enable-navigation=\"yes\" data-enable-pagination=\"no\">\r\n\t\t<div class=\"wyvc-t-item\">\r\n\t<div class=\"wyvc-t-content\">\r\n\t\t\t\t\t<p class=\"wyvc-t-text\"><span>Un salon business avec des RDV one-to-one qui permet de faire de vraies rencontres avec les prospects et d&#039;\u00e9changer avec profondeur sur les projets. Le cadre est excellent et l&#039;\u00e9v\u00e8nement propice \u00e0 rencontrer de nouveaux clients.\u00a0<\/span><\/p>\r\n\t\t\t\t\t\t\t<span class=\"wyvc-t-author\">\r\n\t\t\t\t<span class=\"wyvc-t-author-label\">Marie DEROGNAT\u2013 Chef de projet Marketing \u2013 WAYCOM<\/span>\r\n\t\t\t\t\t\t\t<\/span>\r\n\t\t\t<\/div>\r\n<\/div>\r\n\t<\/div>\r\n<\/div>\r\n[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;40px&#8221;]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/testimonials-gallery\/\" title=\"Galerie T\u00e9moignages\">\r\n\t\t<span class=\"wyvc-btn-text\">Our participants testify<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;partners&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-8053\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Our partners<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8053.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221;][vc_column]<div class=\"wyvc-logos wyvc-partners wyvc-shortcode wyvc-slider wyvc-three-columns\">\r\n\t<div class=\"wyvc-c-inner wyvc-owl-carousel clearfix\" data-number-of-items=\"4\" data-enable-loop=\"yes\" data-enable-autoplay=\"yes\" data-enable-autoplay-hover-pause=\"no\" data-enable-navigation=\"yes\" data-enable-pagination=\"no\">\r\n\t\t<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.solutions-numeriques.com\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/Logo-Solutions-nume\u2560urique-143x50.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.itpro.fr\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2022\/12\/itpro.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/connect.ed-diamond.com\/gnu-linux-magazine\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2022\/12\/logo_LM_red-simple-grand-136x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.itpro.fr\/abonnement-smart-dsi\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2022\/12\/samrt-dsi-285x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/connect.ed-diamond.com\/misc\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2022\/12\/logo_MISC_green-simple-grand-173x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.cybersecurite-solutions.com\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/01\/Logo-Cyberse\u2560ucurite\u2560u-Solutions-174x50.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.faceaurisque.com\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/12\/face-au-risque-300x207-1-72x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.itforbusiness.fr\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2022\/01\/logo-ITFB-185x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.magileads.eu\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/01\/magileads-icon-Orange-slogan-Bleu-HD-300x50.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.cybersecurite-solutions.com\/magazines\/guide-de-la-cybersecurite-2022-2023\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/logo-Guide-Cyber-128x50.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.cip-paca.org\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/cropped-CIP-Logotype-94x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"http:\/\/www.globalsecuritymag.fr\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/globalsecuritymag-113x50.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.lenouveleconomiste.fr\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/le-nouvel-economiste-220x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/fr.sentinelone.com\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2024\/01\/SENTINELONE.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.palaisdesfestivals.com\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/LOGO-PALAIS-2021-CADRE-ROUGE-777-51x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.linformaticien.com\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2019\/11\/linformaticien-216x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/connect.ed-diamond.com\/linux-pratique\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2022\/12\/logo-LP-orange-simple-grand-129x50.png\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-c-item \">\r\n\t<div class=\"wyvc-c-item-inner\">\r\n\t\t<div class=\"wyvc-c-images\">\r\n\t\t\t\t\t\t\t<a class=\"wyvc-c-link\" href=\"https:\/\/www.cnpp.com\/\" target=\"_self\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/01\/cnpp260115-50x50.jpg\" alt=\"\" \/>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n<\/div>\r\n\t<\/div>\r\n<\/div>\r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/partners\/\" title=\"Partners\">\r\n\t\t<span class=\"wyvc-btn-text\">See all our partners<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section disable_element=&#8221;yes&#8221; el_id=&#8221;gallery&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-2768\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Gallery<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-2768.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-media-text-wrapper img-txt-btn\">\r\n\t<div class=\"wyvc-media-text wyvc-shortcode\">\r\n\t\t\t<div class=\"wyvc-image\">\r\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2021\/12\/ITCM_2-61c19cda91469.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2021\/12\/ITCM_2-61c19cda91469.jpg 640w, https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2021\/12\/ITCM_2-61c19cda91469-300x200.jpg 300w, https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2021\/12\/ITCM_2-61c19cda91469-75x50.jpg 75w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/>\t<\/div>\r\n<div class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2\">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t<p class=\"wyvc-st-title\">\r\n\t\t\tOur video \r\n\t\t<\/p>\r\n\t<\/div>\r\n<\/div>\r\n\t<div class=\"wyvc-text\"><p>Relive through our video the moments that make up our IT &amp; Cybersecurity Meetings 2024.<\/p>\n<\/div> \r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode\" href=\"https:\/\/youtu.be\/wDqxJZ2gK94\" target=\"_blank\" title=\"Galerie vid\u00e9os\">\r\n\t\t<span class=\"wyvc-btn-text\">Click here<\/span>\r\n\t<\/a>\r\n<\/div>\r\n\t<\/div>\r\n<\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"wyvc-media-text-wrapper img-txt-btn\">\r\n\t<div class=\"wyvc-media-text wyvc-shortcode\">\r\n\t\t\t<div class=\"wyvc-image\">\r\n\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"374\" src=\"https:\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/05\/ITCM-2023-3-1.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/05\/ITCM-2023-3-1.jpg 560w, https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/05\/ITCM-2023-3-1-300x200.jpg 300w, https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2023\/05\/ITCM-2023-3-1-75x50.jpg 75w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/>\t<\/div>\r\n<div class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2\">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t<p class=\"wyvc-st-title\">\r\n\t\t\tOur testimonials \r\n\t\t<\/p>\r\n\t<\/div>\r\n<\/div>\r\n\t<div class=\"wyvc-text\"><p style=\"text-align: center\">Read all our testimonials from the Exhibitors and Top Decision Makers who were at IT &amp; Cybersecurity Meetings.<\/p>\n<\/div> \r\n<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/testimonials-gallery\/\" title=\"Testimonials Gallery\">\r\n\t\t<span class=\"wyvc-btn-text\">Click here<\/span>\r\n\t<\/a>\r\n<\/div>\r\n\t<\/div>\r\n<\/div>[\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Why the unique concept of One to One meetings exhibition created by Weyou Group has become the undisputed benchmark for One to One events for both Hosted Buyers and exhibitors. [\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1730969928525{margin-top: 90px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6448&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730907312780{margin-top: 10px !important;}&#8221;][vc_column_text css=&#8221;&#8221;]Business meetings between top European and international hosted buyers and business promoters [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-564","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meetings - IT and Cybersecurity One to one Meetings Netherlands<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meetings - IT and Cybersecurity One to one Meetings Netherlands\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Why the unique concept of One to One meetings exhibition created by Weyou Group has become the undisputed benchmark for One to One events for both Hosted Buyers and exhibitors. [\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1730969928525{margin-top: 90px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6448&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730907312780{margin-top: 10px !important;}&#8221;][vc_column_text css=&#8221;&#8221;]Business meetings between top European and international hosted buyers and business promoters [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Netherlands\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:59:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/\",\"url\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/\",\"name\":\"Meetings - IT and Cybersecurity One to one Meetings Netherlands\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website\"},\"datePublished\":\"2020-01-28T16:16:07+00:00\",\"dateModified\":\"2026-03-30T13:59:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meetings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/\",\"name\":\"IT and Cybersecurity One to one Meetings Netherlands\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization\",\"name\":\"IT and Cybersecurity One to one Meetings Netherlands\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png\",\"width\":198,\"height\":175,\"caption\":\"IT and Cybersecurity One to one Meetings Netherlands\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meetings - IT and Cybersecurity One to one Meetings Netherlands","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/","og_locale":"en_US","og_type":"article","og_title":"Meetings - IT and Cybersecurity One to one Meetings Netherlands","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;concept&#8221;][vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Why the unique concept of One to One meetings exhibition created by Weyou Group has become the undisputed benchmark for One to One events for both Hosted Buyers and exhibitors. [\/vc_column_text][vc_row_inner css=&#8221;.vc_custom_1730969928525{margin-top: 90px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6448&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1730907312780{margin-top: 10px !important;}&#8221;][vc_column_text css=&#8221;&#8221;]Business meetings between top European and international hosted buyers and business promoters [&hellip;]","og_url":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/","og_site_name":"IT and Cybersecurity One to one Meetings Netherlands","article_modified_time":"2026-03-30T13:59:15+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/","url":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/","name":"Meetings - IT and Cybersecurity One to one Meetings Netherlands","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website"},"datePublished":"2020-01-28T16:16:07+00:00","dateModified":"2026-03-30T13:59:15+00:00","breadcrumb":{"@id":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/meetings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Meetings"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/","name":"IT and Cybersecurity One to one Meetings Netherlands","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization","name":"IT and Cybersecurity One to one Meetings Netherlands","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png","width":198,"height":175,"caption":"IT and Cybersecurity One to one Meetings Netherlands"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages\/564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/comments?post=564"}],"version-history":[{"count":5,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages\/564\/revisions"}],"predecessor-version":[{"id":7251,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages\/564\/revisions\/7251"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/media?parent=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}