{"id":569,"date":"2020-01-28T17:24:33","date_gmt":"2020-01-28T16:24:33","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/visit"},"modified":"2026-03-23T17:08:43","modified_gmt":"2026-03-23T16:08:43","slug":"visit","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/visit\/","title":{"rendered":"Visit"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-569\" data-title=\"Visit\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-nl\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-569-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>Visit<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-569-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row][vc_column]\t<div class=\"wyvc-anchors\">\r\n\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#present-sectors\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Present sectors<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#conferences\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Conferences<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#practical-information\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">Practical information<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n[\/vc_column][\/vc_row][vc_section el_id=&#8221;present-sectors&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space]<div id=\"wyvc-section-title-9035\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Apply for your free badge<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text]<\/p>\n<p data-start=\"119\" data-end=\"150\"><strong data-start=\"153\" data-end=\"183\">Tuesday, September 8, 2026<br \/>\n<\/strong><strong data-start=\"188\" data-end=\"220\">Wednesday, September 9, 2026<\/strong><\/p>\n<p><strong>Beurs Van Berlage, Amsterdam<\/strong><\/p>\n<p><strong>Please note that access is reserved for professionals only.\u00a0<\/strong><\/p>\n<p><em>The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.<\/em>[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/visitor.weyou-group.com\/it-and-cybersecurity-one-to-one-meetings-nl\/2026\/inscription\/si\" target=\"_blank\" title=\"Inscription Form\">\r\n\t\t<span class=\"wyvc-btn-text\">Visit<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"wyvc-section-title-8176\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>The exhibitors<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8176.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n<div id=\"wyvc-section-title-6828\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Exhibiting sectors<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks and Telecommunications&#8221; tab_id=&#8221;1577354495611-a83fa4c2-4cf9&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Unified Communications<\/li>\n<li>Creation of free solutions.<\/li>\n<li>VoIP\/ToIP<\/li>\n<li>Network operator<\/li>\n<li>Telecoms operator \/ Mobile<\/li>\n<li>Network Management<\/li>\n<li>Performance management<\/li>\n<li>Terminals (ip, digital, sip)<\/li>\n<li>Communication solution \/ Videoconferencing<\/li>\n<li>NFC services<\/li>\n<li>M2M solutions<\/li>\n<li>Contact centre<\/li>\n<li>IT equipment<\/li>\n<li>Telecoms\/equipment distributor<\/li>\n<li>Infrastructure management<\/li>\n<li>Fixed and mobile convergence<\/li>\n<li>SDN (Software Defined Networking)<\/li>\n<li>Infrastructure management software<\/li>\n<li>Collaborative meeting \/ interactive meetings \/ room booking management<\/li>\n<li>WAN optimisation<\/li>\n<li>Hyperconvergence<\/li>\n<li>Router\/Switch<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Mobility&#8221; tab_id=&#8221;1577354495666-6d2614ed-6a35&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Mobility Solutions \/ Mobility Products<\/li>\n<li>Peripheral devices<\/li>\n<li>Mobile terminals\/robots<\/li>\n<li>Mobile applications<\/li>\n<li>Mobile CRM<\/li>\n<li>Mobile payment<\/li>\n<li>Fleet management<\/li>\n<li>Embedded system \/ Geolocation<\/li>\n<li>Traceability<\/li>\n<li>Development of customised business applications<\/li>\n<li>BYOD management<\/li>\n<li>Mobile Device Management (MDM)<\/li>\n<li>Connected objects<\/li>\n<li>EMM (Enterprise Mobility Management)<\/li>\n<li>Telecom Expense Management<\/li>\n<li>Mobile application testing<\/li>\n<li>Intervention management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cybersecurity&#8221; tab_id=&#8221;1577354495715-f9cd4c04-62d1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Security software<\/li>\n<li>Security hardware<\/li>\n<li>Control\/monitoring tools<\/li>\n<li>Secure infrastructure services<\/li>\n<li>Authentication services<\/li>\n<li>Data security<\/li>\n<li>Anomaly management<\/li>\n<li>Security testing<\/li>\n<li>Cloud security<\/li>\n<li>DNS<\/li>\n<li>Identity\/email\/data\/contract protection<\/li>\n<li>Data backup and storage<\/li>\n<li>Secure networks<\/li>\n<li>Mobile networks<\/li>\n<li>Geolocation<\/li>\n<li>Connected devices<\/li>\n<li>GDPR services\/solutions<\/li>\n<li>Email security<\/li>\n<li>DDOS<\/li>\n<li>Devsecopps<\/li>\n<li>Endpoint<\/li>\n<li>Firewall<\/li>\n<li>Workload protection<\/li>\n<li>Email<\/li>\n<li>CSPM<\/li>\n<li>Mobile<\/li>\n<li>Wi-fi<\/li>\n<li>Encryption<\/li>\n<li>ZTNA<\/li>\n<li>Switch<\/li>\n<li>NETWORK<\/li>\n<li>Access Point<\/li>\n<li>Managed Threat Response<\/li>\n<li>Rapid Response<\/li>\n<li>Professional Services<\/li>\n<li>Identity and Access Management (IAM)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cloud computing&#8221; tab_id=&#8221;1577354495770-32b5f639-08fd&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Automation<\/li>\n<li>Cloud computing system<\/li>\n<li>Software publishing\/SAAS solutions<\/li>\n<li>Edge computing<\/li>\n<li>Cloud infrastructure\/platform solutions (PAAS, IAAS)<\/li>\n<li>Hosting<\/li>\n<li>Virtualisation<\/li>\n<li>Workstation virtualisation<\/li>\n<li>DAAS solutions<\/li>\n<li>BI solutions<\/li>\n<li>Big Data<\/li>\n<li>Analytics<\/li>\n<li>Dematerialisation<\/li>\n<li>Collaborative<\/li>\n<li>Private Cloud<\/li>\n<li>Public cloud<\/li>\n<li>Hybrid cloud<\/li>\n<li>ITIL<\/li>\n<li>ES M<\/li>\n<li>Cloud provider<\/li>\n<li>Unified Endpoint Management<\/li>\n<li>Risk Management \/ Cyber Risk Management<\/li>\n<li>Cyber Insurance \/ Scoring<\/li>\n<li>Compliance<\/li>\n<li>Governance<\/li>\n<li>Customised AI<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Data Center&#8221; tab_id=&#8221;1577354266026-3d24d7dc-6ed4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Optimisation\/Redesign, construction and expansion of data centres<\/li>\n<li>Outsourcing \/ Subcontracting<\/li>\n<li>Storage<\/li>\n<li>Infrastructure development<\/li>\n<li>Management services<\/li>\n<li>Backup<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Formation&#8221; tab_id=&#8221;1577354314274-eacd3422-49e5&#8243;][vc_column_text]<\/p>\n<ul>\n<li>IT services company \/ Integrator<\/li>\n<li>Consultancy in new technologies.<\/li>\n<li>Training<\/li>\n<li>Project management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Managed Services&#8221; tab_id=&#8221;1577354354524-64c8c886-aaec&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Monitoring tools<\/li>\n<li>Network monitoring<\/li>\n<li>Measurement and reporting<\/li>\n<li>Managed Print Service (MPS)<\/li>\n<li>Performance<\/li>\n<li>Security and business continuity (PCA)<\/li>\n<li>Outsourcing<\/li>\n<li>Digital product creation.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Printing Solutions&#8221; tab_id=&#8221;1577354389487-dfa7a5d1-36a6&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Printing systems<\/li>\n<li>Hardware solutions<\/li>\n<li>Software solutions<\/li>\n<li>Document Management<\/li>\n<li>Document security<\/li>\n<li>Dematerialisation of the print shop.<\/li>\n<li>Managed Document Services (MDS)<\/li>\n<li>Remote printing and scanning<\/li>\n<li>Document sharing<\/li>\n<li>Document auditing<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row el_id=&#8221;conferences&#8221;][vc_column][vc_empty_space height=&#8221;40px&#8221;]<div id=\"wyvc-section-title-8454\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>The conferences<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8454.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"wyvc-section-title-3679\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Conference programme<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text]<strong>IT &amp; CYBERSECURITY MEETINGS <\/strong>will feature plenary lectures and expert workshops addressing various current industry topics.[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/conferences\/\" title=\"Conferences\">\r\n\t\t<span class=\"wyvc-btn-text\">Program<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;4395&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;practical-information&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-8899\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Practical information<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8899.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221;][vc_column width=&#8221;5\/12&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: center\"><strong>DATES<\/strong><\/p>\n<p style=\"text-align: center\"><strong>7,8,9 September 2026<\/strong><\/p>\n<p style=\"text-align: center\"><strong>LOCATION<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Beurs Van Berlage, Amsterdam<\/strong><\/p>\n<p>[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\" href=\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/practical-information\/\" title=\"Practical information\">\r\n\t\t<span class=\"wyvc-btn-text\">Further information<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][vc_column width=&#8221;7\/12&#8243;][vc_gmaps link=&#8221;#E-8_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&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;present-sectors&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_column_text] Tuesday, September 8, 2026 Wednesday, September 9, 2026 Beurs Van Berlage, Amsterdam Please note that access is reserved for professionals only.\u00a0 The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-569","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Visit - IT and Cybersecurity One to one Meetings Netherlands<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Visit - IT and Cybersecurity One to one Meetings Netherlands\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;present-sectors&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_column_text] Tuesday, September 8, 2026 Wednesday, September 9, 2026 Beurs Van Berlage, Amsterdam Please note that access is reserved for professionals only.\u00a0 The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Netherlands\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T16:08:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/\",\"url\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/\",\"name\":\"Visit - IT and Cybersecurity One to one Meetings Netherlands\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website\"},\"datePublished\":\"2020-01-28T16:24:33+00:00\",\"dateModified\":\"2026-03-23T16:08:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Visit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/\",\"name\":\"IT and Cybersecurity One to one Meetings Netherlands\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization\",\"name\":\"IT and Cybersecurity One to one Meetings Netherlands\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png\",\"width\":198,\"height\":175,\"caption\":\"IT and Cybersecurity One to one Meetings Netherlands\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Visit - IT and Cybersecurity One to one Meetings Netherlands","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/","og_locale":"en_US","og_type":"article","og_title":"Visit - IT and Cybersecurity One to one Meetings Netherlands","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_section el_id=&#8221;present-sectors&#8221;][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_column_text] Tuesday, September 8, 2026 Wednesday, September 9, 2026 Beurs Van Berlage, Amsterdam Please note that access is reserved for professionals only.\u00a0 The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks [&hellip;]","og_url":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/","og_site_name":"IT and Cybersecurity One to one Meetings Netherlands","article_modified_time":"2026-03-23T16:08:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/","url":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/","name":"Visit - IT and Cybersecurity One to one Meetings Netherlands","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website"},"datePublished":"2020-01-28T16:24:33+00:00","dateModified":"2026-03-23T16:08:43+00:00","breadcrumb":{"@id":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-nl.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Visit"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/","name":"IT and Cybersecurity One to one Meetings Netherlands","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#organization","name":"IT and Cybersecurity One to one Meetings Netherlands","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-nl\/sites\/5\/2025\/10\/ITCM-LOGO-NL-2026.png","width":198,"height":175,"caption":"IT and Cybersecurity One to one Meetings Netherlands"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages\/569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/comments?post=569"}],"version-history":[{"count":3,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages\/569\/revisions"}],"predecessor-version":[{"id":7234,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/pages\/569\/revisions\/7234"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.nl\/en\/wp-json\/wp\/v2\/media?parent=569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}