Speaker

Soenil Soebedar

Soenil Soebedar

Founder SOEBIT Cybersecurity - EU, Freelancer Cryptography Architect, Senior PKI Specialist, Cybersecurity Consultant, Speaker & Trainer

Utrecht, The Netherlands

Actions

Soenil Soebedar is a solution-oriented Cyber security professional who spent more than 32 years in the IT sector, 22 years as a contractor and founder of SOEBIT Cybersecurity in Netherlands (Europe) and 12 years in the Cyber Security area as Ethical Hacker, Penetration tester, PKI/Cryptography specialist, Senior Security Engineer, Senior SOC Specialist. He has experience in a number of industries such as Finance and Banking, Energy, Government, Healthcare, Education and Consulting and a lot of international experience to work in teams and individually, in multiple countries and several cultures: France, Germany, UK, The Netherlands, Belgium, India & Dubai.

• Worked 7 + years for the European Power & Gas exchange market, Worked 5+ years in the IT & Cybersecurity Training & Education field – International (Dubai & India), Worked 3 + Years for the Government of The Netherlands – Division: Ministry of Justice and Security for customers as Custodial Institutions Agency (All Prison of NL) as Senior SOC Security Engineer & Penetration Tester, Worked 16 months as freelance Senior security engineer (Malware & DLP team) for ABN-AMRO Bank, Worked 14 months as freelance Senior PKI Cryptography specialist for Dutch Central Bank, Currently, since Oct 2022, working as freelance PKI & Cryptography Architect for Government of Defence in The Netherlands
• Hold 29 International cybersecurity valid certifications, such as (CEH) Ethical Hacker, RCCE, CCISO, CHFI, Microsoft Azure & Security SC-100, SC-200, AI-102, Mobile Forensics, cryptography & advanced penetration testing etc.
• He is certified Trainer for PECB, EC-Council & Rocheston Cybersecurity training.

• Technical & Keynote Speaker on Cybersecurity conferences on CYBERSEC Asia 2025, CYBERSEC Netherlands 2024, CyberWiseCon 2024, IT/CS University’s in Coimbatore, Ahmedabad, Delhi, Bangalore, NMITCON 2023+2024, Bangalore, AsiaTech Singapore 2023, C0c0n 2022 by Kerala Police in India, Diversec-con, IEEE India, Rocheston Reinvent, Next Generation CyberMinds, Malaysia, Asia Conference etc.

• He has delivered (virtual) workshops, cybersecurity training, speaker on conferences and webinars for IT Professionals, colleges & universities in Netherlands, USA, Suriname, India, Ghana, Lithuania, Bangkok, Singapore & Malaysia.

Area of Expertise

  • Finance & Banking
  • Government, Social Sector & Education
  • Information & Communications Technology

Topics

  • cybersecurity
  • AI and Cybersecurity
  • Quantum computing
  • Digital Forensic
  • penetration testing

Securing Tomorrow: AI, Cybersecurity & Quantum Resilience

The integration of Big Data, artificial intelligence (AI), and quantum computing is set to revolutionize the field of cybersecurity. These technologies offer unprecedented capabilities for data analysis, threat detection, and encryption, but also introduce new challenges that must be addressed to ensure robust security.

As the digital landscape continues to evolve, cybersecurity professionals are increasingly looking to advanced technologies to enhance their defenses. AI offers sophisticated pattern recognition and predictive capabilities, and quantum computing promises to solve complex problems that classical computers cannot. However, the convergence of these technologies also poses significant risks, particularly in terms of cryptographic security, necessitating the development of quantum-resistant encryption techniques.

Red Teaming for Healthcare

In this talk, you will learn what a red team is, how it's different from another team, the challenges we faced, and examples of real life healthcare operations I performed as a Redteamer & penetration tester for an enterprise hospital in Europe. Get also to know how an average day look likes as a Redteamer, Penetration Tester and Cryptography Specialist.

You will walk away with:
• Simple way of explanation of all the Redteam topics for all audiences for this conference.
• What is Penetration Testing.
• Why Penetration Testing.
• Better understanding of very often use keywords in penetration testing & cybersecurity.
• Penetration testing, compare to Red teaming and other teams.
• Phases in penetration testing and red teaming.
• How red teaming can benefit your organization, and the role that offense can play in your defense.
• One day in a life of a Redteamer - in 9 steps.
• Pentest process, NDA, Waiver, Approval etc,
• What skills & knowlegde requirements for a penetration tester & red-teamer.
As use-case i will explain step by step the real operations steps, how we perform the Red teaming exercise for a Hospital in Europe.

Quantum Computing, AI, ML, Cryptography & Cybersecurity concerns

Artificial Intelligence (AI), Machine Learning (ML), and Quantum Computing are some of the most promising technologies of the 21st century. AI and ML have already revolutionized various industries, including healthcare, finance, and transportation, by automating processes, reducing costs, and improving efficiency. Quantum computing, on the other hand, is still in its early stages, but it has the potential to solve problems that classical computers cannot.

The intersection of AI, ML, Quantum Computing, and cybersecurity presents a dynamic landscape with evolving challenges and opportunities. This abstract aims to provide a holistic overview of the intricate relationship between AI, ML, Cryptography, Quantum Computing, and cybersecurity, offering valuable insights and real-world use cases.

Keywords:
AI, ML, Gen AI, Cloud security, Quantum Computing, Future of AI, Cybersecurity, Responsible AI, Quantum, ML, ChatGPT, post quantum, encryption, PQC, RSA, Qubit, Quantum Supremacy

Crypto 2030: Rethinking Security in a Quantum-Driven World

By 2030, quantum computing may render today’s cryptographic systems—like RSA, ECC, and even AES—vulnerable to powerful quantum attacks. This forward-looking session explores how Shor’s and Grover’s algorithms pose a real threat to our encryption foundations and what “Q-Day” could mean for data privacy, infrastructure, and national security. Attendees will discover why quantum computing will disrupt cryptography, the urgent need for post-quantum cryptography (PQC), and how organizations can pivot through crypto agility, hybrid defenses, and proactive inventorying of vulnerable assets.
Informed by global initiatives such as NIST’s PQC standardization, the session introduces lattice-based algorithms like Kyber and Dilithium, unpacking their role in creating quantum-resilient architectures. You'll learn why AES isn’t obsolete—yet—and how doubling key lengths can sustain symmetric encryption’s strength. Real-world readiness begins now, and this talk outlines a four-step quantum preparedness roadmap every security team should consider.
From hybrid cryptosystems to the role of quantum AI, and from trust redesign to actionable migration strategies, this session is a call to rethink digital security—not only to survive the quantum era but to lead in it.

From practical migration strategies to global standardization efforts, this session blends real-world urgency with forward-thinking guidance. Whether you're a developer, CISO, or security strategist, this talk is your roadmap to staying resilient, crypto-agile, and ready for what's next.

Building Trust at Scale: Securing, Certifying, and Complying in the Age of AI

As AI adoption accelerates across every industry, organizations face a new mandate: build smarter systems and safer ones. This session explores how to secure AI platforms from emerging cyber threats, how to certify both talent and technologies, and how to navigate increasingly complex AI compliance in cloud-first environments.
Participants will walk away with a deeper understanding of AI’s dual role—as both defender and attack surface—and how Zero Trust principles are evolving to include machine learning pipelines and model APIs. We’ll also dive into the growing importance of AI certifications in closing talent gaps, and how global standards like ISO/IEC 42001, EU AI Act, Microsoft AI, and cloud-specific regulatory frameworks are reshaping deployment strategies.

Key insights include:
- Why AI governance and post-deployment monitoring are essential not optional .
- How multi-cloud compliance introduces new risks for unregulated AI usage.
- The shift from certifying only people to certifying AI systems, datasets, and tools.
- The business case for embedding ethics, transparency, and explainability by design.
- How cross-functional alignment from engineering to legal is critical to responsible AI.

In today’s AI-powered enterprise, trust is no longer implied it must be engineered.

Curiosity Under Clearance: How Government Red Teams Think

In the ever-evolving landscape of cyber threats, curiosity isn’t just a trait—it’s a tactical advantage. This session explores the mindset, mission, and daily work of a government-affiliated red teamer, penetration tester, and cryptography specialist through the lens of real operations performed in a European healthcare environment. From simulating adversarial breaches to navigating regulatory frameworks like NDAs and clearance protocols, you’ll gain an inside look at how strategic curiosity fuels defensive innovation.

Whether you're a seasoned cybersecurity professional or just getting started, this talk offers clear, accessible explanations of red teaming concepts, penetration testing phases, and often-confused terminology. You’ll walk away with a structured breakdown of offensive security workflows, a candid look into the tools and thought processes behind effective threat emulation, and actionable insights on how red teams strengthen security through simulated chaos—especially within government and healthcare infrastructures.

Soenil Soebedar

Founder SOEBIT Cybersecurity - EU, Freelancer Cryptography Architect, Senior PKI Specialist, Cybersecurity Consultant, Speaker & Trainer

Utrecht, The Netherlands

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top