dec 2: 09:00 to 19:00 hrs

Day 2 Schedule

Focuses on foundational knowledge, threat landscape analysis, and initial strategic frameworks.

09:00 - 10:00

Speaker and Subject To Be Announced

10:00 - 10:45

Intelligence Operations During Active Conflict - Lessons from Ukraine Practical strategies for organizational resilience and personnel security in high-risk environments.

WITH Lt. Gen. Valeriy Kondratyuk
(SUBJECT TO THE SITUATION IN UKRAINE)
10:45 - 11:00

Coffee Break Informal discussions.

11:00 - 12:00

Intelligence Leadership: A View from the Top Lt. Gen. Bertholee ret. shares invaluable leadership lessons for senior leaders navigating high-stakes intelligence challenges. The precise topic will be confirmed soon, promising timely and actionable intelligence for decision-makers.

WITH Rob Bertholee
12:00 - 13:00

Lunch Discussion of morning insights and preparation for afternoon sessions.

13:00 - 14:00

Case study 1 Hyarchis Vilnius: Lessons Learned

WITH Adriaan Hoogduijn
13:00 - 14:00

Case study 2 “Inside the Breach: Lessons from the Microsoft SharePoint and Exchange Hacks”

With Vaisha Bernard
14:00 - 15:00

Supply Chain Sabotage: The Case of the Energy Grid How to monitor activity and protect your assets using intelligence.

WITH Susan Miller
15:00 - 15:30

Afternoon Break Refreshments and informal discussions.

15:30 - 16:00

Closing Remarks Final thoughs and wrap-up of the summit

WITH Tim Bosch
16:00 - 19:00

1-1 Sessions + Drinks & Canapes

Exclusive Benefits

Key outcomes for your organization

Strategic advantages that strengthen your organization’s capacity to anticipate and recover from conflict scenarios through intelligence.

Actionable Risk Intelligence
Access military-grade threat assessments and forward-looking risk intelligence; 
insights beyond the reach of conventional corporate reporting.
Exclusive Peer-to-Peer Network
Enter a confidential circle of former intelligence directors, military commanders, 
and corporate security leaders for peer exchange and trusted insight.
Secure Communication Protocols
Adopt and implement secure communication strategies that maintain board functionality amid infrastructure failure, disinformation, or digital disruption.

About Birdwatcher Group

Birdwatcher Group brings decades of distinct intelligence expertise to the table.

(International) Investigations

(Corporate) espionage, political influence operations, fraud, corruption, or unexpected geopolitical crises demand intelligence-based investigation methods.

Technical Intelligence Solutions

Cutting-edge technology is indispensable to success. Both in hardware and software, Birdwatcher Group offers unrivaled expertise in technical intelligence solutions.

Security Sector
Reform

Impactful change to strengthen security institutions and increase stability through guidance and training.

Any questions?

Mailevents@birdwatchergroup.com