EVENT · MAY 20–21, 2026

Crimson7 at Cybersec Europe Brussels

Two operator-grade talks on continuous Purple Team validation and threat hunting at scale. Plus our team at booth 05.B067 across both days. Both talks delivered by Joey Verleg, Head of Managed Services.

WED 20 MAY · THU 21 MAY · BRUSSELS EXPO · BOOTH 05.B067 · 2 TALKS
WHAT WE'RE PRESENTING

Two talks. One operator's perspective.

Joey delivers both sessions. Different rooms, different days, same operator-grade lens.

WED 20 MAY · 13:00–13:30THEATER 3
HACKERFLOW

Always Under Attack: Turning Purple Teaming into Continuous Security Validation

In this session, Crimson7 tackles one operational question head-on: do our detections actually catch real attacks, right now? We'll show how we use HackerFlow to answer that without waiting for the annual red/purple team cycle.

Instead of relying on point-in-time exercises, HackerFlow continuously ingests threat intelligence, translates it into threat-informed test plans, and runs repeatable attack simulations mapped to MITRE ATT&CK using open-source C2 frameworks plus a private C2 for more advanced tradecraft. Crucially, we'll show how validation goes beyond “noisy” commodity tests (like basic PowerShell) by exercising fileless / in-memory behaviors and realistic operator patterns so you can verify whether your EDR and analytics catch what sophisticated intrusions actually do, not just the easy stuff. As simulations execute, HackerFlow validates whether detections fire, captures full execution telemetry, and produces audit-ready evidence and gap reports, helping teams fix blind spots before incidents and support continuous validation expectations under DORA/NIS2.

Joey Verleg · Head of Managed Services, Crimson7
THU 21 MAY · 14:30–15:00THEATER 5
7HUNTER

Never Hunt Alone: A Threat Hunting Companion for the SOC

In this session Crimson7 will show how to turn threat hunting from “tribal knowledge” into a repeatable, measurable workflow using 7Hunter. We'll demo how teams can go from a CTI lead or hypothesis to an executable hunt in minutes by browsing 4,280+ pre-built KQL queries and 75+ investigation runbooks, all mapped to MITRE ATT&CK so you can see what techniques you actually cover. You'll see one-click export to Microsoft Sentinel with automatic hunt creation, how an AI assistant can run live KQL during an investigation to speed iteration, and how the public REST API plugs into SOAR pipelines. The goal: faster hunts, fewer blind spots, and real visibility into your hunting posture, without rebuilding queries from scratch every time.

Joey Verleg · Head of Managed Services, Crimson7
HALL 5 · BOOTH B067

Come find us at the booth

We're at booth 05.B067 across both days. Bring questions about offensive security, detection engineering, threat hunting, or how Purple Team programs actually run in production. We'll talk through HackerFlow and 7Hunter on demand — but mostly we want to hear what you're working on.

If you'd like a guaranteed slot rather than queuing up, book a 20-minute conversation below.

Red TeamPurple TeamDetection EngineeringThreat HuntingManaged SecurityHackerFlow (continuous Purple Team)7Hunter (KQL hunt library + AI assistant)
AFTER THE EVENT

Get the decks delivered when the event wraps

Drop your email below. We'll send both talk decks (Joey's full slides) plus our Crimson7 capabilities deck the day after the event closes. No spam — you can unsubscribe with one click.

By submitting, you agree to receive the decks and follow-up notes from Kenneth at Crimson7. See our privacy policy.

SPEAKER

About Joey

Joey Verleg

Joey Verleg

Head of Managed Services, Crimson7

Joey leads Managed Services at Crimson7, where he runs continuous Purple Team programs for security teams and consulting partners. His focus is making adversary emulation usable — turning attack output into detection rules teams actually deploy.

ABOUT

Crimson7 in one paragraph

Crimson7 is an offensive security firm based in Brussels. We do red team, purple team, detection engineering, and threat hunting work for security teams and consulting partners. We build tools — HackerFlow and 7Hunter — when the market doesn't have what operators actually need.

Post-event recap and slides will appear here after May 21.