Cyber security challenges of growing E-Commerce: Hunkemöller’s approach

April 22, 2021

During this Virtual Roundtable, Kees de Jong, Global Information Security Officer & Data Privacy Officer of Hunkemöller, will share his company’s cyber security challenges and opportunities.

  • Small scaled peer session
  • Open dialogue by means of the Chatham House Rule
  • Insights in the increasing importance of Cyber Security for retailers like Hunkemöller
Sign up

Kees de Jong

Global Information Security Officer & Data Privacy Officer

With more than 15 years of experience in various digital security positions, Kees de Jong is a seasoned security expert. In his current role as Global Information Security Officer & Data Privacy Officer at Hunkemöller, Kees is responsible for the information security and privacy within Hunkemöller stores and headquarters in all countries. Next to that, he focuses on defining Hunkemöller’s 3-year Information Security Strategy.


With more than 900 stores worldwide, Hunkemöller is a big player in the retail market. Before the COVID outbreak hit the world, one fifth of the company’s revenue already came from e-commerce. How does Hunkemöller, with an ever growing e-commerce presence, manage its cyber security challenges in these turbulent times?


During this global pandemic, retailers around the world have had to close their doors, are trying to understand the changes needed to re-open physical stores, and in many cases build an online presence. With the current focus on e-commerce due to the closing of physical stores, Cyber Security becomes a top priority, since downtime results in a huge loss of income which could be fatal in these challenging times.


16:55 | Dial in on Teams meeting
17:00 | Start program, including presentation & discussion
18:30 | End



Main language



  • Participants have to meet the previously described target audience.
  • If applicable, our partners will be presented with every application.
  • During all our sessions, the Chatham House Rule applies. This means that the participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed. This means that no report, no photos and no recordings are made of the meeting. The presentation will also not be distributed to the participants afterwards.

Contact information


Do you wish to be informed about our upcoming sessions? Subscribe to our monthly agenda!