Security sales techniques to avoid when presenting to a CISO
Wednesday, 18 March 2020
Wednesday, 18 March 2020
Thursday, 28 May 2020
An overview en best practices of using open source security tools for CIOs
Thursday, 13 February 2020
A workshop on information security by design for ICT professionals
Wednesday, 12 February 2020
An overview of cybersecurity evolutions for CIOs in Belgium
Friday, 8 November 2019
An overview of cybersecurity threats and resilience strategies for experts in Belgium.
Monday, 14 October 2019
An overview of relevant up to date cybersecurity standards to help cybersecurity professionals with foundational information.
Tuesday, 8 October 2019
Avec tant d’outils disponibles pour gérer à la sécurité, il peut être difficile de savoir où commencer. Lors de cette conférence, un aperçu des outils « open source » préférées vous serons présentés ainsi que des conseils sur la façon de les utiliser pour la sécurité dans votre organisation. Vous apprendrez sur l’utilisation des outils « open source » dans les domaines de la découverte réseau, de l’analyse de la vulnérabilité et des tests de pénétration(intrusion), le tout avec des exemples concrets.
Friday, 4 October 2019
Implementing the proper controls to guarantee proper governance in IT availability, IT capacity and IT continuity
Wednesday, 19 June 2019
Business Faculty | Brussel (Neder-Over-Heembeek)
IT audit van actuele thema's
Wednesday, 20 March 2019
With so many open source tools available to help with security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security. In this 30 minute session, an overview is provided of favorite open source tools as well as tips on how to use them for security. You'll learn about using open source tools for amongst others network discovery, network IDS, vulnerability scanning and penetration testing with demo's.
Saturday, 16 March 2019
Introducing, presenting and applying security by design for CIOs
Friday, 8 March 2019
Presenting information security awareness basics to all employees
Tuesday, 5 March 2019
Presenting the security awareness basics to all employees
Friday, 22 February 2019
introducing, presenting and applying security architecture for IT professionals
Wednesday, 19 December 2018
Digital risk is a term encompassing all digital enablements that improve risk effectiveness and efficiency—especially process automation, decision automation, and digitized monitoring and early warning. The approach uses work-flow automation, optical-character recognition, advanced analytics (including machine learning and artificial intelligence), and new data sources, as well as the application of robotics to processes and interfaces. Essentially, digital risk implies a concerted adjustment of processes, data, analytics and IT, and the overall organizational setup, including talent and culture.
By improving the efficiency and effectiveness of current risk- management approaches, digital risk initiatives can reduce operating costs for risk activities by 20 to 30 percent.
Wednesday, 5 December 2018
The risks and opportunities which digital technologies, devices and media bring us are manifest. Cyber risk is never a matter purely for the IT team, although they clearly play a vital role. An organisation's risk management function need a thorough understanding of the constantly evolving risks as well as the practical tools and techniques available to address them. All types and sizes of organisations are at risk, not only the financial services firms, defence organisations and high profile names which make the headlines.
A crossroads has been reached. Cyber risk can either continue to be seen as negative – as another potential set of costs, complicate procedures and incoming legislative demands – or firms can use good cyber risk management as a differentiator from competitors as a selling point to clients, and as a measure of reassurance to stakeholders.
Tuesday, 4 December 2018
Novotel Leuven | Leuven
IT audit van actuele topics
Tuesday, 23 October 2018
Uitgeverij Politeia, Keizerslaan 34, 1000 Brussel
Aan de hand van vijf echt gebeurde incidenten in België krijgt u als deelnemer van dit seminarie een inkijk in de cyberincidenten die zich kunnen voordoen, ook in uw eigen organisatie, en wat de mogelijke impact kan zijn. De cyberrisico's nemen immers toe, maar ook de controle op informatieveiligheid naar aanleiding van de GDPR wordt strenger. Tijd dus om te zorgen voor voldoende kennis binnen uw organisatie en dat u weet wat u moet doen indien het onfortuinlijke moment van een cyberaanval zich zou voordoen.
Wie deelneemt aan dit praktijkseminarie krijgt eveneens de publicatie ‘Cyberrisico’s – een nieuwe dagelijkse realiteit
Wednesday, 17 October 2018
Pullman hotel Brussels Midi, Brussels
The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise’s information security.
Monday, 15 October 2018
Solvay Business School, Brussels
Standards are an essential backbone to implementing your cybersecurity strategy. They provide best-practice guidance and establish roles and processes to help put your cybersecurity plan in place and structure your workload.
The standards are generally applicable to all organizations, regardless of their size or the industry and sector they operate in. This page provides generic information on each of the standards that are usually recognized as essential components of any cybersecurity strategy.
Friday, 5 October 2018
Antwerp Management School, Antwerp
Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—whether those events might include a hurricane or simply a power outage caused by a backhoe in the parking lot. The CISO's involvement in this process can range from overseeing the plan, to providing input and support, to putting the plan into action during an emergency. This seminar explains the basic concepts of availability, capacity and business continuity planning.
Thursday, 4 October 2018
ING Belgium, St Michielswarande 40, Etterbeek (Belgium)
ISACA has surveyed security leaders worldwide in 2018 to determine their insights and experiences with key cybersecurity issues, ranging from workforce challenges and opportunities to the emerging threat landscape.
Tuesday, 19 June 2018
Pullman hotel Brussels Midi, Brussels
De digitalisering wijzigt de wereld waarin wij wonen en werken. De mogelijkheden om data te verzamelen en te gebruiken lijken eindeloos. De Smart City is geen verre droom meer maar een realiteit binnen handbereik. Een voorwaarde om succesvol actief te zijn in een gedigitaliseerde omgeving is voldoende aandacht besteden aan de veiligheid. Marc Vael bespreekt 10 concrete gevallen met betrekking tot cyberveiligheid. Zij vormen een staalkaart van de belangrijkste risico’s in de cyberwereld in België.
Wednesday, 13 June 2018
Elewijt Center | Elewijt
Training on IT audit topics such as security, cloud, general IT controls, social media, etc.
Tuesday, 5 June 2018
San Antonio, Texas, USA
The digital production data and packaging assets are among the top 3 of the most important assets of a converter. But in a worldwide all-connected workflow, your digital assets have also become extremely interesting to "non-authorized parties". Cyber risks like hacking, ransomware, phishing and software exploits are real and can impact your bottom line. In this session, you will learn which global cybersecurity standards are useful, how you can avoid reputation and financial damage and how to improve your overall cybersecurity posture.
Tuesday, 22 May 2018
Presenting practical cases on cybersecurity incidents before an ISACA audience in London.
Wednesday, 25 January 2017
Friday, 16 December 2016
Keynote presentation on cyberthreats and resilience today in Belgium with the goal to make people aware how easy it is to get access to all types of digital information (text, voice, video, etc.) and what basic actions are required to protect organisations and individuals.
Wednesday, 30 October 2013
The world evolves rapidly – as does technology. This session will provide a glimpse of the future, taking 10 IT trends which will impact the information security profession in the coming five to 10 years. Based on in-depth independent research, this presentation will provide the audience with food for thought in his/her role as CISO or security professional battling these 10 trend challenges.
Wednesday, 18 April 2012
Auditing in the cloud environment, particularly for identity management systems, touches on a range of interconnected, international issues: data governance, competing legal and regulatory environments, standards and interoperability, and a host of specific policy issues that are increasingly problematic, such as data privacy.