Security sales techniques to avoid when presenting to a CISO

Wednesday, 18 March 2020

Brussels

View event website

Open source Security tools

Thursday, 28 May 2020

Gent (Belgium)

An overview en best practices of using open source security tools for CIOs

View event website

past events

Information Security Architecture

Thursday, 13 February 2020

Tilburg

A workshop on information security by design for ICT professionals

View event website

Cybersecurity 2020

Wednesday, 12 February 2020

Antwerp

An overview of cybersecurity evolutions for CIOs in Belgium

Cybersecurity threats & resilience

Friday, 8 November 2019

Brussels

An overview of cybersecurity threats and resilience strategies for experts in Belgium.

View event website

Cybersecurity standards

Monday, 14 October 2019

Brussels

An overview of relevant up to date cybersecurity standards to help cybersecurity professionals with foundational information.

View event website

Quels sont les outils de sécurité « open source »?

Tuesday, 8 October 2019

Quebec (Canada)

Avec tant d’outils disponibles pour gérer à la sécurité, il peut être difficile de savoir où commencer. Lors de cette conférence, un aperçu des outils « open source » préférées vous serons présentés ainsi que des conseils sur la façon de les utiliser pour la sécurité dans votre organisation. Vous apprendrez sur l’utilisation des outils « open source » dans les domaines de la découverte réseau, de l’analyse de la vulnérabilité et des tests de pénétration(intrusion), le tout avec des exemples concrets.

View event website

Availability, capacity, continuity

Friday, 4 October 2019

Antwerp

Implementing the proper controls to guarantee proper governance in IT availability, IT capacity and IT continuity

View event website

Interne Audit & IT

Wednesday, 19 June 2019

Business Faculty | Brussel (Neder-Over-Heembeek)

IT audit van actuele thema's

View event website

Relevant open source security tools you should know

Wednesday, 20 March 2019

Brussels

With so many open source tools available to help with security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security. In this 30 minute session, an overview is provided of favorite open source tools as well as tips on how to use them for security. You'll learn about using open source tools for amongst others network discovery, network IDS, vulnerability scanning and penetration testing with demo's.

View event website

Security by design

Saturday, 16 March 2019

Tilburg

Introducing, presenting and applying security by design for CIOs

View event website

Information Security Awareness

Friday, 8 March 2019

Chicago

Presenting information security awareness basics to all employees

View event website

Information Security Awareness

Tuesday, 5 March 2019

Minneapolis

Presenting the security awareness basics to all employees

View event website

Security Architecture

Friday, 22 February 2019

Antwerp

introducing, presenting and applying security architecture for IT professionals

View event website

Digital Risks

Wednesday, 19 December 2018

KdG Antwerpen

Digital risk is a term encompassing all digital enablements that improve risk effectiveness and efficiency—especially process automation, decision automation, and digitized monitoring and early warning. The approach uses work-flow automation, optical-character recognition, advanced analytics (including machine learning and artificial intelligence), and new data sources, as well as the application of robotics to processes and interfaces. Essentially, digital risk implies a concerted adjustment of processes, data, analytics and IT, and the overall organizational setup, including talent and culture.
By improving the efficiency and effectiveness of current risk- management approaches, digital risk initiatives can reduce operating costs for risk activities by 20 to 30 percent.

View event website

Cyberrisks : a reality which can be handled

Wednesday, 5 December 2018

Oslo, Norway

The risks and opportunities which digital technologies, devices and media bring us are manifest. Cyber risk is never a matter purely for the IT team, although they clearly play a vital role. An organisation's risk management function need a thorough understanding of the constantly evolving risks as well as the practical tools and techniques available to address them. All types and sizes of organisations are at risk, not only the financial services firms, defence organisations and high profile names which make the headlines.
A crossroads has been reached. Cyber risk can either continue to be seen as negative – as another potential set of costs, complicate procedures and incoming legislative demands – or firms can use good cyber risk management as a differentiator from competitors as a selling point to clients, and as a measure of reassurance to stakeholders.

View event website

Interne Audit & IT

Tuesday, 4 December 2018

Novotel Leuven | Leuven

IT audit van actuele topics

View event website

Cyberrisico's: mogelijke gevaren en oplossingen

Tuesday, 23 October 2018

Uitgeverij Politeia, Keizerslaan 34, 1000 Brussel

Aan de hand van vijf echt gebeurde incidenten in België krijgt u als deelnemer van dit seminarie een inkijk in de cyberincidenten die zich kunnen voordoen, ook in uw eigen organisatie, en wat de mogelijke impact kan zijn. De cyberrisico's nemen immers toe, maar ook de controle op informatieveiligheid naar aanleiding van de GDPR wordt strenger. Tijd dus om te zorgen voor voldoende kennis binnen uw organisatie en dat u weet wat u moet doen indien het onfortuinlijke moment van een cyberaanval zich zou voordoen.

Wie deelneemt aan dit praktijkseminarie krijgt eveneens de publicatie ‘Cyberrisico’s – een nieuwe dagelijkse realiteit

View event website

ISACA CISM training (certified information security manager)

Wednesday, 17 October 2018

Pullman hotel Brussels Midi, Brussels

The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise’s information security.

View event website

Cybersecurity standards

Monday, 15 October 2018

Solvay Business School, Brussels

Standards are an essential backbone to implementing your cybersecurity strategy. They provide best-practice guidance and establish roles and processes to help put your cybersecurity plan in place and structure your workload.
The standards are generally applicable to all organizations, regardless of their size or the industry and sector they operate in. This page provides generic information on each of the standards that are usually recognized as essential components of any cybersecurity strategy.

View event website

Availability, Capacity and Continuity

Friday, 5 October 2018

Antwerp Management School, Antwerp

Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—whether those events might include a hurricane or simply a power outage caused by a backhoe in the parking lot. The CISO's involvement in this process can range from overseeing the plan, to providing input and support, to putting the plan into action during an emergency. This seminar explains the basic concepts of availability, capacity and business continuity planning.

View event website

Cybersecurity survey 2018 results

Thursday, 4 October 2018

ING Belgium, St Michielswarande 40, Etterbeek (Belgium)

ISACA has surveyed security leaders worldwide in 2018 to determine their insights and experiences with key cybersecurity issues, ranging from workforce challenges and opportunities to the emerging threat landscape.

View event website

Cyberrisk: A new reality presented in 10 cases

Tuesday, 19 June 2018

Pullman hotel Brussels Midi, Brussels

De digitalisering wijzigt de wereld waarin wij wonen en werken. De mogelijkheden om data te verzamelen en te gebruiken lijken eindeloos. De Smart City is geen verre droom meer maar een realiteit binnen handbereik. Een voorwaarde om succesvol actief te zijn in een gedigitaliseerde omgeving is voldoende aandacht besteden aan de veiligheid. Marc Vael bespreekt 10 concrete gevallen met betrekking tot cyberveiligheid. Zij vormen een staalkaart van de belangrijkste risico’s in de cyberwereld in België.

View event website

Interne Audit & IT

Wednesday, 13 June 2018

Elewijt Center | Elewijt

Training on IT audit topics such as security, cloud, general IT controls, social media, etc.

View event website

ESKOWORLD

Tuesday, 5 June 2018

San Antonio, Texas, USA

The digital production data and packaging assets are among the top 3 of the most important assets of a converter. But in a worldwide all-connected workflow, your digital assets have also become extremely interesting to "non-authorized parties". Cyber risks like hacking, ransomware, phishing and software exploits are real and can impact your bottom line. In this session, you will learn which global cybersecurity standards are useful, how you can avoid reputation and financial damage and how to improve your overall cybersecurity posture.

View event website

What can we learn from cybersecurity incidents?

Tuesday, 22 May 2018

London

Presenting practical cases on cybersecurity incidents before an ISACA audience in London.

View event website

Contrôle IT : nouvelle technologie, nouveaux risques d'audit

Wednesday, 25 January 2017

Bruxelles

cyberthreats & resilience in Belgium

Friday, 16 December 2016

Brussels

Keynote presentation on cyberthreats and resilience today in Belgium with the goal to make people aware how easy it is to get access to all types of digital information (text, voice, video, etc.) and what basic actions are required to protect organisations and individuals.

10 IT Trends Influencing the Information Security Profession

Wednesday, 30 October 2013

Amsterdam

The world evolves rapidly – as does technology. This session will provide a glimpse of the future, taking 10 IT trends which will impact the information security profession in the coming five to 10 years. Based on in-depth independent research, this presentation will provide the audience with food for thought in his/her role as CISO or security professional battling these 10 trend challenges.

View event website

Global Perspectives on Cloud Auditing Challenges and Solutions

Wednesday, 18 April 2012

Munich

Auditing in the cloud environment, particularly for identity management systems, touches on a range of interconnected, international issues: data governance, competing legal and regulatory environments, standards and interoperability, and a host of specific policy issues that are increasingly problematic, such as data privacy.

View event website

By continuing to use the site, you agree to the use of cookies      Terms & Conditions   |   Cookie policy      Accept