InfosecurityBelgium 2019 March 20, 2019 to March 21, 2019, Brussels, Belgium

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
VMware Cloud on AWS - the real hybrid cloud solution (Powered by Arrow ECS) Mr. Gilles Chekroun N/A
How Network Access Control will help you face security challenges Mr. Karol Leroy Discover, manage, and centrally control everything connected to your networkNowadays, companies need to accommodate many ...
How to protect data from exfiltration in a cloud environment? Mr. Sebastian Puges Our 2018 DNS Security Survey showed that 39% of European companies have suffered data theft. ...
Case study Ritter Sport: how do you minimize the security risks through detection & response solutions? Mr. Veen Detection and response is a hot topic in the field of cyber security. In this ...
Changing criminal tactics need changing security measures Mr. John Shier When talk about cyber attacks, they're often talking about widespread, common threats, like phishing attacks ...
Get the basics right for your clients, before you delight them The Team Digital transformation needs an integrated approach. Up until now digital infrastructure has been static, carrying ...
AI/Machine learning in cloud management Pieter Vivijs The expediential growth and increased complexity of data - and data sources - introduces scalability ...
GDPR is there to stay. Are you in control of it? Mr. Stany Hellin Are you aware of the risks in your organization? What kind of personal data do ...
Don't Acquire Your Next Breach: Managing Vendor Risk Under the GDPR Mr. David Sinclair Managing vendor risk before, during and after onboarding is a continuous effort under the GDPR ...
Risk Models: how to build a strong foundation to face new threats Eward Driehuis During this presentation we will focus on risk models: we will discuss the most seen ...
Artificial Intelligence and Ethics Wouter Denayer Artificial intelligence will have a profound impact on everyone's professional and personal life. The emerging ...
Hacking Challenge (powered by Deloitte) Arthur Testa During this seminar, experienced ethical hackers introduce the public to the wonderful world of ethical ...
Enhancing security with AI & ML on AWS Orlando Scott-cowley Applying Artificial Intelligence and Machine Learning to enhance security; or is the haystack broken? In ...
Deliver easy rock-solid security to remote networks and mobile users Mr. Rutger Truyers Your security strategy should be consistent across everything you need to protect. How do you ...
Building a modern data center with NetApp and Veeam Mr. Timothy Dewin Building a hybrid cloud architecture can be tough. A lot of challenges can pop up. ...
The Dell Technologies Multi-Cloud Strategy: On Prem, Off Prem or Public or Private. How do you choose? Mr. Gregory Oldyck Public, private, on premises, off premises. Do one or all of these provide what you ...
Optimize Your Security Operations Using DNS and Threat Intel Data (Powered by Westcon) Mr. Erik Peeters Very often, your enterprise network relies on a vast assortment of security devices and solutions, ...
KickOff: Belgian cyber landscape Jo de Muynck The federal Computer Emergency Response Team, or CERT.be, is the operational service of the Centre ...