Round Table: Can your custom app deliver proof of operational effectiveness?

Wednesday
18.00
20.00
Register now

Not all digital assets demand the same level of cybersecurity scrutiny. 

Custom web-facing applications that handle critical content require the highest level of protection. And that bar has recently been raised by updated regulations such as DORA, BIO, NIS2, and DigiD. Audit requirements for critical components have evolved—from demonstrating design effectiveness to proving operational effectiveness. In practice, this means that a custom application deployed through continuous delivery pipelines needs far more than basic logging and a few sample checks. It must provide ongoing, verifiable evidence of secure and reliable operation.

Speaker

Joost Sprakel

Joost Sprakel is a seasoned professional with extensive expertise in risk management, internal control, and cybersecurity. He has a proven track-record in designing and implementing governance frameworks proving adequate control. It started in 2002 with Sarbanes Oxley requiring evidence for financial control. Now, in 2025, cyber regulation requires that same level of resilience.

Over the last 20 years he worked for SAP (GRC), BWise (GRC), Protiviti (Risk), BusinessForensics (Fraud) and started Securely (Cyber GRC) 4 years ago.

Date

TIME

18.00
20.00

Costs

Free for ISACA en NOREA members

CPE Points

2 CPE

Location

Van der Valk Hotel Eindhoven
Aalsterweg 322, Eindhoven

Organiser

ISACA Netherlands Chapter
info@isaca.nl

Organiser

NOREA
norea@norea.nl
Please note: Registration is open until September 23, 2025 00:00

We do our best with using as less posible cookies and tracking. By continuing to use this site, you acknowledge and accept our use of functional cookies. However, some external services require your permission to place cookies.

Accept All Accept Required Only