-
Square Tables
-
2023
- 2023 05 03 Presentation Ali Alam DORA The next IT-regulation in the pipeline
- 2023 03 08 Presentation Jorge de Almeida Pinto - Resurrecting After A Ransomware Attack
- 2023 03 01 Presentatie Laurens Jagt - IT Risk Careers in 2023 The Threats & Opportunities
- 2023 02 15 Presentation Atul Kumar - Revisiting Technology Risk Quantification
- 2023 02 08 Presentation - Egbert Bouman - Risk management in an agile setting
- 2023 01 23 Presentatie Rainer M. Richter
- 2023 01 11 Presentation Vincent van Dijk - Cybersecurity Canvas
-
2022
- 2022 06 01 Can you handle going down
- 2022 05 25 A Different and Easier way to Implement 2700X and Achieve Compliance
- 2022 05 11 A framework for managing risk & responding to cyberthreats pdfx
- 2022 04 13 Train digitalisation and cyber security
- 2022 03 16 Shift Left, the right way! How to reach Nirvana in securing DevOps
- 2022 03 09 The quantum threat to our digital society
- 2022 03 02 COBIT’s Value for Small and Medium Enterprises
- 2022 02 16 Down the rabbit hole - a tour into the dark web
- 2022 02 09 A journey into Business Impact Analysis and Cloud adoption - Tijl Dullers
- 2022 02 09 A journey into Business Impact Analysis and Cloud adoption - Geert Boelens
- 2022 02 02 HET LEVEN IS VERRUKKELIJK
- 2022 01 19 STAYING AHEAD OF THREAT ACTORS
-
2021
- 2021 12 15 The rise and fall of The Fraud Family – one of the most prolific cybercrime syndicates in the Netherlands
- 2021 12 08 EU Whistleblower Protection Directive & GDPR
- 2021 11 17 A magic tool or totally overrated
- 2021 11 03 DarkPath scammers – newest fraudulent scheme targeting 100+ companies worldwide
- 2021 10 13 2021 An Authentic Zero Trust Guide
- 2021 10 13 Zero Trust as it is meant to be John Kindervag
- 2021 09 15 The GDPR and the concepts of controller and processor
- 2021 09 08 Hacking the pandemic’s most popular software - Zoom
- 2021 06 16 An Antwerp Management School (AMS) Research Journey into Digital Platform Security Assurance
- 2021 06 09 Algorithm oversight - how the (IT) Auditor can help to prevent new incidents from happening
- 2021 06 02 Managing Business Value of IT
- 2021 05 26 Standards versus hackers and lawmakers (pt 2)
- 2021 05 19 Standards versus hackers and lawmakers. Part 1
- 2021 05 12 Managing IT Healthcare during a pandemic
- 2021 04 28 Intelligence driven Cyber Defense
- 2021 04 21 How do you secure the data you do not know you have
- 2021 04 14 Why Privileged Access is CISO’s 1 priority and where to start your journey
- 2021 04 07 Blockchain ERP integration and ISO standard
- 2021 03 31 Why killing your current infosec program is a good idea – a practical guide in 5 easy steps
- 2021 03 24 Cyber Security Starts with Risk Awareness
- 2021 03 17 Cloud and IT - how to gain to control by letting go
- 2021 02 24 Convincing C-Suite on Cybersecurity Spend
- 2021 02 17 Oh! My supplier did not deliver…….. How to build resiliency in supply chain
- 2021 02 10 Success stories for SME risk management and ISMS implementation
- 2021 02 03 Zero Trust From Strategy to Operations Webinar EY & ON2IT
-
2020
- 2020 12 23 Presentatie Eleonor Duhs
- 2020 12 16 Presentatie Elinesofie Dolhain and Koen Klein Tank
- 2020 12 09 Presentatie Saska de Cloe
- 2020 12 02 Presentatie Erik van Mierlo
- 2020 11 20 Presentatie Markus Gieschmann
- 2020 11 18 Presentatie Maria Brempou
- 2020 11 04 Presentatie Etay Maor
- 2020 10 28 Presentatie Rob Wassink and Vincent Waart
- 2020 10 21 Presentation Mirna Bognar
- 2020 10 14 Presentatie Ronald Koorn en Stefan Zwinkels
- 2020 09 30 A new awareness approach - Richard Verbrugge
- 2020 06 24 ISACA NOREA Presentation Sandeep Gangaram Panday
- 2020 06 03 Beyond Russian hackers_publ
- 2020 05 27 ISACA Square Table Presentation
- 2020 05 20 ISACA Square Table Presentation
-
2023
-
Round Tables
- 2023
- 2020
-
2019
- 2019 12 02 Breukelen Cloud_Governance voor ISACA - Bart M. Veldhuis - final
- 2019 11 18 RT Eindhoven - Third Party Risk Management
- 2019 10 07 RT Breukelen Filerskeepers - data retention presentation
- 2019 10 07 RT Breukelen Bakermans Data Retention V2 clean
- 2019 09 25 Presentatie CERRIX Maurits Toets ISACA RT Zwolle 2019-09-25
- 2019 09 16 Martin Haagoort ISACA rondetafel Eindhoven
- 2019 06 03 ISACA presentation NN_Group v1.2
- 2019 05 27 Yuri Bobbert Talitha Papelard Agteres Critical Success Factors Antwerp Management School
- 2019 05 27 Simon Heijnen Data gedreven controle aanpak
- 2019 05 27 Mona de Boer Black-box algoritmes blind vertrouwen PWC
- 2019 05 27 Leslie-Forbes How to create IT-OT convergence Tenable
- 2019 05 27 Frank Breedijk Invloed van de Cloud Schuberg Philis
- 2019 05 27 Ebbe Negenman CRO function within the board Aegon KNAB
- 2019 05 03 Kim van der Leer-Rutger van Os InAequo nw
- 2019 04 29 Bruno Hortas Soares Presentatie voor publicatie
- 2019 04 25 Magnus Solberg Circle of Digital Trust Storebrand
- 2019 04 25 Asaf Weisberg The Art of Cyber Risk IntroSight
- 2019 04 23 Presentatie RJG 04032019 C.Koppe
- 2019 04 18 Barry Derksen-Monique Neggers SSA-Presentatie
- 2019 04 15 Wilbert Pijnenburg BeOne Development Van Security awareness naar aantoonbare gedragsverandering
- 2019 04 15 Sponsored Joris vd Veerdonk - Marcel de Jong-Johannes Muhr Combining process mining and RPA for business transformations
- 2019 04 15 Harm Slomp Leger des Heils Management Effectiviteits Control Matrix denkmodel voor besturen en beheersen van christelijke hulpverleningsorg
- 2019 04 15 Hans Mulder Antwerp Management School Risico van Technologisch succes
- 2019 04 15 Hans Mulder Antwerp Management School CHAOS Report JohnsonMulder hoort bij presentatie
- 2019 04 15 Dirk_Steuperaert IT in Balance BVBA Uni Gent Uni Antwerpen Cobit 2019
- 2019 04 15 Albert Kubbenga-Aad_Sandifort Openbaar Ministerie Project OM-AP Den Haag in control met Process Mining
- 2019 03 18 Preventie van data verlies d.d. 18-03-2019
- 2019 03 04 Privacy in Ketens MJ Bonthuis RT BR 04-03-2019
- 2019 03 04 Autoriteit Persoonsgegevens ISACA RT C. Schut R. Steenkamp
- 2019 03 01 Privacy in Ketens Isaca febr. 2019
- 2019 02 04 SSA ISACA RT 04-02-19
- 2019 01 28 CWC Brainport - ISACA 28 januari 2019
-
2018
- 2018 12 03 Groeiproces_Rijkswaterstaat_en_Cobit5
- 2018 11 12 presentatie_RT_Eindhoven_12-11-2018
- 2018 11 05 gdpr_5-11-2018_isaca_privacy_frameworks
- 2018 10 17 ISACA_NL_Preso_Workspace_2020
- 2018 10 01 Presentation_Chatops_01-10-2018
- 2018 06 11 Presentatie_ISACA_RT_20180611_-_final
- 2018 06 03 isaca_pdf_RT_Breukelen_03-09-2018
- 2018 05 16 2018-06_IIA_NOREA_Presentatie_Process_Mining_v1.95_alleen_theorie
- 2018 05 07 RT_Breukelen_Blockchain
- 2018 04 09 1804-ISACA-NL-Cloud_Security
- 2018 02 22 PbD-ISACA-Assen
- 2018 02 05 ISACA_NL_AVG_GDPR_Paul_Oor_Conclusion
- 2018 01 29 AVG_Workshop
-
2017
- 2017 11 29 CyberSecurity_Nexus_CSX_Auditorsdag_21_september_2017
- 2017 11 20 PRIVACY_EN_INFORMATIEVEILIGHEID
- 2017 11 06 10_myths
- 2017 10 31 How-do-you-effective-manage-Risk---ISACA-v2
- 2017 10 02 Auditing_Public_Key_Infrastructure-20171002-01_1
- 2017 09 20 Presentatie_ISACA_Round_Table_-_Assen_-_Baselines_-_Renco
- 2017 09 20 Presentatie_ISACA_Round_Table_-_Assen_-_Baselines_-_Hilko
- 2017 09 19 isaca_rt_zuid_11-09-2017_blockchain_vince_meens
- 2017 09 19 ISACA_Presentatie_Process_Mining_v1.93_alleen_theorie
- 2017 06 17 NOREA ISACA Eindhoven 19 juni 2017
- 2017 06 12 ISACA 12 juni 2017 HTZ
- 2017 05 10 Cultuur en Gedrag in onderzoeken ISACA Roundtable 10 mei 2017 versie 3.0 def
- 2017 05 01 IT Governance _ The South African Journey - ISACA Netherlands Chapter
- 2017 03 22 Presentatie Isaca Cloud
- 2017 03 06 Help de IT baas van zijn IT audit kopzorgen af v1.0
- 2017 02 08 ISACA Security IoT Pieter Meulenhoff
- 2017 02 06 20170125 Isaca handout
- 2017 01 23 Security through design - Jelle Niemantsverdriet - ISACA
-
2016
- 2016 12 12 - Isaca - Privacy en IT-audit - PrivacyLab Martine van de Merwe...
- 2016 11 16 ISACA Round Table 20161116 - for sharing
- 2016 10 26 RT Assen ISACA Workshop EPV Insite Security prt
- 2016 10 26 RT Assen ISACA privacysessie compleet
- 2016 10 02 Isaca - Privacy by Design
- 2016 09 21 ISACA Eindhoven 21-09-2016 Ilko Bosman 3D Printing
- 2016 09 05 RT Breukelen 05-09-16 Grab@Pizza
- 2016 06 06 ISACA Wet Meldplicht Datalekken 20160120
- 2016 05 02 ISACA Meldplicht datalekken en DIN 66399 5-2016
- 2016 04 25 Trendsrapport_2016_v3-2
- 2016 03 16 IB in MKB
- 2016 03 07 Presentatie ISACA Round Table 7 maart 2016
- 2016 02 01 responsibledisclosure-isaca-160202145451
- 2016 01 20 ISACA Wet Meldplicht Datalekken 20160120
-
2015
- 2015 11 25 ISACA_Cloud lessons learned and audit June 2015 handout
- 2015 11 02 Eduard Emde ISACA 2 nov 2015
- 2015 10 05 Presentatie SIVA en toepassingen ISACA Roudtable (5okt) def (ToJos Maas)
- 2015 09 16 ISACA RT Zuid 16 09 2015 Maarten Fischer LSP
- 2015 09 07 ISACA RT 20150907
- 2015 06 03 ISACA - IAM
- 2015 06 01Qiy General slides UK MAY 15 (only for internal limited distribution)
- 2015 03 02 ISACA How to Hack your Customer and his Service Provider NO NOTES
- 2015 01 21 ISACA Zuid full pages
-
2014
- 2014 12 01 Trends 2040 eng
- 2014 11 18 Round table 18-11-2014 eindhoven
- 2014 11 03 Praktijkgids-5 SOC 2
- 2014 11 03 ISACA NL Round table 3 November 2014
- 2014 10 06 ISACA - Elger Jonker - Ethical Hacking - Round Table
- 2014 09 16 ISACA 2014 ABK 0.22
- 2014 09 01 20140827 ISACA Security architectuur v1 0 presentatie ISACA website versie
- 2014 06 02 ISACA-NL-20140602
- 2014 05 05 Kennissessie iso27001 v1.1 - Pub
- 2014 03 12 Big-Data-wo-12-maart
- 2014 02 03 MBN_20140203_ISACA Presentatie_v1.0
-
2013
- 2013 12 02 ISACA_presentatie_2_december_2013
- 2013 11 04 ISACA Round Table 4 11 13 Legaltree privacy
- 2013 10 07 RTmaandag7oktober2013
- 2013 09 02 Round table ISACA handout
- 2013 06 06 Security in the Cloud - Myth versus Reality - KPMG
- 2013 04 08 presentatie-round8april
- 2013 03 04 ISACARoundtableSecurityinM2M_Frost&SullivanMar13
- 2013 02 04roundtable_4feb2013
- 2012
- 2011
- 2010
- 2009
- 2008
-
Risk Event
-
2022
- Presentatie Vincent Thiele
- Presentatie Vincent Damen
- Presentatie Sunette Runhaar
- Presentatie Stefan Simenon
- Presentatie Sam Huibers
- Presentatie Rion Rijker
- Presentatie Peter Kornelisse
- Presentatie Marcel van Kaam
- Presentatie Karen Blanksma en Eline Bijnens
- Presentatie Josina Rodrigues
- Presentatie Jan Marko Silvius
- Presentatie Irfaan Santoe
- Presentatie Etay Maor
- Presentatie Ellen Mok
- Presentatie Dina Boonstra
- Presentatie Celine Christensen
-
2019
- Yuri-Bobbert-Talitha-Papelard-Agteres_Critical_Success_Factors_Antwerp_Management_School
- Wilbert_Pijnenburg_BeOne_Development_Van_Security_awareness_naar_aantoonbare_gedragsverandering
- Sponsored_Joris_vd_Veerdonk-Marcel_de_Jong-Johannes_Muhr_Combining_process_mining_and_RPA_for_business_transformations
- Simon_Heijnen_Data_gedreven_controle_aanpak
- Mona_de_Boer_Black-box_algoritmes_blind_vertrouwen_PWC
- Magnus_Solberg_Circle_of_Digital_Trust_Storebrand
- Leslie-Forbes_How_to_create_IT-OT_convergence_Tenable
- Kim_van_der_Leer-Rutger_van_Os_InAequo_nw
- Harm_Slomp_Leger_des_Heils_Management_Effectiviteits_Control_Matrix_denkmodel_voor_besturen_en_beheersen_van_christelijke_hulpverleningsorg
- Hans_Mulder_Antwerp_Management_School_Risico_van_Technologisch_succes
- Hans_Mulder_Antwerp_Management_School_CHAOS_Report_JohnsonMulder_hoort_bij_presentatie
- Frank_Breedijk_Invloed_van_de_Cloud_Schuberg_Philis
- Ebbe_Negenman_CRO_function_within_the_board_Aegon_KNAB
- Dirk_Steuperaert_IT_in_Balance_BVBA_Uni_Gent_Uni_Antwerpen_Cobit_2019
- Bruno_Hortas_Soares_Presentatie_voor_publicatie
- Barry_Derksen-Monique_Neggers_SSA-Presentatie
- Asaf_Weisberg_The_Art_of_Cyber_Risk_IntroSight
- Albert_Kubbenga-Aad_Sandifort_Openbaar_Ministerie_Project_OM-AP_Den_Haag_in_control_met_Process_Mining
-
2018
- presentatie_Albert_Kisjes__Dwayne_Valkenburg_19-4-2018
- Presentatie_Wim_Van_Grembergen_19-4-2018
- Presentatie_Wim_Goes_19-04-2018
- Presentatie_Suzanne_Janse_19-4-2018
- Presentatie_Raef_Meeuwisse_19-4-2018
- Presentatie_Peter_Noordam_19-4-2018
- Presentatie_Marcel_Koers_en_Tjakko_de_Boer_19-4-2018
- Presentatie_Joep_Weerts_en_Ravish_Mehairjan_19-04-2018
- Presentatie_Janneke_Schepers_en_Robbert_Kramer
- Presentatie_Jaap-Henk_Hoepman_19-4-2018
- Presentatie_Dina_Boonstra_19-4-2018
- Presentatie_Danny_Onwezen_deel_II._19-4-2018
- Presentatie_Danny_Onwezen_deel_I._19-4-2018
- Presentatie_Bennie_Mols_19-4-2018
- Presentatie_Arjen_van_Berkum_19-4-2018
- Presentatie_Alex_Lokhorst_19-4-2018
- Presentatie_Aart_van_der_Vlist_19-04-2018
-
2022
-
C**** in a day
-
2017
- PowerPoint-presentatie
- C_inaday_ISACA_NL_Mark_Koek_ISACA
- C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit
- C_inaday-ISACA-NL-Krijn-Kalma-GCEIT
- C-inaday-NL-ISACA-Wim-van-Grembergen-Strategic-Alignment-Model
- C-inADay-NL-ISACA-Aart-van-der-Vlist-keynote
- C-InADay-NL-ISACA-Zari-Haji-Raoul-CISM
- C-InADay-NL-ISACA-Rosemary-Amato-Overview-Certifications
- C-InADay-NL-ISACA-Inspiratiesessie-CRISC-Norbert-Kuiper
- C-InADay-NL-ISACA-Barry-Derksen-Trends-in-IT.compressed
-
2017

- ISACA NL Journal ·
The start of the Digital Security Transformation
Author: Barry Derksen - With the recent developments in IT such as generative AI new risks arrive in our landscape. At the same time IT risk and security often feel themselves as chasing the business owners on the importance to mitigate the risks, protect the organization and sometimes even as a police officer stating an employee went through the red light.