-
Square Tables
-
2023
- 2023 03 08 Presentation Jorge de Almeida Pinto - Resurrecting After A Ransomware Attack
- 2023 03 01 Presentatie Laurens Jagt - IT Risk Careers in 2023 The Threats & Opportunities
- 2023 02 15 Presentation Atul Kumar - Revisiting Technology Risk Quantification
- 2023 02 08 Presentation - Egbert Bouman - Risk management in an agile setting
- 2023 01 23 Presentatie Rainer M. Richter
- 2023 01 11 Presentation Vincent van Dijk - Cybersecurity Canvas
-
2022
- 2022 06 01 Can you handle going down
- 2022 05 25 A Different and Easier way to Implement 2700X and Achieve Compliance
- 2022 05 11 A framework for managing risk & responding to cyberthreats pdfx
- 2022 04 13 Train digitalisation and cyber security
- 2022 03 16 Shift Left, the right way! How to reach Nirvana in securing DevOps
- 2022 03 09 The quantum threat to our digital society
- 2022 03 02 COBIT’s Value for Small and Medium Enterprises
- 2022 02 16 Down the rabbit hole - a tour into the dark web
- 2022 02 09 A journey into Business Impact Analysis and Cloud adoption - Tijl Dullers
- 2022 02 09 A journey into Business Impact Analysis and Cloud adoption - Geert Boelens
- 2022 02 02 HET LEVEN IS VERRUKKELIJK
- 2022 01 19 STAYING AHEAD OF THREAT ACTORS
-
2021
- 2021 12 15 The rise and fall of The Fraud Family – one of the most prolific cybercrime syndicates in the Netherlands
- 2021 12 08 EU Whistleblower Protection Directive & GDPR
- 2021 11 17 A magic tool or totally overrated
- 2021 11 03 DarkPath scammers – newest fraudulent scheme targeting 100+ companies worldwide
- 2021 10 13 2021 An Authentic Zero Trust Guide
- 2021 10 13 Zero Trust as it is meant to be John Kindervag
- 2021 09 15 The GDPR and the concepts of controller and processor
- 2021 09 08 Hacking the pandemic’s most popular software - Zoom
- 2021 06 16 An Antwerp Management School (AMS) Research Journey into Digital Platform Security Assurance
- 2021 06 09 Algorithm oversight - how the (IT) Auditor can help to prevent new incidents from happening
- 2021 06 02 Managing Business Value of IT
- 2021 05 26 Standards versus hackers and lawmakers (pt 2)
- 2021 05 19 Standards versus hackers and lawmakers. Part 1
- 2021 05 12 Managing IT Healthcare during a pandemic
- 2021 04 28 Intelligence driven Cyber Defense
- 2021 04 21 How do you secure the data you do not know you have
- 2021 04 14 Why Privileged Access is CISO’s 1 priority and where to start your journey
- 2021 04 07 Blockchain ERP integration and ISO standard
- 2021 03 31 Why killing your current infosec program is a good idea – a practical guide in 5 easy steps
- 2021 03 24 Cyber Security Starts with Risk Awareness
- 2021 03 17 Cloud and IT - how to gain to control by letting go
- 2021 02 24 Convincing C-Suite on Cybersecurity Spend
- 2021 02 17 Oh! My supplier did not deliver…….. How to build resiliency in supply chain
- 2021 02 10 Success stories for SME risk management and ISMS implementation
- 2021 02 03 Zero Trust From Strategy to Operations Webinar EY & ON2IT
-
2020
- 2020 12 23 Presentatie Eleonor Duhs
- 2020 12 16 Presentatie Elinesofie Dolhain and Koen Klein Tank
- 2020 12 09 Presentatie Saska de Cloe
- 2020 12 02 Presentatie Erik van Mierlo
- 2020 11 20 Presentatie Markus Gieschmann
- 2020 11 18 Presentatie Maria Brempou
- 2020 11 04 Presentatie Etay Maor
- 2020 10 28 Presentatie Rob Wassink and Vincent Waart
- 2020 10 21 Presentation Mirna Bognar
- 2020 10 14 Presentatie Ronald Koorn en Stefan Zwinkels
- 2020 09 30 A new awareness approach - Richard Verbrugge
- 2020 06 24 ISACA NOREA Presentation Sandeep Gangaram Panday
- 2020 06 03 Beyond Russian hackers_publ
- 2020 05 27 ISACA Square Table Presentation
- 2020 05 20 ISACA Square Table Presentation
-
2023
-
Round Tables
- 2020
-
2019
- 2019 12 02 Breukelen Cloud_Governance voor ISACA - Bart M. Veldhuis - final
- 2019 11 18 RT Eindhoven - Third Party Risk Management
- 2019 10 07 RT Breukelen Filerskeepers - data retention presentation
- 2019 10 07 RT Breukelen Bakermans Data Retention V2 clean
- 2019 09 25 Presentatie CERRIX Maurits Toets ISACA RT Zwolle 2019-09-25
- 2019 09 16 Martin Haagoort ISACA rondetafel Eindhoven
- 2019 06 03 ISACA presentation NN_Group v1.2
- 2019 05 27 Yuri Bobbert Talitha Papelard Agteres Critical Success Factors Antwerp Management School
- 2019 05 27 Simon Heijnen Data gedreven controle aanpak
- 2019 05 27 Mona de Boer Black-box algoritmes blind vertrouwen PWC
- 2019 05 27 Leslie-Forbes How to create IT-OT convergence Tenable
- 2019 05 27 Frank Breedijk Invloed van de Cloud Schuberg Philis
- 2019 05 27 Ebbe Negenman CRO function within the board Aegon KNAB
- 2019 05 03 Kim van der Leer-Rutger van Os InAequo nw
- 2019 04 29 Bruno Hortas Soares Presentatie voor publicatie
- 2019 04 25 Magnus Solberg Circle of Digital Trust Storebrand
- 2019 04 25 Asaf Weisberg The Art of Cyber Risk IntroSight
- 2019 04 23 Presentatie RJG 04032019 C.Koppe
- 2019 04 18 Barry Derksen-Monique Neggers SSA-Presentatie
- 2019 04 15 Wilbert Pijnenburg BeOne Development Van Security awareness naar aantoonbare gedragsverandering
- 2019 04 15 Sponsored Joris vd Veerdonk - Marcel de Jong-Johannes Muhr Combining process mining and RPA for business transformations
- 2019 04 15 Harm Slomp Leger des Heils Management Effectiviteits Control Matrix denkmodel voor besturen en beheersen van christelijke hulpverleningsorg
- 2019 04 15 Hans Mulder Antwerp Management School Risico van Technologisch succes
- 2019 04 15 Hans Mulder Antwerp Management School CHAOS Report JohnsonMulder hoort bij presentatie
- 2019 04 15 Dirk_Steuperaert IT in Balance BVBA Uni Gent Uni Antwerpen Cobit 2019
- 2019 04 15 Albert Kubbenga-Aad_Sandifort Openbaar Ministerie Project OM-AP Den Haag in control met Process Mining
- 2019 03 18 Preventie van data verlies d.d. 18-03-2019
- 2019 03 04 Privacy in Ketens MJ Bonthuis RT BR 04-03-2019
- 2019 03 04 Autoriteit Persoonsgegevens ISACA RT C. Schut R. Steenkamp
- 2019 03 01 Privacy in Ketens Isaca febr. 2019
- 2019 02 04 SSA ISACA RT 04-02-19
- 2019 01 28 CWC Brainport - ISACA 28 januari 2019
-
2018
- 2018 12 03 Groeiproces_Rijkswaterstaat_en_Cobit5
- 2018 11 12 presentatie_RT_Eindhoven_12-11-2018
- 2018 11 05 gdpr_5-11-2018_isaca_privacy_frameworks
- 2018 10 17 ISACA_NL_Preso_Workspace_2020
- 2018 10 01 Presentation_Chatops_01-10-2018
- 2018 06 11 Presentatie_ISACA_RT_20180611_-_final
- 2018 06 03 isaca_pdf_RT_Breukelen_03-09-2018
- 2018 05 16 2018-06_IIA_NOREA_Presentatie_Process_Mining_v1.95_alleen_theorie
- 2018 05 07 RT_Breukelen_Blockchain
- 2018 04 09 1804-ISACA-NL-Cloud_Security
- 2018 02 22 PbD-ISACA-Assen
- 2018 02 05 ISACA_NL_AVG_GDPR_Paul_Oor_Conclusion
- 2018 01 29 AVG_Workshop
-
2017
- 2017 11 29 CyberSecurity_Nexus_CSX_Auditorsdag_21_september_2017
- 2017 11 20 PRIVACY_EN_INFORMATIEVEILIGHEID
- 2017 11 06 10_myths
- 2017 10 31 How-do-you-effective-manage-Risk---ISACA-v2
- 2017 10 02 Auditing_Public_Key_Infrastructure-20171002-01_1
- 2017 09 20 Presentatie_ISACA_Round_Table_-_Assen_-_Baselines_-_Renco
- 2017 09 20 Presentatie_ISACA_Round_Table_-_Assen_-_Baselines_-_Hilko
- 2017 09 19 isaca_rt_zuid_11-09-2017_blockchain_vince_meens
- 2017 09 19 ISACA_Presentatie_Process_Mining_v1.93_alleen_theorie
- 2017 06 17 NOREA ISACA Eindhoven 19 juni 2017
- 2017 06 12 ISACA 12 juni 2017 HTZ
- 2017 05 10 Cultuur en Gedrag in onderzoeken ISACA Roundtable 10 mei 2017 versie 3.0 def
- 2017 05 01 IT Governance _ The South African Journey - ISACA Netherlands Chapter
- 2017 03 22 Presentatie Isaca Cloud
- 2017 03 06 Help de IT baas van zijn IT audit kopzorgen af v1.0
- 2017 02 08 ISACA Security IoT Pieter Meulenhoff
- 2017 02 06 20170125 Isaca handout
- 2017 01 23 Security through design - Jelle Niemantsverdriet - ISACA
-
2016
- 2016 12 12 - Isaca - Privacy en IT-audit - PrivacyLab Martine van de Merwe...
- 2016 11 16 ISACA Round Table 20161116 - for sharing
- 2016 10 26 RT Assen ISACA Workshop EPV Insite Security prt
- 2016 10 26 RT Assen ISACA privacysessie compleet
- 2016 10 02 Isaca - Privacy by Design
- 2016 09 21 ISACA Eindhoven 21-09-2016 Ilko Bosman 3D Printing
- 2016 09 05 RT Breukelen 05-09-16 Grab@Pizza
- 2016 06 06 ISACA Wet Meldplicht Datalekken 20160120
- 2016 05 02 ISACA Meldplicht datalekken en DIN 66399 5-2016
- 2016 04 25 Trendsrapport_2016_v3-2
- 2016 03 16 IB in MKB
- 2016 03 07 Presentatie ISACA Round Table 7 maart 2016
- 2016 02 01 responsibledisclosure-isaca-160202145451
- 2016 01 20 ISACA Wet Meldplicht Datalekken 20160120
-
2015
- 2015 11 25 ISACA_Cloud lessons learned and audit June 2015 handout
- 2015 11 02 Eduard Emde ISACA 2 nov 2015
- 2015 10 05 Presentatie SIVA en toepassingen ISACA Roudtable (5okt) def (ToJos Maas)
- 2015 09 16 ISACA RT Zuid 16 09 2015 Maarten Fischer LSP
- 2015 09 07 ISACA RT 20150907
- 2015 06 03 ISACA - IAM
- 2015 06 01Qiy General slides UK MAY 15 (only for internal limited distribution)
- 2015 03 02 ISACA How to Hack your Customer and his Service Provider NO NOTES
- 2015 01 21 ISACA Zuid full pages
-
2014
- 2014 12 01 Trends 2040 eng
- 2014 11 18 Round table 18-11-2014 eindhoven
- 2014 11 03 Praktijkgids-5 SOC 2
- 2014 11 03 ISACA NL Round table 3 November 2014
- 2014 10 06 ISACA - Elger Jonker - Ethical Hacking - Round Table
- 2014 09 16 ISACA 2014 ABK 0.22
- 2014 09 01 20140827 ISACA Security architectuur v1 0 presentatie ISACA website versie
- 2014 06 02 ISACA-NL-20140602
- 2014 05 05 Kennissessie iso27001 v1.1 - Pub
- 2014 03 12 Big-Data-wo-12-maart
- 2014 02 03 MBN_20140203_ISACA Presentatie_v1.0
-
2013
- 2013 12 02 ISACA_presentatie_2_december_2013
- 2013 11 04 ISACA Round Table 4 11 13 Legaltree privacy
- 2013 10 07 RTmaandag7oktober2013
- 2013 09 02 Round table ISACA handout
- 2013 06 06 Security in the Cloud - Myth versus Reality - KPMG
- 2013 04 08 presentatie-round8april
- 2013 03 04 ISACARoundtableSecurityinM2M_Frost&SullivanMar13
- 2013 02 04roundtable_4feb2013
- 2012
- 2011
- 2010
- 2009
- 2008
-
Risk Event
-
2022
- Presentatie Vincent Thiele
- Presentatie Vincent Damen
- Presentatie Sunette Runhaar
- Presentatie Stefan Simenon
- Presentatie Sam Huibers
- Presentatie Rion Rijker
- Presentatie Peter Kornelisse
- Presentatie Marcel van Kaam
- Presentatie Karen Blanksma en Eline Bijnens
- Presentatie Josina Rodrigues
- Presentatie Jan Marko Silvius
- Presentatie Irfaan Santoe
- Presentatie Etay Maor
- Presentatie Ellen Mok
- Presentatie Dina Boonstra
- Presentatie Celine Christensen
-
2019
- Yuri-Bobbert-Talitha-Papelard-Agteres_Critical_Success_Factors_Antwerp_Management_School
- Wilbert_Pijnenburg_BeOne_Development_Van_Security_awareness_naar_aantoonbare_gedragsverandering
- Sponsored_Joris_vd_Veerdonk-Marcel_de_Jong-Johannes_Muhr_Combining_process_mining_and_RPA_for_business_transformations
- Simon_Heijnen_Data_gedreven_controle_aanpak
- Mona_de_Boer_Black-box_algoritmes_blind_vertrouwen_PWC
- Magnus_Solberg_Circle_of_Digital_Trust_Storebrand
- Leslie-Forbes_How_to_create_IT-OT_convergence_Tenable
- Kim_van_der_Leer-Rutger_van_Os_InAequo_nw
- Harm_Slomp_Leger_des_Heils_Management_Effectiviteits_Control_Matrix_denkmodel_voor_besturen_en_beheersen_van_christelijke_hulpverleningsorg
- Hans_Mulder_Antwerp_Management_School_Risico_van_Technologisch_succes
- Hans_Mulder_Antwerp_Management_School_CHAOS_Report_JohnsonMulder_hoort_bij_presentatie
- Frank_Breedijk_Invloed_van_de_Cloud_Schuberg_Philis
- Ebbe_Negenman_CRO_function_within_the_board_Aegon_KNAB
- Dirk_Steuperaert_IT_in_Balance_BVBA_Uni_Gent_Uni_Antwerpen_Cobit_2019
- Bruno_Hortas_Soares_Presentatie_voor_publicatie
- Barry_Derksen-Monique_Neggers_SSA-Presentatie
- Asaf_Weisberg_The_Art_of_Cyber_Risk_IntroSight
- Albert_Kubbenga-Aad_Sandifort_Openbaar_Ministerie_Project_OM-AP_Den_Haag_in_control_met_Process_Mining
-
2018
- presentatie_Albert_Kisjes__Dwayne_Valkenburg_19-4-2018
- Presentatie_Wim_Van_Grembergen_19-4-2018
- Presentatie_Wim_Goes_19-04-2018
- Presentatie_Suzanne_Janse_19-4-2018
- Presentatie_Raef_Meeuwisse_19-4-2018
- Presentatie_Peter_Noordam_19-4-2018
- Presentatie_Marcel_Koers_en_Tjakko_de_Boer_19-4-2018
- Presentatie_Joep_Weerts_en_Ravish_Mehairjan_19-04-2018
- Presentatie_Janneke_Schepers_en_Robbert_Kramer
- Presentatie_Jaap-Henk_Hoepman_19-4-2018
- Presentatie_Dina_Boonstra_19-4-2018
- Presentatie_Danny_Onwezen_deel_II._19-4-2018
- Presentatie_Danny_Onwezen_deel_I._19-4-2018
- Presentatie_Bennie_Mols_19-4-2018
- Presentatie_Arjen_van_Berkum_19-4-2018
- Presentatie_Alex_Lokhorst_19-4-2018
- Presentatie_Aart_van_der_Vlist_19-04-2018
-
2022
-
C**** in a day
-
2017
- PowerPoint-presentatie
- C_inaday_ISACA_NL_Mark_Koek_ISACA
- C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit
- C_inaday-ISACA-NL-Krijn-Kalma-GCEIT
- C-inaday-NL-ISACA-Wim-van-Grembergen-Strategic-Alignment-Model
- C-inADay-NL-ISACA-Aart-van-der-Vlist-keynote
- C-InADay-NL-ISACA-Zari-Haji-Raoul-CISM
- C-InADay-NL-ISACA-Rosemary-Amato-Overview-Certifications
- C-InADay-NL-ISACA-Inspiratiesessie-CRISC-Norbert-Kuiper
- C-InADay-NL-ISACA-Barry-Derksen-Trends-in-IT.compressed
-
2017

- Opinie ·
Future Roles in Digital Security – 2023 and Beyond
Future Roles in Digital Security – 2023 and Beyond What historical trend data tells us about future roles and tasks in digital security By Yuri Bobbert & Vincent van Dijk…