logo

Echtgeld Casinos Information System Securty Association – ISSA

How to optimally integrate Privacy Controls into your Risk Controls Matrix?

Monday, 02 May

Topic: The European parliament, commission and counsel have reached an agreement on the General Data Protection Regulation (GDPR) text. This will replace the Data Protection Directive from 1995 and aims at protecting the EU citizen’s personal data in the current digital world whilst harmonizing the legislation for the processing of personal data across the whole EU.

The challenges in the area of risk management and internal control are thus becoming more important. From banks to state institutions and private companies, everyone is in need of risk management online. Data protection any real money Echtgeld Casino needs to make sure its users are protected. On the one hand there is the increasing regulation, on the other hand, risks are also becoming much more complex. In this session, the following topics will be addressed: – Accountability of data owners to demonstrate compliance – Rationalization and integration of GDPR controls into existing RCM’s – The importance of a corporate culture Moderator Benny is a Member of KPMG Technology in Belgium and is heading the KPMG Information Protection Team.

ISSA New Board!

Sunday, 31 January

We are delighted to invite you to the Annual General Meeting event, which takes place on 1 March and will host a presentation on IoT trends and issues. The venue is kindly provided by PwC.

The Schedule:

18h00-18h30: Welcome at PwC for ISSA-BE members

18h30-19h00: ISSA-BE Annual General Meeting (ISSA-BE members only)

19h00-19h30: Break / welcome to non-members

19h30-21h00: IoT trends and issues by Vito Rallo

21h00-21h30: Networking drink & closure

With special thanks to PwC for hosting this event and providing the catering. Registration is mandatory, both for the AGM and for the following event. Please make sure to register by Friday 26 February COB. Parking will be available.

Abstract: In this presentation, Vito will introduce a simplified view of threats, discuss the attack vectors from practical hacking practice perspective. The speaker will address a number of typical vulnerabilities related to the OWASP IoT Top 10 trying to map them against a real-life use cases. Annual General Meeting: ISSA-BE members are also warmly invited to attend the AGM taking place just before the above presentation. If you’re an ISSA-BE member ‘in good standing’ and would like to participate in the board’s activities, please send a mail. The agenda for the AGM is as follows: – Welcome – Financials – Membership – Elections, including presentation of the functions and the candidates Cyber Security.

Are firms prepared to meet today’s cyber threats?

Saturday, 26 September

We are pleased to announce that our next event will take place on Wednesday 21th October: Cyber Security: Are firms prepared to meet today’s cyber threats?

Topic: Cyber security is a persistent business risk with an impact that can now extend from the executive board to the organization’s bottom line. The risk is constant and serious, but are Belgian firms prepared to defend against, and detect modern cyber threats? Concern over cyber threats has reached a high as more and more firms are discovering breaches and vulnerabilities within their internal networks. Businesses have been discovering previously unknown threats within their network and consequently suffering from reputational damage and direct business losses. In order to better understand the threats companies are currently facing, we organized a study to analyze network traffic inside 10 different enterprises operating in varying sectors.

The goal of the study was to determine whether unknown threats were hiding within organizations’ infrastructure and if current information security practices and technology were effectively preventing and detecting these threats. In this session, we will discuss: • The current cyber threat landscape globally with real world examples. Places are limited so registration is mandatory. Please help us plan by registering by Tuesday 20 October COB.

A Distributed Approach to Mobile Malware Scanning

Wednesday, 15 April

We are pleased to announce that our next event will take place on Thursday 23rd April: A Distributed Approach to Mobile Malware Scanning

The Schedule:

18h00-18h30: A distributed approach to mobile malware scanning.

19h15-19h30: Networking break

19h30-20h30: A distributed approach to mobile malware scanning

20h30-21h30: Networking drink & closure With special thanks to NVISO for hosting this event.

Places are limited so registration is mandatory. Please help us plan by registering by Weds 22 April COB. Register here: Bio: Erik uses the combination of his technical expertise and business know-how to help organizations improve their security posture. His day-to-day activities include the coordination and execution of security assessments and incident response activities. A recognized expert, Erik also teaches 2 penetration testing courses for the SANS Institute.