The ISSA-BE.org site
Data Migration & Information Obfuscation + Beyond Encryption & Data Masking (22/04/14) PDF Print E-mail
Friday, 28 March 2014 00:00

We are pleased to announce our next event, which takes place on April, 22: "Data Migration & Information Obfuscation + Beyond Encryption & Data Masking", the venue is kindly provided by Deloitte Berkenlaan 8A, 1831 Diegem, Belgium
Meeting room “Grand Place”, located in building 8A (red one); Wifi available
Parking will be booked.


18.00 – 18.30 Registration
18.30 – 18.40 Welcome
18.40 – 19.15 Enhanced Data Migration & Information Obfuscation: Trends & Techniques; PowerPoint Demo & Discussion – Bob Gardner
19.15 – 19.30 Networking break
19.30 – 20.30 Advanced Technologies: Beyond Encryption & Data Masking; WebEx Presentation DataVantage Global – DCR US Staff & Bob & Ed
20.30 – 21.30 Networking Drink

With special thanks to Deloitte for hosting this event and providing the catering.

Registration is mandatory. Please make sure to register by Friday 18 April COB. Parking will be available.

Register here:


Trends – International APT attacks; Emerging Legal & Reputation Consequences; Enterprise Transition Vulnerabilities (i.e. New Cloud, M&A Implementations).
Techniques – Protecting the DNA; Mitigating Legal and Reputation Consequences (iCloud, SAFETY Act and FedRAMP).
Technology – Measuring Real Enterprise Exposure.




Edward L. Stull (Ed): As DCR’s Chief Architect for enterprise-level Data Privacy software products since 1997, Ed is among the leaders of the company’s efforts related to data privacy. He served as the principal investigator and co-author of several DataVantage Global® international patents that relate to the management and protection of information as well as for an artificially intelligent system to explore and protect data in an enterprise.


Ed has chaired multiple committees for more than 35 years in national and international standards and has received awards, including:

  • Eighth, three-year term as Chair of the US national committee on Open Systems for INCITS from whom he received the prestigious Gene Milligan Award for Effective Committee Management in 2009;
  • Chair of the US Technical Advisory Group (US TAG) on telecommunications and information exchange between systems (JTC1/SC 6) for the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC);
  • Chair of the international study group on Security Best Practices for the financial services and insurances industries which resulted in the development of an ISO standard;
  • Co-Chair of subcommittee related to an ongoing initiative concerning Protected Healthcare Information (PHI) led by ANSI, the Santa Fe Group (SFG) and the Internet Security Alliance (ISA).

In his four-plus decades of professional experience, Ed has managed and participated in all phases of implementation of small to very large (5000+ users) software systems, specializing in command and control challenges for both industry and military. He has been a team leader on corporate financing, start-ups, mergers and acquisitions and private placement and investment banking activities. Representing investor interests, he has served as a distinguished Director on corporate boards and has been a management and technical consultant to many large accounting and defense firms. He also has held C-level and key positions in corporations and government roles and has been a featured speaker at leading international conferences and other events.


Ed has served both as a civilian and in uniform as an officer in the US Air Force where he led or commanded advanced tactical deployment systems, and later, large analytical information systems for strategic studies.


Ed is married to Carmen with three grownup children and one grandson. They share a seat on the Kennedy Center Circles Board and each is a director in the Washington International Piano Arts Council. They reside in Maryland.


Robert Gardner (Bob): Bob has been serving as Direct Computer Resources’ (DCR) Subject Matter Expert on Risk Management for cyber security for banking and financial organizations as well as for critical infrastructures since 2007 and has attended and represented DCR at many trade shows and similar events including the June 2012 Deloitte 7th European IT Audit in Financial Services Forum where DCR was an invited guest.


Bob spends much of this time mentoring enterprise executives and public officials and the CIOs and Risk Officers that report to them on how to quantify the financial impact, stakeholder (client, public and shareholder) sentiment and confidence and the legal exposure of high-impact cyber risk, so they may allocate resources commensurate with share value risk.  And from which they may isolate and protect their enterprise’s most impactful information assets – their core DNA.


Bob is the founding partner of New World Technology Partners (NWTP), which incubates intellectual property endeavors at the intersection of technology, business and public policy. At NWTP, he participated in the launch of several high-tech startups, including August Systems, Verdix, Meiko Scientific, Cryptek, Phoenix Numeric and Probity Labs.   Through NWTP, he created the intellectual property incubator which introduced Trusted TeamWorks™ and recently led the development of iRISK™ executive cyber risk management methodology for a Fortune 500 service provider.  Prior to forming NWTP, he held senior engineering and marketing positions for Burroughs Corporation’s Supercomputer activities, including ILLIAC IV, PEPE, LDSP and NASF.


Bob’s educational background includes undergraduate Electrical/Systems Engineering; Graduate Business and Graduate Engineering Science from Rensselaer Polytechnic Institute, University of Santa Clara and Penn State, respectively.


He writes and speaks often on the Enterprise Impact of Cyber Risk and has prepared briefings and testimony for the U.S. House of Representatives, Senate committees and Financial and Energy Industry forums.


Regarding his cultural interests, he aided in the formation of several New York arts enterprises, including The Brick Theater and In the Pocket New York, and teaches the “Business for Poets” workshops for artists in Brooklyn, NY.


Bob resides in Annapolis, Maryland with his wife and has 3 “starving artist” children residing in Brooklyn N.Y.


2014 - New Board! PDF Print E-mail
Wednesday, 19 March 2014 00:00

Dear ISSA-BE Member,
Dear Security Professional,

We would like to inform you about our board election results.

At our last annual General Members Meeting, we elected a new board.
Our new board composition is as follows:

President: Thomas Herlea

Treasurer: Clément Herssens
Secretary: Koen Burms
Membership: Bart Moerman

Vice President: Bart Moerman

Communications: Steven Bradley
Education & General Events: Clément Herssens

Sponsorship: Steven Bradley

Website: Jean-Louis Van Mollekot
External & Public Relations: Syed Naqvi



Bart Thijssen
Tom Van den Eynde
Stefan Van Gansbeke
Tomas Vanhoof
Bruno Van Wilder


Annual General Meeting + Facing a major IT incident (18/03/14) PDF Print E-mail
Tuesday, 04 March 2014 00:00

We are delighted to invite you to the Annual General Meeting event, which takes place on 18 March 2014 and will host a presentation on Facing a major IT incident, given by Erik de Jong responsible for FoxCERT. The venue is kindly provided by Trasys (Terhulpsesteenweg 6c, 1560 Hoeilaart).

The Schedule:

18h00-18h15: Welcome at Trasys for ISSA-BE members
18h15-19h15: ISSA-BE Annual General Meeting (ISSA-BE members only)
19h15-19h30: Break / welcome to non-members
19h30-21h00: Facing a major IT incident, given by Erik de Jong
21h00-21h30: Networking drink & closure

With special thanks to Trasys for hosting this event and providing the catering.

Registration is mandatory, both for the AGM and for the following event. Please make sure to register by Tuesday 14 March COB. Parking will be available.

Register here:





Erik de Jong is responsible for FoxCERT, the computer emergence response team of Dutch security firm Fox-IT. FoxCERT helps organizations that have fallen victim to cybercrime, cyber espionage, with the aim getting them back to regular business as usual in a quick and responsible manner. Prior to working for Fox-IT, Erik held a variety of positions at the Dutch National Cyber Security Center and security firm McAfee.



In his talk, Erik will discuss what happens when organizations are faced with major incidents. A major incident is different from regular incidents in that they can easily escalate into crises and that technical aspects are still important but usually overshadowed by communication and legal aspects. So what happens when you let a third party investigate, what happens when you find out that you’re facing a major incident? You’ll find that the feeling of not being in control, having to manage a variety of sometimes conflicting interests can distract you from your focus: managing the incident and returning to business as usual in a responsible manner. It helps to consider these issues beforehand in order to save time and headache later.



Annual General Meeting:

ISSA-BE members are also warmly invited to attend the AGM taking place just before the above presentation.

If you're an ISSA-BE member 'in good standing' and would like to participate in the board's activities, please send a mail to This e-mail address is being protected from spambots. You need JavaScript enabled to view it This e-mail address is being protected from spambots. You need JavaScript enabled to view it for more information or to become a candidate. Also, if you are unable to attend the AGM, you can give a voting mandate to another ISSA-BE member; please send a mail to This e-mail address is being protected from spambots. You need JavaScript enabled to view it This e-mail address is being protected from spambots. You need JavaScript enabled to view it with both your name and the name of your proxy.

The agenda for the AGM is as follows:
- Welcome
- Financials
- Membership
- Elections, including presentation of the functions and the candidates

The state of IPv6 (23/01/14) PDF Print E-mail
Saturday, 11 January 2014 00:00

We are pleased to announce our next event, which takes place on January, 23: "The state of IPv6", at Cisco Belgium, Pegasus Park, De Kleetlaan, 6A, 1831 Diegem.

Topic: The next generation Internet with IPv6: deployment status and security considerations

After a slow start and now pushed by the IPv4-address exhaustion hitting several Internet service providers, IPv6 is being actively deployed on the Internet in parallel with IPv4 address sharing (a highly insecure option).

The session will describe the current IPv6 deployment worldwide and in Belgium (our country is the 8th largest IPv6 deployment worldwide as VOO, Belgacom and soon Telenet deploy IPv6). As a security practionner, we all need to understand the security issues related to this new protocol both over the Internet but also in the Data Centers (Windows, Linux, ... all have IPv6 used by default everywhere).

The session will introduce the main concerns and how to mitigate them: from reconnaissance, to extension headers (and the fragmented attacks) as well as firewalls and IPS.

The Schedule:

18.00 – 18.30  Welcome
18.30 – 19.15  •  IPv6 deployment status           Eric Vyncke
19.15 – 19.30  Networking break  
19.30 – 20.30  •  IPv6 security considerations    Eric Vyncke
20.30 – 21.30  Networking drink

Register here:

Speaker: Eric Vyncke

Eric Vyncke is a Distinguished Engineer based in the Brussels office of Cisco Systems. His main current technical focus is about security and IPv6. He has designed several secured large IPsec networks and other security related designs.

In his work for the IETF, he co-authored RFC 3585 and 5514 and is active in V6OPS, 6MAN and OPSEC working groups. His recent works are related to IPv6 including co-authoring a book on IPv6 Security; he also authored a book on layer-2 security.

Eric is the current co-chair of the Belgian IPv6 Council. www.vyncke.org/ipv6status is well-known for several years to collect statistics about IPv6 deployment.

He is also a visiting professor for security topics at the University of Mons. He is an adjunct professor at HEC, the business school of University of Liège, Belgium.

He holds a CISSP certification, member of ISSA and speaks frequently at international conférences.


ISSA-BE board Elections PDF Print E-mail
Thursday, 16 January 2014 00:00

The annual members meeting covers financials, events and membership as main topics, and concludes with the elections for the ISSA-BE board.

As the Belgian chapter of ISSA international, ISSA-BE represents you as an Information Security professional, and offers plenty of opportunities to grow in your profession through chapter meetings with knowledgeable speakers, networking events, training and other discounts…

If you want to get engaged for your InfoSec community and to contribute to ISSA-BE’s activities, please send in your candidature to be a member of the board!

The main functions are President, Treasurer, Secretary, and the following officers: Communications, Education&Events, Sponsorship, Website, Membership and External & Public Relations. If you want to contribute without (yet) taking on an official board function, you can become an advisor to the board.

Multiple functions can be combined; however, President, Treasurer and Secretary are mutually exclusive functions.

If you want to be a candidate, or want more information, please contact the elections officer ( This e-mail address is being protected from spambots. You need JavaScript enabled to view it ) as soon as possible. Of course, you can also contact us if you still want some extra information first. You are welcome to submit a supporting text (max. 150 words, in English) with your candidature, which will be presented before and during the meeting.

Important note: you need to be an ISSA-BE member “in good standing” both to vote and to serve on the board, so if this is not the case yet, make sure to register at https://www.issa.org/general/register_member_type.asp. If necessary, this can also still be arranged at the meeting itself.

On the other hand, also note that if you cannot be present at the meeting, you can still vote (by mandate) or be a candidate for a board function. In both cases, make sure to inform the elections officer by e-mail ( This e-mail address is being protected from spambots. You need JavaScript enabled to view it ) at least 48 hours in advance.


Page 3 of 3

Upcoming Events

There are no upcoming events.