4 pitfalls to avoid when building a CSOC

Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

7 steps to set up a cybersecurity program

To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…

GDPR standard as forerunner for GDPR ISO standardisation

Many organizations would like to obtain a certificate in order to objectively demonstrate GDPR compliance towards the market.

Why hackers won’t save you (even) in 2020 (and what to do about it).
Why hackers won't save you (even) in 2020 (and what to do about it). The most important challenges for you at a glance. Official figures…
TMI newsletter 9 How often do living documents need to breathe?

In this months newsletter: A guest article by Izar “Infosec Curmudgeon” Tarandach, Curated resources covering an awesome list of threat modeling resources.

Tips for demonstrating compliance to the awareness requirement

As a DPO it’s your task to foresee adequate awareness. The accountability principle requires you to be able to objectively demonstrate compliance. So, here are…

Data Protection Day: Four steps to handle privacy

This day was not picked at random, as the first Data Protection Treaty was signed on 28 January 1981.

Kids take over Toreon

Since September 2018 the monthly CoderDojo sessions for the Antwerp Centre department are held in our office at the Grotehondstraat in Antwerp.

TMI newsletter 8 (19-Dec-2019)

In this months newsletter: A guest article by Chris Romeo covering “Threat modeling: better caught than taught”

Start typing and press Enter to search

Shopping Cart