Governance risk and compliance

The Power of Threat Modeling Capabilities and OWASP SAMM Mapping for Product Security

Discover the power of threat modeling in enhancing software security. Leverage the new threat modeling capabilities framework for OWASP SAMM to identify risks and mitigate…

Threat modeling in 4 steps

Threat modeling is performed through a series of workshops. Architects, developers and system administrators are guided through the threat modeling process. It is the primary…

4/06/2024 – Toreon Webinar: How to prepare for the NIS2 Directive

Join our webinar on the NIS2 directive for a deep dive into the context, implications, and the right proactive measures​

NIS2: what does it mean and how do you become compliant?

In the fifth episode of The Wide Open, we welcome two experts, Jasper Hooft and Thomas Dejagere, who delve deeper into the NIS2 Directive within…

The NIS2 Directive and Cyber Resilience Act (CRA) Explained

The NIS2 Directive and Cyber Resilience Act (CRA) Explained. Toreonites Maxim Baele and Leander Karuranga dive into the intricacies of the EU’s latest cybersecurity initiatives.…

Navigating the First 3 Months: 5 Steps to a Successful Career as a New CISO

This blog will help you with navigating the first 3 months as a new CISO through 5 steps

Dewaele

Ensuring the protection of sensitive client data and the IT infrastructure of Dewaele through VLAIO.

Taking a glimpse at the ISO 21434 standard

Toreonite Siebe De Roovere takes a look at the new ISO 21434 standard created for the automotive industry.

The Cybersecurity Booster Shot

Tensions between Ukraine and Russia are at an all time high. Now is the time to protect your organization.

4 phases of an ISO27001 Information Security Management System implementation.

The benefits of obtaining an ISO27001 certificate are starting to appeal more and more for companies. Find out how Toreon can help you obtain it.

Start typing and press Enter to search

Shopping Cart