Some functionalities won't function properly while using Internet Explorer
InsightZ.io Sitemap
Main links
Home
Login
Cookies
Privacy
Profile
Content links
How Belgian Data Protection Authority evaluated COVID-19 contact tracing
Enhance your privacy management, based on the newest ISO27701 standard!
DigitYser, een artificiële intelligentie en data science community om entrepreneurship te boosten - Philippe Van Impe
“AI is becoming a clear reality.” - Patrice Latinne
AI & de verbetering van customer experience - Reiner Bruns
Hoe complexe data verwerken en implementeren? - Tom Lenaerts
“We want to build relationships.” - Bas Janssen & Using algorithms to uncover discrimination and racism - Martin Canter
Relatie tussen AI en RPA - Mathias Fransen
How to value your compliance management? - FR
Het coronavirus en de link met technologie - Marc Van Ranst
Introduction of the Blockchain Summit conference themes
Fully maximizing the value of hybrid IT solutions - Make your infrastructure agile & Cloud-enabled
Master Use Cases for Digital Transformation
Keynote - Drive Digital Transformation using AI
Keynote - On the edge: 4 enabling technologies that will change the face of IOT
The ripple effect of COVID-19 on AI
Goodbye payments?
Digital healthcare transformations: smart face masks case study
Introduction of the Cloud Security conference track
Introduction of the Internet of Things conference themes
Introduction of the Industry 4.0 conference track
Introduction to Cloud Governance on AWS
The Relevance of PKI and Digital Signing in 2020
Giving your Teams a voice
The future of conferences will be digital! - NL
Optimize your Service Management processes with Robotic Process Automation
Introduction of the Cyber Security conference themes
Cyber Conference Days 2020 - DAY 1
Cyber Conference Days 2020 - DAY 2
Cyber Conference Days 2020 - DAY 3
DPO Circle Annual Conference 2020 - DAY 1
DPO Circle Annual Conference 2020 - DAY 2
Cyberdangers and the COVID-19 effect
Strengthening Cyber Security with ML and AI
Cybersecurity for extended attack surface
Cyber Security Trends & Predictions for 2021
Minimising risk from cyber threats: focus on reducing time to containment
Uncovering the Human Factor
Cyber Security User Awareness
A new era of Cryptography
Beat ransomware. 3 Ultimate strategies
Future of AI with data protection
DPO assurance vs insurance - roundtable
GDPR - From data management to responsible use of data
Personal data protection in the Belgian public sector
Data Protection On the Ground - Personal data protection in the banking sector
Cyber Security Risks for Industry 4.0
AI-Enabled Cyber Security
Results of the 'Industrial Cybersecurity Survey - Belgium 2020’
Ransomware: A modern threat to modern data
7 essential vulnerability management questions answered
Security requirements in GDPR - there is no privacy without security
Career development for Information security professionals
The Secrets of Brand New Email Cyber Attacks to be Cautious of and How to Outsmart Them
Your company through the eyes of 20.000 hackers: VRT casestudy
The essential role of transparency when building trust
Dutch Presentation: Case study: ‘SmartAIM’ identity & access governance in Vlaamse ziekenhuizen
Cyber Arena : A look at digital confrontations and their fight
Results of the 'Industrial Cybersecurity Survey - Belgium 2020’
Strengthen Your Cyber Resilience. Adapt with intelligence.
Overview of professions involved in GDPR and the competence mix required for those professions
Data protection in the software industry
GDPR: Risk, Control, Audit
Class action in privacy matters
The Legality principle or which safeguards exists as to the use of citizen’s data by the state
Keynote: European DPO activities abroad, beyond Brexit and the Schrems II judgement
International Transfers of Data and Cybersecurity requirements – What is the impact of the Schrems II decision
Looking behind the curtains of Health-ISAC: sharing unmatched security threat intelligence and vulnerability information
Keynote: Cyber Security? 3 Myths Debunked
Introducing the CCAK
Sophos Threat Report 2021
Mandiant security validation: stop assuming, start measuring
A day at the races: managing cybersecurity for hospitals in 2020
Uncovering the Human Factor
Cyber Security User Awareness
Real-time IT Management Solutions for the New Speed of Business
Why browser security should be a part of every enterprise's security strategy
Ransomware: COVID-19 caused mutations and the ultimate guide for protecting your remote workforce
GDPR training and awareness of employees
The importance of collective wisdom of DPOs
Data breach incident management, how to make it right?
Smart Home: Welcome to the connected House 2.0
DPO independence & conflict of interests
Cookies: what you need to know about them
Implementing accountability in practice under the GDPR
Blockchain Summit 2021 - DAY 1
Blockchain Summit 2021 - DAY 2
IoT 5G Summit 2021
IoT Industry 4.0 Summit 2021
Cloud Summit 2021
The DPO challenge in the transport sector
Why your organisation needs to migrate to Microsoft Teams
Connecting the digital society
Blockchain adoption: a look beyond crypto, fintech and supply chain applications.
Digital assets and DeFi: Regulatory of legal outlook
CLAIMSHARE: Solving fraud in the insurance industry & Winner Insurtech global challenge 2020
Why 86% of enterprise blockchain implementations fail
Making Trade Finance Easier to Secure for SMEs with Blockchain
Cryptocurrencies and entreprise blockchains: two sides of one tapestry
The Recovery is Digital, but What Role for Blockchain?
Polkadot: A scalable, heterogeneous multi-chain built with Substrate
What Enterprises can learn from web 3.0. Building digital ecosystems with Keyko and Nevermined
Central Bank Digital Currency and stablecoins. Why should we care?
The European Blockchain Service Infrastructure and the European Self Sovereign Identity Framework
500 years of blockchain history
Open, Smart and IT driven RAN for 5G Private Networks and Neutral Host
5G and the channel opportunity
Private Networks Round Table
5G powered IoT
The advantages of 5G Standalone Non Public Networks
The Possibilities of 5G and MPN for Industrial Use
Keynote: 5G – promise or reality?
Public and private 5G networks … towards a true partnership ? Perspective from the Belgian context
Keynote: 5G & regulatory topics
Proximus 5G innovation platform
5G brings new value
AI & Privacy: How to find Balance
AI, Data & Analytics Summit 2021
Flora Insurance : How to disrupt a traditional sector?
The datacenter and the challenge of the Cloud
Set up a multi-cloud strategy with Kubernetes
Europe’s cloud and data Ambitions
Innovate and thrive with cloud
Implementing VMware Tanzu With Fujitsu
Our Cloud Center of Excellence
Your Cloud Security Journey – Implementing a Zero Trust security approach
Endpoint Security from the cloud | Strategy beyond 2021
How to determine the optimal cloud for your workloads
Silver Linings: Immune System Technology for Cloud & SaaS
Sure, we can migrate that!
Ransomware is rising, do you have a plan?
Protecting Privacy in AI & Cloud World
How to become data-driven 3x faster with a data & analytics accelerator framework
How to deliver a network that’s as flexible as the cloud? Preparing for tomorrow’s connected world.
Key considerations for a cloud-enabled data center modernisation
Keynote - Cloud 3.0: Why CEOs must take the lead
Cloud Experience – Bridge all Clouds to deliver the Experience you desire
Fulfilling the promise of cloud-based analytics and workloads with data centric security
Every business is a Cloud business
Are web apps and AI threatening the future of mobile apps?
How to run your business apps in a hybrid world?
Doing Hybrid Right
Cyber Security Convention
How Cyclis improved customer interaction by modernizing their applications on Azure
Demystifying Cloud Security
How to determine the best actionable IT roadmap for your organization?
The use of CCM 4 for cloud users
It’s time to unlock data’s real value with Collaborative Computing
Data-Powered Innovation
Data Protection and Cloud, a contradiction in itself ? Protect your personal data in Cloud while staying compliant
Cloud & digital twins
The Digital Imperatives & the Cookiesless Advertising
Google Cloud Global Public sector use case
Why Co-location? Challenges & Trends
Turning MS Teams into an intelligent telephony service
European Cloud Policies - Building the next generation cloud for EU businesses and the public sector
Ransomware: To pay or not to pay
Developing organizational conflict wisdom
Leading with fairness in difficult times
FiredUp - Alles wat je nodig hebt voor een correct en respectvol ontslag
Redesigning work for the hybrid world!
Industry 4.0: Grab the opportunity now!
The IoT Effect: Smart Wins and how to spot them
Cybersecurity Standardisation and Certification for Connected Devices: A European vision
How to run a production-grade IoT platform?
Someone Does Not Simply Stop Production
Single Pair Ethernet - Semiconductor update on PHYs, Switches and PoDL
Intelligent Industry 4.0: the Human AI approach
How 5G fuels emerging technologies and unleashes untapped business values
Digital challenges and opportunities: Industry 5-6-7, Digital Hubs & Financing
Industrial Pathways, strategy guidance to to cope with digital industrial transformations
IoT in operation, living up to the promise
Open Standards based digital twin
Artificial intelligence for the physical world and its secret weapon
Sensor Network for Intelligent Predictive Enterprise. IoT / Cybersecurity and AI-based predictive maintenance in the foundry industry
What makes for a productive Industry 4.0 ecosystem? Comparative analysis of Industry 4.0 ecosystems across EU countries
Security Challenges Within OT and IoT
DPO Circle Annual Conference
Ransomware Report 2021
IDC MarketScape: U.S. Managed Detection and Response Services 2021 Vendor Assessment
2021: State of the Threat
Roundtable – The evolving role of the CISO in line with executive management expectations
Roundtable – State of the art cybersecurity technology
Roundtable – Data protection and privacy-related implications of a migration to the Cloud
Introduction Cyber Security Convention 2021
Keynote Cyber Security: Being at the beginning of …
Digital sovereignty: how to navigate the tech cold war without reverting to protectionism
Cyber Resilience in a post-pandemic world
Security and AI
Update from the trenches: ransomware war stories
Life-long learning and the cyberskills competencesGov
The CEO and his cybersecurity strategy
Make your employees part of your cyber defenses
3 cyber attacks to keep CEOs up at night
Prepare your organization to reduce the impact of the cybercriminals
Zero Trust
How Cyber security allows organisations to thrive in a digital world
Benefits of integration of IT security and Internal Control frameworks
Digital Transformation – Is there a Common Thread?
Cloud Security
Cyber Security Test Platforms - Custom developments
DCU - TierIV certified datacenter in Belgium
Making governance and compliance real with technical controls
3 Essential Tips to strengthen your Digital Resilience in a Hybrid/Multi Cloud world
The Business of Ransomware: CTU Cyber Threat Briefing
Trust anchors - the enabling role of identity & trust anchors in zero trust security architecture
The role of delegation and automation in Identity and Access Management (IAM)
Zero Trust Application Access
5 steps in building a Threat Intelligence Program to protect your organization from cyberattacks beyond your perimeter
US data transfers: what now?
Practical and efficient implementation of standards lays the cornerstone of cyber security
Regulation: the uprise, its dangers and how to tie it all together
NIS Directive
Cyberdangers and the Human
Quels subsides pour vous aider à faire face aux cybercriminels?
Welke subsidies om u te helpen omgaan met cybercriminelen
Trust Valley - Cybersecurity innovation made in Switzerland: what’s in for Belgian companies
Keynote: European Privacy Landscape
Current developments and future prospects regarding international data flows
What does it mean for a government to manage citizens data in compliance with the GDPR
Secure identity management in an online world
The new ePrivacy Regulation
AI: data protection and beyond
Global privacy regulation (China, Japan, US)
How risk assessments and the risk-based approach under the GDPR have already changed
The DPOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
The Right to privacy, a pillar of human rights
Privacy Is Hard and Seven Other Myths. Achieving Privacy through Careful Design
Privacy right and International Data Flows
“Building Trust in Innovation” through Ambition, Convergence, and Inclusion
Roundtable: Emerging challenges such as third party management (cookies, security, risks)
Aligning TPRM Across Privacy, Security, Ethics, ESG
Roundtable: DPO in post-Covid world - NWOW - New ways of working
Roundtable: DPO in practice, living the GDPR in day to day operations, challenges and tips
Video surveillance
How to establish and maintain a leadership position as a DPO?
The governance of data protection in large organisations
Keynote - AI beyond ML models: what about your data debt?
Implementing MLOps with Amazon SageMaker: main concepts and best practices
Digital Twin: AR/VR - Live Demo for Advanced Customer Experience, trained on NVIDIA A100
Bridging the gap with explainable AI
Challenges in productionalizing AI systems
Ethical Technology Institute: Creating a future where technology and data are free of bias
Keynote - Human-like AI: going beyond mere pattern recognition to empower humans
Stop reinventing the wheel: what to build and what to adopt when implementing AI into your organization
Low-code / no-code AI: The new era of document processing
Humain.ai: Do more of what matters
Why you should invest in graphs: learning from data fusion on knowledge graphs
AI-based optimization of Dutch NLP beyond the current state-of-the-art
How to deal with the war for talent in AI
Data labeling for AI applications
Cloud Summit 2022
icity Lab Talks - Digital Process
icity Lab Talks - The digital value chain
icity Lab Talks - Smart Living and Life Balance
The 5th Conference on Web3 Blockchain Crypto
Smart Mobility & the Energy Shift
Cyber Security Convention 2022
AI, Data & Analytics Summit 2022
DPO Circle Annual Conference 2022
Data breaches: Workflows, Risks and international compliance
Artificial Intelligence: From the lab to the real world
IRIDIA: the Artificial Intelligence Laboratory of Université libre de Bruxelles
The FARI Institute: Bringing together Academic experts in AI and the Brussels Region
Developing tools for the diagnosis of oligogenic diseases using machine learning
Ensuring INclusive DIgital MObility solutions through universal design
Localization of radio-frequency transmitters
Bias and Fairness in Machine Learning
Research at the Software Languages Lab Brussels
A deepdive in NFT's & NFT tracking
Why invest in NFT's, the core of internet revolution?
Bringing blockchain to the mainstream
How will we define data ownership in web 3.0?
Decentralized Finance, the new parallel financial system based on the decentralized ethos
Programmable money: the perfect HR coin
Q&A: MUTANI, a digital fashion unitive
DAO's as a collaborative way of working
Reflexivity & mimetic desire: the human aspect of Web3 protocols
Are those gains really yours, upon tax audit?
Decentralized Wireless: Networks Owned & Operated by the People
Programmable money
How to take your brand into the Metaverse
The value of Virtual Real Estate
Reshaping road safety through 5G-V2X
TracTozero: Solutions for an optimal transition to carbon-neutral mobility
The future is electric
Towards sustainable and inclusive mobility: vision and implementation
Next generation traffic planning for smart cities
Pursuit to reinvent mobility - impact of telework on the future of commuting
The EV-charging ecosystem and the importance of service
Enhancing Transport and Logistics operations with 5G-based Teleoperation
ART you ready? Policy recommendations on autonomous road transport from Belgium
Legal mobility budget 2.0
Smart & Sustainable mobility: a perspective from the Belgian Technology sector
Electric Vehicle Charging Program at the city of Ghent
Safe2work cycling workshops for companies
Mastering technology risks while boosting business opportunities
Scheduling, Optimisation and Security: new applications and impact on our daily life and industry
Innovative use of wireless technologies for a digital and sustainable transformation
Automatic Control and System Theory: from the lab to the real world
Cross-media technologies and applications: future directions for personal information management
Looking in digital value chain from an ecosystem perspective
Conferences via InsightZ.io
The balance between innovation and reality on the ground - a case study of virtual reality in the care of dementia and cognitive disorders
AI-based audience management and environment control: how to quantify and improve gatherings experience
Innovative applications for sustainable transport and energy systems
The lifecycle of data science & data-intensive applications
New applications of Machine Learning and High Throughput solutions to tackle human cell alterations
Leveraging artificial intelligence in biology: from protein design to the understanding of genetic variants
AI solutions in healthcare: the hospital of the future
Cybercrime … this time it’s personal
Digital transformation and cyber resiliency: challenges and opportunities
PALMKI Biometric Authentication in Cybersecurity
Cyber resilience is a mindset to adopt
Changing Regulatory and Compliance landscape
Thinking Zero Trust? How can it help you to protect against Ransomware
TL;DR: Securing the modern enterprise
Prioritising your security work using MITRE ATT&CK
Keynote European Privacy Landscape
The new Cyber Resilience Act
DPA ever evolving role in supporting data protection and privacy in Europe
The new AI Act
EDPB vision on creating a harmonised and consistent implementation of the GDPR across the EU
Cybersecurity and geopolitics, what role of the new NIS Directive (NIS2)
The GDPR certification in Luxembourg
The value of data in the EU’s regulatory framework
How to Address Data Throughout Its Lifecycle and Implement Secure End-of-Life Practices
International data transfers - challenges and solutions?
Securing data in the cloud
Data privacy in a post-quantum computing world
Data breach: what to do when, not if it happens
How to show your technical skills and knowledge in PRIVACY solution?
The evolution of the scope of the DPO role: A code of deontology for DPO's
Privacy Threat Modeling: what, why, how, and what’s next
The challenge: how to marry Europe’s push for ‘Open Data’ with ‘GDPR’
Women @ privacy
European AI Act impact: the case of Belgium
Privacy issues of smart devices
Presentation of the available resources and forums for cooperation
Topic links
Live webinars - conferences
Conferences / Webinars I will attend
Popular on Insightz / Trending
My list
Upcoming webinars
Continue watching
New on InsightZ
Monthly Hightlights
Watch again
Cyber Security
AI, ML, Data & Analytics
Blockchain, Crypto & Web3
Internet of things
Cloud & Digital Transformation
Privacy & GDPR
HRM & Employee Experience
Courses
Upcoming conferences