Some functionalities won't function properly while using Internet Explorer Sitemap

Main links

Home Login Cookies Privacy Profile

Content links

How Belgian Data Protection Authority evaluated COVID-19 contact tracing Enhance your privacy management, based on the newest ISO27701 standard! DigitYser, een artificiële intelligentie en data science community om entrepreneurship te boosten - Philippe Van Impe “AI is becoming a clear reality.” - Patrice Latinne AI & de verbetering van customer experience - Reiner Bruns Hoe complexe data verwerken en implementeren? - Tom Lenaerts “We want to build relationships.” - Bas Janssen & Using algorithms to uncover discrimination and racism - Martin Canter Relatie tussen AI en RPA - Mathias Fransen How to value your compliance management? - FR Het coronavirus en de link met technologie - Marc Van Ranst Introduction of the Blockchain Summit conference themes Fully maximizing the value of hybrid IT solutions - Make your infrastructure agile & Cloud-enabled Master Use Cases for Digital Transformation Keynote - Drive Digital Transformation using AI Keynote - On the edge: 4 enabling technologies that will change the face of IOT The ripple effect of COVID-19 on AI Goodbye payments? Digital healthcare transformations: smart face masks case study Introduction of the Cloud Security conference track Introduction of the Internet of Things conference themes Introduction of the Industry 4.0 conference track Introduction to Cloud Governance on AWS The Relevance of PKI and Digital Signing in 2020 Giving your Teams a voice The future of conferences will be digital! - NL Optimize your Service Management processes with Robotic Process Automation Introduction of the Cyber Security conference themes Cyber Conference Days 2020 - DAY 1 Cyber Conference Days 2020 - DAY 2 Cyber Conference Days 2020 - DAY 3 DPO Circle Annual Conference 2020 - DAY 1 DPO Circle Annual Conference 2020 - DAY 2 Cyberdangers and the COVID-19 effect Strengthening Cyber Security with ML and AI Cybersecurity for extended attack surface Cyber Security Trends & Predictions for 2021 Minimising risk from cyber threats: focus on reducing time to containment Uncovering the Human Factor Cyber Security User Awareness A new era of Cryptography Beat ransomware. 3 Ultimate strategies Future of AI with data protection DPO assurance vs insurance - roundtable GDPR - From data management to responsible use of data Personal data protection in the Belgian public sector Data Protection On the Ground - Personal data protection in the banking sector Cyber Security Risks for Industry 4.0 AI-Enabled Cyber Security Results of the 'Industrial Cybersecurity Survey - Belgium 2020’ Ransomware: A modern threat to modern data 7 essential vulnerability management questions answered Security requirements in GDPR - there is no privacy without security Career development for Information security professionals The Secrets of Brand New Email Cyber Attacks to be Cautious of and How to Outsmart Them Your company through the eyes of 20.000 hackers: VRT casestudy The essential role of transparency when building trust Dutch Presentation: Case study: ‘SmartAIM’ identity & access governance in Vlaamse ziekenhuizen Cyber Arena : A look at digital confrontations and their fight Results of the 'Industrial Cybersecurity Survey - Belgium 2020’ Strengthen Your Cyber Resilience. Adapt with intelligence. Overview of professions involved in GDPR and the competence mix required for those professions Data protection in the software industry GDPR: Risk, Control, Audit Class action in privacy matters The Legality principle or which safeguards exists as to the use of citizen’s data by the state Keynote: European DPO activities abroad, beyond Brexit and the Schrems II judgement International Transfers of Data and Cybersecurity requirements – What is the impact of the Schrems II decision Looking behind the curtains of Health-ISAC: sharing unmatched security threat intelligence and vulnerability information Keynote: Cyber Security? 3 Myths Debunked Introducing the CCAK Sophos Threat Report 2021 Mandiant security validation: stop assuming, start measuring A day at the races: managing cybersecurity for hospitals in 2020 Uncovering the Human Factor Cyber Security User Awareness Real-time IT Management Solutions for the New Speed of Business Why browser security should be a part of every enterprise's security strategy Ransomware: COVID-19 caused mutations and the ultimate guide for protecting your remote workforce GDPR training and awareness of employees The importance of collective wisdom of DPOs Data breach incident management, how to make it right? Smart Home: Welcome to the connected House 2.0 DPO independence & conflict of interests Cookies: what you need to know about them Implementing accountability in practice under the GDPR Blockchain Summit 2021 - DAY 1 Blockchain Summit 2021 - DAY 2 IoT 5G Summit 2021 IoT Industry 4.0 Summit 2021 Cloud Summit 2021 The DPO challenge in the transport sector Why your organisation needs to migrate to Microsoft Teams Connecting the digital society Blockchain adoption: a look beyond crypto, fintech and supply chain applications. Digital assets and DeFi: Regulatory of legal outlook CLAIMSHARE: Solving fraud in the insurance industry & Winner Insurtech global challenge 2020 Why 86% of enterprise blockchain implementations fail Making Trade Finance Easier to Secure for SMEs with Blockchain Cryptocurrencies and entreprise blockchains: two sides of one tapestry The Recovery is Digital, but What Role for Blockchain? Polkadot: A scalable, heterogeneous multi-chain built with Substrate What Enterprises can learn from web 3.0. Building digital ecosystems with Keyko and Nevermined Central Bank Digital Currency and stablecoins. Why should we care? The European Blockchain Service Infrastructure and the European Self Sovereign Identity Framework 500 years of blockchain history Open, Smart and IT driven RAN for 5G Private Networks and Neutral Host 5G and the channel opportunity Private Networks Round Table 5G powered IoT The advantages of 5G Standalone Non Public Networks The Possibilities of 5G and MPN for Industrial Use Keynote: 5G – promise or reality? Public and private 5G networks … towards a true partnership ? Perspective from the Belgian context Keynote: 5G & regulatory topics Proximus 5G innovation platform 5G brings new value AI & Privacy: How to find Balance AI, Data & Analytics Summit 2021 Flora Insurance : How to disrupt a traditional sector? The datacenter and the challenge of the Cloud Set up a multi-cloud strategy with Kubernetes Europe’s cloud and data Ambitions Innovate and thrive with cloud Implementing VMware Tanzu With Fujitsu Our Cloud Center of Excellence Your Cloud Security Journey – Implementing a Zero Trust security approach Endpoint Security from the cloud | Strategy beyond 2021 How to determine the optimal cloud for your workloads Silver Linings: Immune System Technology for Cloud & SaaS​ Sure, we can migrate that! Ransomware is rising, do you have a plan? Protecting Privacy in AI & Cloud World How to become data-driven 3x faster with a data & analytics accelerator framework How to deliver a network that’s as flexible as the cloud? Preparing for tomorrow’s connected world. Key considerations for a cloud-enabled data center modernisation Keynote - Cloud 3.0: Why CEOs must take the lead Cloud Experience – Bridge all Clouds to deliver the Experience you desire Fulfilling the promise of cloud-based analytics and workloads with data centric security Every business is a Cloud business Are web apps and AI threatening the future of mobile apps? How to run your business apps in a hybrid world? Doing Hybrid Right Cyber Security Convention How Cyclis improved customer interaction by modernizing their applications on Azure Demystifying Cloud Security How to determine the best actionable IT roadmap for your organization? The use of CCM 4 for cloud users It’s time to unlock data’s real value with Collaborative Computing Data-Powered Innovation Data Protection and Cloud, a contradiction in itself ? Protect your personal data in Cloud while staying compliant Cloud & digital twins The Digital Imperatives & the Cookiesless Advertising Google Cloud Global Public sector use case Why Co-location? Challenges & Trends Turning MS Teams into an intelligent telephony service European Cloud Policies - Building the next generation cloud for EU businesses and the public sector Ransomware: To pay or not to pay Developing organizational conflict wisdom Leading with fairness in difficult times FiredUp - Alles wat je nodig hebt voor een correct en respectvol ontslag Redesigning work for the hybrid world! Industry 4.0: Grab the opportunity now! The IoT Effect: Smart Wins and how to spot them Cybersecurity Standardisation and Certification for Connected Devices: A European vision How to run a production-grade IoT platform? Someone Does Not Simply Stop Production Single Pair Ethernet - Semiconductor update on PHYs, Switches and PoDL Intelligent Industry 4.0: the Human AI approach How 5G fuels emerging technologies and unleashes untapped business values Digital challenges and opportunities: Industry 5-6-7, Digital Hubs & Financing Industrial Pathways, strategy guidance to to cope with digital industrial transformations IoT in operation, living up to the promise Open Standards based digital twin Artificial intelligence for the physical world and its secret weapon Sensor Network for Intelligent Predictive Enterprise. IoT / Cybersecurity and AI-based predictive maintenance in the foundry industry What makes for a productive Industry 4.0 ecosystem? Comparative analysis of Industry 4.0 ecosystems across EU countries Security Challenges Within OT and IoT DPO Circle Annual Conference Ransomware Report 2021 IDC MarketScape: U.S. Managed Detection and Response Services 2021 Vendor Assessment 2021: State of the Threat Roundtable – The evolving role of the CISO in line with executive management expectations Roundtable – State of the art cybersecurity technology Roundtable – Data protection and privacy-related implications of a migration to the Cloud Introduction Cyber Security Convention 2021 Keynote Cyber Security: Being at the beginning of … Digital sovereignty: how to navigate the tech cold war without reverting to protectionism Cyber Resilience in a post-pandemic world Security and AI Update from the trenches: ransomware war stories Life-long learning and the cyberskills competencesGov The CEO and his cybersecurity strategy Make your employees part of your cyber defenses 3 cyber attacks to keep CEOs up at night Prepare your organization to reduce the impact of the cybercriminals Zero Trust How Cyber security allows organisations to thrive in a digital world Benefits of integration of IT security and Internal Control frameworks Digital Transformation – Is there a Common Thread? Cloud Security Cyber Security Test Platforms - Custom developments DCU - TierIV certified datacenter in Belgium Making governance and compliance real with technical controls 3 Essential Tips to strengthen your Digital Resilience in a Hybrid/Multi Cloud world The Business of Ransomware: CTU Cyber Threat Briefing Trust anchors - the enabling role of identity & trust anchors in zero trust security architecture The role of delegation and automation in Identity and Access Management (IAM) Zero Trust Application Access 5 steps in building a Threat Intelligence Program to protect your organization from cyberattacks beyond your perimeter US data transfers: what now? Practical and efficient implementation of standards lays the cornerstone of cyber security Regulation: the uprise, its dangers and how to tie it all together NIS Directive Cyberdangers and the Human Quels subsides pour vous aider à faire face aux cybercriminels? Welke subsidies om u te helpen omgaan met cybercriminelen Trust Valley - Cybersecurity innovation made in Switzerland: what’s in for Belgian companies Keynote: European Privacy Landscape Current developments and future prospects regarding international data flows What does it mean for a government to manage citizens data in compliance with the GDPR Secure identity management in an online world The new ePrivacy Regulation AI: data protection and beyond Global privacy regulation (China, Japan, US) How risk assessments and the risk-based approach under the GDPR have already changed The DPOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like The Right to privacy, a pillar of human rights Privacy Is Hard and Seven Other Myths. Achieving Privacy through Careful Design Privacy right and International Data Flows “Building Trust in Innovation” through Ambition, Convergence, and Inclusion Roundtable: Emerging challenges such as third party management (cookies, security, risks) Aligning TPRM Across Privacy, Security, Ethics, ESG Roundtable: DPO in post-Covid world - NWOW - New ways of working Roundtable: DPO in practice, living the GDPR in day to day operations, challenges and tips Video surveillance How to establish and maintain a leadership position as a DPO? The governance of data protection in large organisations Keynote - AI beyond ML models: what about your data debt? Implementing MLOps with Amazon SageMaker: main concepts and best practices Digital Twin: AR/VR - Live Demo for Advanced Customer Experience, trained on NVIDIA A100 Bridging the gap with explainable AI Challenges in productionalizing AI systems Ethical Technology Institute: Creating a future where technology and data are free of bias Keynote - Human-like AI: going beyond mere pattern recognition to empower humans Stop reinventing the wheel: what to build and what to adopt when implementing AI into your organization Low-code / no-code AI: The new era of document processing Do more of what matters Why you should invest in graphs: learning from data fusion on knowledge graphs AI-based optimization of Dutch NLP beyond the current state-of-the-art How to deal with the war for talent in AI Data labeling for AI applications Cloud Summit 2022 icity Lab Talks - Digital Process icity Lab Talks - The digital value chain icity Lab Talks - Smart Living and Life Balance The 5th Conference on Web3 Blockchain Crypto Smart Mobility & the Energy Shift Cyber Security Convention 2022 AI, Data & Analytics Summit 2022 DPO Circle Annual Conference 2022 Data breaches: Workflows, Risks and international compliance Artificial Intelligence: From the lab to the real world IRIDIA: the Artificial Intelligence Laboratory of Université libre de Bruxelles The FARI Institute: Bringing together Academic experts in AI and the Brussels Region Developing tools for the diagnosis of oligogenic diseases using machine learning Ensuring INclusive DIgital MObility solutions through universal design Localization of radio-frequency transmitters Bias and Fairness in Machine Learning Research at the Software Languages Lab Brussels A deepdive in NFT's & NFT tracking Why invest in NFT's, the core of internet revolution? Bringing blockchain to the mainstream How will we define data ownership in web 3.0? Decentralized Finance, the new parallel financial system based on the decentralized ethos Programmable money: the perfect HR coin Q&A: MUTANI, a digital fashion unitive DAO's as a collaborative way of working Reflexivity & mimetic desire: the human aspect of Web3 protocols Are those gains really yours, upon tax audit? Decentralized Wireless: Networks Owned & Operated by the People Programmable money How to take your brand into the Metaverse The value of Virtual Real Estate Reshaping road safety through 5G-V2X TracTozero: Solutions for an optimal transition to carbon-neutral mobility The future is electric Towards sustainable and inclusive mobility: vision and implementation Next generation traffic planning for smart cities Pursuit to reinvent mobility - impact of telework on the future of commuting The EV-charging ecosystem and the importance of service Enhancing Transport and Logistics operations with 5G-based Teleoperation ART you ready? Policy recommendations on autonomous road transport from Belgium Legal mobility budget 2.0 Smart & Sustainable mobility: a perspective from the Belgian Technology sector Electric Vehicle Charging Program at the city of Ghent Safe2work cycling workshops for companies Mastering technology risks while boosting business opportunities Scheduling, Optimisation and Security: new applications and impact on our daily life and industry Innovative use of wireless technologies for a digital and sustainable transformation Automatic Control and System Theory: from the lab to the real world Cross-media technologies and applications: future directions for personal information management Looking in digital value chain from an ecosystem perspective Conferences via The balance between innovation and reality on the ground - a case study of virtual reality in the care of dementia and cognitive disorders AI-based audience management and environment control: how to quantify and improve gatherings experience Innovative applications for sustainable transport and energy systems The lifecycle of data science & data-intensive applications New applications of Machine Learning and High Throughput solutions to tackle human cell alterations Leveraging artificial intelligence in biology: from protein design to the understanding of genetic variants AI solutions in healthcare: the hospital of the future Cybercrime … this time it’s personal Digital transformation and cyber resiliency: challenges and opportunities PALMKI Biometric Authentication in Cybersecurity Cyber resilience is a mindset to adopt Changing Regulatory and Compliance landscape Thinking Zero Trust? How can it help you to protect against Ransomware TL;DR: Securing the modern enterprise Prioritising your security work using MITRE ATT&CK Keynote European Privacy Landscape The new Cyber Resilience Act DPA ever evolving role in supporting data protection and privacy in Europe The new AI Act EDPB vision on creating a harmonised and consistent implementation of the GDPR across the EU Cybersecurity and geopolitics, what role of the new NIS Directive (NIS2) The GDPR certification in Luxembourg The value of data in the EU’s regulatory framework How to Address Data Throughout Its Lifecycle and Implement Secure End-of-Life Practices International data transfers - challenges and solutions? Securing data in the cloud Data privacy in a post-quantum computing world Data breach: what to do when, not if it happens How to show your technical skills and knowledge in PRIVACY solution? The evolution of the scope of the DPO role: A code of deontology for DPO's Privacy Threat Modeling: what, why, how, and what’s next The challenge: how to marry Europe’s push for ‘Open Data’ with ‘GDPR’ Women @ privacy European AI Act impact: the case of Belgium Privacy issues of smart devices Presentation of the available resources and forums for cooperation

Topic links

Live webinars - conferences Conferences / Webinars I will attend Popular on Insightz / Trending My list Upcoming webinars Continue watching New on InsightZ Monthly Hightlights Watch again Cyber Security AI, ML, Data & Analytics Blockchain, Crypto & Web3 Internet of things Cloud & Digital Transformation Privacy & GDPR HRM & Employee Experience Courses Upcoming conferences