About


Press

Belgium Cyber Security Guide

Download your copy of this guide produced jointly by ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium.

More >


The Advisors

A Community of Experts, Professionals and Integrators

ICT Control brings together the knowledge and resources of professionals, experts and integrators in one place. Find out how entreprises - small and large - benefit from their know-how...

More >


Events

Conférence: La cybersécurité et les dirigeants

Les relations d'ICT Control sont cordialement conviées à la conférence de l'Academie Royale ce mardi 26 avril 2016 (au lieu du 22 mars) sur le thème: "La cybersécurité et les dirigeants".

More >


 

Services


Advisory

A1. IT Audit & Assurance

ICT Control provides both internal and external audit services in preparation for a certification for example.
More >


Judiciary

B3. Digital Forensics

Computer crime and computer based fraud require thorough investigation and detailed reporting. The evidence should be identified and precautionary kept for further investigation and reporting. ICT Control experts take in charge investigations as directed by jurisdictions and clients. Investigation include IT related criminal acts that should be assessed and reported with sufficient details to allow for further actions and decision making.

More >


Training

Cybersecurity Nexus (CSX) Program

ISACA Cybersecurity training and certification are now available in Europe and Asia!

As part of a global initiative to help meet the increasing demand for skilled cyber security professionals, Cybersecurity Nexus™ (CSX) from ISACA®—the global leader in information systems certification and knowledge—has created three new globally accepted cyber security certifications.

More >


 

Knowledge


Publications

Awareness Material 2015

A series of cyber security awareness material has been developped in relation with our activities with the Cyber Security Coalition and is available here for download.

More >


Case Studies

Vols de données et demandes de rançon - checklist protection

Notre cabinet-conseil enregistre un nombre croissant de demandes d'assistance venant d'entreprises victimes de vols de données informatiques.

Voici quelques points pratiques pour se protéger de ce type d'attaque...

More >


Newsletters

Incident Management Guide

Event: A presentation of the “Cyber Security Incident Management Guide” and a distribution of the publication to all attendees.

More >