About


Press

ICT Control launches CSX Practitioner in Europe

ICT Control SA (ICTC) Brings Cybersecurity Practitioner Certification Training to Europe, UAE, Asia. Intensive training helps organizations develop their cyber workforces.

More >


The Advisors

A Community of Experts, Professionals and Integrators

ICT Control brings together the knowledge and resources of professionals, experts and integrators in one place. Find out how entreprises - small and large - benefit from their know-how...

More >


Events

CSX Fundamentals / Leuven, Belgium / 19-20 June 2017

2-day boot camp for business and IT managers.

More >


 

Services


Advisory

GDPR

Support to be ready for GDPR compliance (EU)

More >


Judiciary

B3. Digital Forensics

Computer crime and computer based fraud require thorough investigation and detailed reporting. The evidence should be identified and precautionary kept for further investigation and reporting. ICT Control experts take in charge investigations as directed by jurisdictions and clients. Investigation include IT related criminal acts that should be assessed and reported with sufficient details to allow for further actions and decision making.

More >


Training

CERTIFIED ISO27001 LEAD IMPLEMENTER

This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013.

More >


 

Knowledge


Publications

New practices for the governance of Enterprise IT

ISACA Announces new practices for the governance of Enterprise IT. Staying up to date is a sound continuous education for IT Executives, auditors, architects and project managers.

More >


Case Studies

Getting an ISMS ISO 27001 certified!

The benefits of information security are numerous especially in face of current events.

Which organizations would benefit from an ISO 27001 certified ISMS?

What are the benefits?

More >


Newsletters

Incident Management Guide

Event: A presentation of the “Cyber Security Incident Management Guide” and a distribution of the publication to all attendees.

More >