About


Press

Belgium Cyber Security Guide

Download your copy of this guide produced jointly by ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium.

More >


The Advisors

A Community of Experts, Professionals and Integrators

ICT Control brings together the knowledge and resources of professionals, experts and integrators in one place. Find out how entreprises - small and large - benefit from their know-how...

More >


Events

INFOSECURITY.BE 2017

More >


 

Services


Advisory

A1. IT Audit & Assurance

ICT Control provides both internal and external audit services in preparation for a certification for example.
More >


Judiciary

B3. Digital Forensics

Computer crime and computer based fraud require thorough investigation and detailed reporting. The evidence should be identified and precautionary kept for further investigation and reporting. ICT Control experts take in charge investigations as directed by jurisdictions and clients. Investigation include IT related criminal acts that should be assessed and reported with sufficient details to allow for further actions and decision making.

More >


Training

Cybersecurity Nexus (CSX) Program

Cybersecurity Nexus™ (CSX) is a new program designed for the most ambitious cyber security professionals, empowering them to elevate their work, take control of their career paths and earn their place amongst the best.

The industry demand for skilled cyber professionals continues to outpace the availability of trained and experienced individuals. This is why we are committed to fortifying the industry by educating, training and certifying a stronger, more informed workforce that can keep organizations and their information secure—now and in the future.

More >


 

Knowledge


Publications

Le dirigeant face à la cyber-sécurité de son entreprise

La sécurité de l’information était la prérogative des responsables techniques ou des ingénieurs systèmes des très grandes entreprises. Aujourd’hui, c’est une question primordiale pour tout chef d’entreprise responsable et pour son équipe dirigeante.

More >


Case Studies

Vols de données et demandes de rançon - checklist protection

Notre cabinet-conseil enregistre un nombre croissant de demandes d'assistance venant d'entreprises victimes de vols de données informatiques.

Voici quelques points pratiques pour se protéger de ce type d'attaque...

More >


Newsletters

Incident Management Guide

Event: A presentation of the “Cyber Security Incident Management Guide” and a distribution of the publication to all attendees.

More >