About


Press

Hacking de Swift commenté par Georges ATAYA dans La Libre

"Swift est à ma connaissance une des entreprises les plus protégées au monde. J’ai eu l’occasion de visiter leur centre informatique aux Etats-Unis qui est aussi protégé que Fort Knox. L’attaque flagrante dont elle a fait l’objet récemment montre l’étendue et l’impact énorme de la cyber criminalité aujourd’hui."

More >


The Advisors

A Community of Experts, Professionals and Integrators

ICT Control brings together the knowledge and resources of professionals, experts and integrators in one place. Find out how entreprises - small and large - benefit from their know-how...

More >


Events

INFOSECURITY.BE 2017

More >


 

Services


Advisory

A1. IT Audit & Assurance

ICT Control provides both internal and external audit services in preparation for a certification for example.
More >


Judiciary

B3. Digital Forensics

Computer crime and computer based fraud require thorough investigation and detailed reporting. The evidence should be identified and precautionary kept for further investigation and reporting. ICT Control experts take in charge investigations as directed by jurisdictions and clients. Investigation include IT related criminal acts that should be assessed and reported with sufficient details to allow for further actions and decision making.

More >


Training

CERTIFIED ISO27001 LEAD IMPLEMENTER

This five-day intensive course enables participants to develop the necessary expertise to support an organization in implementing and managing an Information Security Management System (ISMS) based on ISO/IEC 27001:2013.

More >


 

Knowledge


Publications

Obsolescence programmée des services publics

Tout comme les machines actuelles produites par des sociétés innovatrices mais trop planificatrices, les services publics semblent eux aussi risquer une obsolescence mais causée, à l’inverse, par le manque de planification et d’innovation. Voici les faits.

More >


Case Studies

Vols de données et demandes de rançon - checklist protection

Notre cabinet-conseil enregistre un nombre croissant de demandes d'assistance venant d'entreprises victimes de vols de données informatiques.

Voici quelques points pratiques pour se protéger de ce type d'attaque...

More >


Newsletters

Incident Management Guide

Event: A presentation of the “Cyber Security Incident Management Guide” and a distribution of the publication to all attendees.

More >