About


Press

Belgium Cyber Security Guide

Download your copy of this guide produced jointly by ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium.

More >


The Advisors

A Community of Experts, Professionals and Integrators

ICT Control brings together the knowledge and resources of professionals, experts and integrators in one place. Find out how entreprises - small and large - benefit from their know-how...

More >


Events

CSX Fundamentals / Leuven, Belgium / 19-20 June 2017

2-day boot camp for business and IT managers.

More >


 

Services


Advisory

GDPR

Support to be ready for GDPR compliance (EU)

More >


Judiciary

B3. Digital Forensics

Computer crime and computer based fraud require thorough investigation and detailed reporting. The evidence should be identified and precautionary kept for further investigation and reporting. ICT Control experts take in charge investigations as directed by jurisdictions and clients. Investigation include IT related criminal acts that should be assessed and reported with sufficient details to allow for further actions and decision making.

More >


Training

C1. Courses & Seminars

Various IT Management related seminars are organised on a regular basis by ICT Controland its partners.

Visit the Events section to find out about recent and up-coming seminars.

More >


 

Knowledge


Publications

Costs and benefits of the clouds

Datanews featured an articles by Professor Georges Ataya related to the costs and benefits of cloud computing. The article in French or in Dutch could be found on Datanews pages. 

More >


Case Studies

Getting an ISMS ISO 27001 certified!

The benefits of information security are numerous especially in face of current events.

Which organizations would benefit from an ISO 27001 certified ISMS?

What are the benefits?

More >


Newsletters

New Cybersecurity Module S3

The Information Security Management Education at Solvay Brussels School of Economics and Management launches in 2015 an executive programme in Cybersecurity.

Its objective is to build a specific Security/Cybersecurity plan that includes all necessary actions for assessing risks, conceiving mitigation and developing a comprehensive Information Security Strategy plan on an individually-selected environment.

More >