About


Press

Belgium Cyber Security Guide

Download your copy of this guide produced jointly by ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium.

More >


The Advisors

A Community of Experts, Professionals and Integrators

ICT Control brings together the knowledge and resources of professionals, experts and integrators in one place. Find out how entreprises - small and large - benefit from their know-how...

More >


Events

CSX Fundamentals / Leuven, Belgium / 19-20 June 2017

2-day boot camp for business and IT managers.

More >


 

Services


Advisory

A6. Communication

Assisting the IT function in communicating succesfully with the other business functions and departments in order to be better understood by the others, on one hand, and to be completely aligned with the business, on the other hand.

Based on recent researches and user experiences, ICT Control developed a method for assisting the IT function in planning and conducting adequate communication to stakeholders.

More >


Judiciary

B3. Digital Forensics

Computer crime and computer based fraud require thorough investigation and detailed reporting. The evidence should be identified and precautionary kept for further investigation and reporting. ICT Control experts take in charge investigations as directed by jurisdictions and clients. Investigation include IT related criminal acts that should be assessed and reported with sufficient details to allow for further actions and decision making.

More >


Training

Cybersecurity Nexus (CSX) Program

Cybersecurity Nexus™ (CSX) is a new program designed for the most ambitious cyber security professionals, empowering them to elevate their work, take control of their career paths and earn their place amongst the best.

The industry demand for skilled cyber professionals continues to outpace the availability of trained and experienced individuals. This is why we are committed to fortifying the industry by educating, training and certifying a stronger, more informed workforce that can keep organizations and their information secure—now and in the future.

More >


 

Knowledge


Publications

Sources Authentiques: leur utilisation dans l'administration publique

L'utilisation généralisée de sources authentiques apporte avec elle de nombreuses exigences concernant la sécurité et le traitement des données.

More >


Case Studies

Vols de données et demandes de rançon - checklist protection

Notre cabinet-conseil enregistre un nombre croissant de demandes d'assistance venant d'entreprises victimes de vols de données informatiques.

Voici quelques points pratiques pour se protéger de ce type d'attaque...

More >


Newsletters

New Cybersecurity Module S3

The Information Security Management Education at Solvay Brussels School of Economics and Management launches in 2015 an executive programme in Cybersecurity.

Its objective is to build a specific Security/Cybersecurity plan that includes all necessary actions for assessing risks, conceiving mitigation and developing a comprehensive Information Security Strategy plan on an individually-selected environment.

More >