Author: Marc Vael

Valuendo Erm In An Extended Environment (March 2007)

Valuendo Erm In An Extended Environment (March 2007)

Generic presentation on ERM : enterprise risk management

Valuendo Erm In An Extended Environment (March 2007)

Valuendo Erm In An Extended Environment (March 2007)

Generic presentation on ERM : enterprise risk management

hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?

hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?

Een keynote presentatie die ik heb gegeven op een grote IT...

Valuendo cyberwar and security (okt 2011) handout

Valuendo cyberwar and security (okt 2011) handout

Presentation on cyberattacks given by Marc Vael at EPSC for...

Valuendo 25 Things Not To Do (March 2009) Handout

Valuendo 25 Things Not To Do (March 2009) Handout

Voting presentation on 25 security statements.

Valuendo cyberwar and security (jan 2012) handout

Valuendo cyberwar and security (jan 2012) handout

A small presentation on cyberwar and how to approach it in...

Valuendo Aiesec Importance Of Planning (2001) Handout
The value of big data analytics

The value of big data analytics

My keynote speech at the ISACA IIA Belgium software watch d...


The view of auditor on cybercrime

The view of auditor on cybercrime

A presentation I made in 2014 on cybercrime as viewed by au...


Securing big data (july 2012)

Securing big data (july 2012)

A presentation I made


Belgian Data Protection Commission's new audit programme

Belgian Data Protection Commission's new audit programme

Presentation given by Mr. Willem De Beuckelaere (president...


Value-added it auditing

Value-added it auditing

A presentation I made based on ISACA research on value adde...


ISACA Reporting relevant IT risks to stakeholders

ISACA Reporting relevant IT risks to stakeholders

A presentation I made for the ISACA Belgium open forum of J...


ISACA smart security for smart devices

ISACA smart security for smart devices

I made this presentation for an ISACA webinar on smart devi...


ISACA Mobile Payments Forum presentation

ISACA Mobile Payments Forum presentation

A presentation I made in June 2014 as starting point for di...


Isaca india trust & value from cloud computing (aug 2011) print

Isaca india trust & value from cloud computing (aug 2011) print

A brand new presentation I gave for an online webcast for I...


ISACA Cloud Computing Risks

ISACA Cloud Computing Risks

Presentation I gave in March 2014 on cloud computing with c...


ISACA Internet of Things open forum presentation

ISACA Internet of Things open forum presentation

A presentation I made based on ISACA research on IoT as sta...


ISACA Belgium CERT view 2011

ISACA Belgium CERT view 2011

Presentation given at ISACA Belgium in November 2011 at CER...


Cloud security lessons learned and audit

Cloud security lessons learned and audit

A keynote presentation I gave for BELTUG in June 2015 based...


Information security awareness (sept 2012) bis handout

Information security awareness (sept 2012) bis handout

A presentation I delivered for CONFENIS 2012 in Ghent.


How to handle multilayered IT security today

How to handle multilayered IT security today

A presentation for INFOSECURITY MAGAZINE on how to handle m...


Cybersecurity nexus vision

Cybersecurity nexus vision

Presentation for decision makers on how to solve the cybers...


Cybersecurity governance existing frameworks (nov 2015)

Cybersecurity governance existing frameworks (nov 2015)

Summary of the most known cybersecurity frameworks from non...