Sitemap
Pilar Pages
Focus Groups
Focus Groups
- Application Security
- Awareness
- Governance, Risk & Compliance (GRC)
- Enterprise Security Architecture (ESA)
- Cloud Security
- Cryptography
- Cyber Incident Detection & Response (CIDR)
- OT/ ICS Security
- Privacy & Data Protection
- Regulations & Standardizations
- Cybersecurity for Hospitals
- Identity & Access Management (IAM)
News
Categories
Hashtags
- #10YearsCyberSecurityCoalition
- #ai
- #applicationsecurity
- #awards
- #BECYBER
- #BECYBER2023
- #belgiancybersecuritycoalition
- #BelgiumCyberSecurityAwards
- #cloudsecurity
- #community
- #cryptography
- #CSIRT
- #cyberattack
- #CyberAwards
- #cyberawareness
- #cyberincident
- #cyberpulse
- #cybersecurite
- #cybersecurity
- #CyberSecurityAwards
- #CyberSecurityPersonality
- #cyberveiligheid
- #data
- #dataprotection
- #digitalinclusion
- #digitall
- #ECSM
- #EDUbox
- #enseignement
- #enterprisesecurityarchitecture
- #GRC
- #healthcare
- #IAM
- #ICS
- #identityandaccessmanagement
- #OKisnietaltijdOK
- #OKisnotalwaysOK
- #OKnestpastoujoursOK
- #onderwijs
- #OTICSSecurity
- #OTsecurity
- #passwordsecurity
- #PET
- #phishing
- #privacy
- #PrivacybyDesign
- #regulatorycompliance
- #SOC
Posts
- 2024 US elections: Safeguarding the vote
- Announcing the finalists for the fourth edition of Belgium’s Cyber Security Awards
- NIS2: the final countdown begins
- Last call for BE-CYBER 2024 – Secure Belgium’s Digital Future
- A new campaign to promote two-step verification
- The Cyber Security Coalition launches new cybersecurity podcast series
- BE-CYBER 2024 – Secure Belgium’s Digital Future
- Back to school… and so are the hackers, fresh from their holidays
- Secure Behaviour Framework: a new tool resource for cybersecurity professionals
- Insights from the Coalition Community
- DigitAll: Lettre ouverte: Pas de prospérité sans inclusion numérique
- DigitAll: Open brief: Geen welvaart zonder digitale inclusie
- Manifesto: Actioning Baseline Cloud Security by Default
- Belgium’s Cyber Security Awards 2024
- EDUbox Data en Privacy: de balans tussen delen en beschermen
- Cyber Security General Assemblies 2024
- 2023 Member Satisfaction Survey
- Chair Jan De Blauwe’s New Year address 2023
- Belgium’s Cyber Security Awards Ceremony 2023
- Belgium Cyber Security Awards 2023 Announces Esteemed Winners
- Vice-chair Georges Ataya kicks off the BE-CYBER Experience Sharing Day 2023
- Phishing, the devil’s in the details!
- DigitAll: 100 organisations unite against the widening digital divide in Belgium
- Belgium’s Cyber Security Awards 2023
- La Belgique annonce la fin du phishing
- België kondigt het einde van phishing aan
- Cyber Security Coalition General Assembly 2023
- EDUbox Cybersecurity: digitale bescherming als goede gewoonte
- EDUbox Cybersécurité: la protection numérique comme bonne habitude
- Chair Jan De Blauwe’s New Year’s Address 2022
- An eventful year for cybersecurity
- OK is not always OK! – Launch of the national awareness campaign
- Sebastien Deleersnyder is Belgium’s Cyber Security Personality of the Year 2022!
- The Cyber Security Coalition signs the Digital Inclusion Charter
- Are you Belgium’s Cyber Security Personality of the Year 2022?
- Cyber Security Coalition General Assembly 2022
- Cyber Security Awareness & Culture Manager
- Chair Jan De Blauwe’s New Year’s Address 2021
- Rosanna Kurrer is Belgium’s first Cyber Security Personality of the Year
- Learn how to create your own cyber security awareness plan
- New Febelfin brochure: There is plenty of fish in the sea
- Cybercriminals exploit the mailboxes of Belgian companies to steal passwords
- Chair Jan De Blauwe’s New Year’s Address 2020
- A message from our Chair Jan De Blauwe to the members of the Cyber Security Coalition
- A message from our Chair Jan De Blauwe to the members of the Cyber Security Coalition
Events
Upcoming Events
- Belgium’s Cyber Security Awards Ceremony
- Focus Groups: Permanent Chairs Get Together
- Celebrating 10 Years Cyber Security Coalition
- Privacy Focus Group meeting
- Cryptography Focus Group meeting
- General Assembly 2025
- Identity & Access Management Focus Group meeting
- OT / ICS Security Focus Group
- CIDR Focus Group Meeting
- GRC Focus Group Meeting
- Application Security Focus Group Meeting
- Cloud Security Focus Group Meeting
Events galleries
- BE-CYBER 2024
- Meet & Greet 2024
- Solstice Cloud Security Summit 2024
- Application Security 2024
- General Assembly 2024
- GRC: Be Connected! 2024
- Unlocking the Future of Legal Defence in Cyberspace 2024
- BE-CYBER 2023
- Goodbye Summer Event 2023 – Security in the 5G World
- Application Security 2023
- GRC: Be Connected! 2023
- Women4Cyber Belgium Chapter – International Women’s Day 2023
- BE-CYBER 2022
- Awareness Focus Group – Celebration Day 2022
- GRC: Be Connected! 2022
Resources
Categories
Topics
- application security
- certifications
- cloud security
- community
- cryptography
- cybersecurity metrics
- data protection and privacy
- digital inclusion
- enterprise security architecture
- identity management
- incident response
- network security
- OT/ICS security
- policies and compliance
- security governance
- threat intelligence
- training and awareness
Assets
- La cybersécurité dans le secteur hospitalier : un enjeu collectif abordé lors de la Cyberweek 2024
- The added value of internal audit in strengthening cyber resilience in the public sector
- BE-CYBER 2024 – Secure Belgium’s Digital Future
- Rethinking Cybersecurity Awareness: The Flipped Classroom
- A Quickstart Guide to implement NIS2 in 7 steps
- Sharing threat intelligence: a critical power in fighting cyber crime
- Will certification lead to more cyber security maturity?
- Navigating the evolving role of CISOs in a complex threat landscape
- The CISO of Tomorrow – Navigating Through Change
- Help! My computer has been hacked
- The NIS2 directive: What Is the impact on my business?
- NIS2 is here … so what’s next?
- Report Focus Group Identity & Access Management: Decentralised Digital Identity
- BE-CYBER 2024 – Secure Belgium’s Digital Future
- Digital well-being of children
- Two-factor authentication: A simple step to a safer digital world
- The Cyber Security Coalition: Yesterday, Today, Tomorrow
- How Bibliothèques sans Frontières tries to fight digital inequality
- Training centre Interface3 prepares unemployed women for a career in cybersecurity
- Secure Behavior Framework Fullscreen
- Secure Behaviour Framework
- Navigating the cloudy seas: CNAPPs as a cloud security compass
- When Belgium’s complexity and its maze of official websites play into the hands of fraudsters
- Exploring KBC’s journey to the cloud
- LLMs: The next frontier in cybersecurity?
- A holistic approach to application security
- A Quick Guide to Privacy by Design in the SDLC
- The Evolving Role of the CISO: Insights from Cybersec Europe 2024
- Laurie-Anne Bourdain and representativeness in cybersecurity
- Application Security 2024
- DMA and DSA: Two new European regulations
- Websites: are they safe?
- GRC: Be Connected! 2024
- GRC Be Connected 2024: Securing tomorrow’s digital landscape
- Safeonweb@work: Free cybersecurity for Belgian businesses and professional organizations
- Unlocking The Future of Legal Defence in Cyberspace
- White Paper Enterprise Security Architecture
- Improving the world’s cyber resilience
- Ten Key Insights for Informed Cyber Oversight
- Who will be the next victim?
- Unlocking Europe’s Cybersecurity Future with Pascal Steichen, Chair of the ECCC
- Protect your cryptocurrency from cybercriminals
- Cryptocurrencies: The fraudster and the charlatan
- Miguel De Bruycker looks back and forward on the Belgian cybersecurity landscape
- Privacy and DPIA, a tough challenge
- 30 November: Computer Security Day: Karen Spärck Jones
- BE-CYBER 2023 – Embrace the Next Frontier
- Phishing, the devil’s in the details
- Don’t be duped by investment fraudsters
- MolenGeek: making cyber security training available for all young people
- European Union’s complexity as an obstacle for 5G
- 5G versus 4G: an introduction to security and network architecture
- Avoid viruses while browsing and downloading
- Scams: when fraudsters ask you for money and you give it to them..
- Passwerk’s SOC training offers a new way to engage people on the autism spectrum in the cyber security labour market
- VPN: Between lies and truths
- Women4Cyber Belgium: UNCOVER aims to detect and extract hidden information in digital media
- Social impact school BeCode offers free cyber security training
- Women4Cyber Belgium: Cyber resilience: from policy to process to technology
- Application Security 2023
- Physical security keys: are they really useful?
- Self-employed and cybersecurity: minimum security for maximum protection
- Theft of our personal data: to which risks are we exposed
- ChatGPT and online security: should we fear AI?
- Artificial intelligence and business security: there is hope for entrepreneurs
- “The secure account”, a concept created by fraudsters
- Cybersecurity and e-commerce: ask the right questions
- The safety of connected devices
- The end of phishing
- Passkey: a world without passwords and phishing
- Cookies: the good, the bad, the less bad
- Approach’s Annual Penetration Testing Report
- GRC Be Connected 2023: Are policies your best cybersecurity ally?
- Every woman in cyber should be an ambassador
- Women in Cyber: an economic imperative
- Women4Cyber Belgium – International Women’s Day 2023
- Major General Michel Van Strythem presents Belgium’s Cyber Command
- Cyber Incident Roadmap
- EU Cybersecurity Certification Schemes
- The NIS2 Directive: A high common level of cybersecurity in the EU
- Cyber Resilience Act in a nutshell
- Data Protection in a Nutshell
- CyberFundamentals Framework
- 30 November: Computer Security Day: Amazing Grace
- Cyber Security Guide for SME
- BE-CYBER 2022
- All EU Data Regulations You Need to Know About!
- Clicking OK is not always OK
- Cybercriminals are professionals: it is better to take them seriously
- Do you want to know how scammers steal cards?
- Why you need to train your employees in cybersecurity
- 3 steps to set up your cybersecurity strategy
- Is my phone spying on me?
- The EU Cybersecurity Act: Shaping Belgium’s digital future
- The NIS-2 directive revision
- The challenges of NIS-2
- Application Security 2022
- Guide pratique : la cybersécurité pour les écoles
- Don’t give cybercriminals a chance, prepare your business for cyberattack
- Cryptocurrency fraud
- CyberWal, for a cybersecure Wallonia
- Digital Inclusion and Cybersecurity
- NIS-2: Where are you?
- SANS Experience Sharing Event
- OT/ ICS Focus Group: Manufacturing (In)security
- AON 2022 E&O and Cyber Market Overview
- She Leads Tech – Diversity in cybersecurity – GRC: Be Connected!
- How governing boards address the digital challenge (or not)? – GRC: Be Connected!
- Why a culture of privacy is essential for building an effective cyber governance – GRC: Be Connected!
- Why security culture needs to be driven outside-in – GRC: Be Connected!
- The Physical Security Paradox – GRC: Be Connected!
- Risk Identification: My Recipe for Success — GRC: Be Connected!
- COBIT – Governance, Risk, Compliance & Security – GRC: Be Connected!
- Passwords for sale on the dark web
- Fake Friends Fraud on Whatsapp
- Privacy Focus Group – Practical AI Use Cases
- Reporting Cyber Risks to Boards
- Invoice Fraud
- Break the Bias – International Women’s Day 2022
- International Women’s Day – Break the Bias
- The evolution of phishing
- Cybersecurity in the Belgian Manufacturing Industry
- The Safeonweb app
- Prime Minister Alexandre De Croo on Belgium’s cybersecurity strategy
- The Dark Web – Insights in Cyber Security Threats
- “Cybersecurity is our right to privacy and our democracy”: an inspiring message of our Prime Minister Alexander De Croo
- 30 November: Computer Security Day: Ada Lovelace
- The evolving role of the CISO in line with executive management expectations – BCSC 2021
- State-of-the-art cybersecurity technology – BCSC 2021
- Data protection and privacy related implications of a migration to the cloud – BCSC 2021
- BCSC 2021 Roundtable: Data protection and privacy-related implications of a migration to the cloud
- BCSC 2021 Roundtable: The state-of-the-art cyber security technology
- BCSC 2021 Roundtable: The evolving role of the CISO in line with executive management expectations
- Privacy Focus Group: AI and Data Protection
- A.I. and Data Protection – Privacy Focus Group
- Be smarter than a hacker
- The Dark Web
- The Safeonweb app
- API Security
- API Security
- A.I.: Basic Concepts & Regulatory Trends
- Privacy Focus Group: AI : Basic concepts and regulatory trends
- The central role of identity security in todays security challenges
- Privacy Focus Group: A question requires an answer – DPO Connect
- Privacy Focus Group: DPO and CISO – two ‘hats’ for one person… or not?
- Financial mules
- The DSP Supervisory Strategy of the Federal Public Service Economy
- Start with Cybersecurity: the Basics
- Fraud on second-hand websites
- The Microsoft Scam
- Smishing
- Beware of investment and credit fraud
- The Nigerian Fraud
- The NIS-2 Directive: NIS with teeth? Or biting off more than we can chew?
- The NIS.2 Directive: NIS with teeth? Or biting off more than we can chew?
- Dating Fraud
- Do’s and don’ts for the set-up of your whistleblowing system
- Cyber Talk: Do’s and don’ts for the set-up of your whistleblowing system
- The EU Cybersecurity Act: moving forward
- Threat modelling a Wind Farm
- How do data protection rights fare in Corona times?
- How do data protection rights fare in Corona times?
- International Data Transfers: acting on Brexit and Schrems II
- Antivirus on your smartphone
- Architecture Best Practices for DDoS Mitigation and Forensics
- Text messages infecting our smartphone
- Cyber Diplomacy
- EU Cybersecurity Act: moving forward
- Two-factor authentication
- International Data Transfers – Acting on Schrems II & Brexit
- Information Security Management – GRC: Be Connected!
- GRC: Be Connected! – Information Security Management
- Yves Schellekens (Agoria): ‘Working in a cyber-secure manner must be part of the company culture’
- GRC: Be Connected! – Turning audit into enablement
- Turning Audit into Enablement – GRC: Be Connected!
- GRC: Be Connected! – Information Security Governance
- Information Security Governance – GRC: Be Connected!
- Automated attack surface management
- Risk Management – GRC: Be Connected!
- GRC: Be Connected! – Risk Management
- Our passwords serie
- Certificate of Cloud Auditing Knowledge (CCAK), OpenStack, Terraform & Cloud Presence Scorecards
- Cyber Talk: Insight in an Advanced Ransomware Attack
- Cybersecurity Activities & Knowledge – GRC: Be Connected!
- Insight in an Advanced Ransomware Attack
- GRC: Be Connected! Cybersecurity Activities & Knowledge
- Secured bank account fraud
- Bank card phishing
- Phishing
- Lustrum Cyber Talk with Marc Goodman – 8 December 2020
- Are Cookie banners indeed compliant with the law? – Webinar 3 December 2020
- Are cookie banners indeed compliant with the law? – Privacy Focus Group
- How to implement a Coordinated Vulnerability Disclosure Policy/ Bug Bounty programme?
- Cyber Talk: How to implement a Coordinated Vulnerability Disclosure Policy/Bug Bounty Programme for your organization? – 26 November 2020
- Endpoint Detection & Response and the Feedback Loop – Webinar 25 November 2020
- Endpoint Detection & Response and the Feedback Loop
- Policy Guide about CVDPs in Belgium
- Cookies, all you need to know – Webinar 19 November 2020
- All you need to know about Internet cookies – Privacy Focus Group
- Passwords are a thing of the past
- MITRE ATT&CK Workshop
- The DSP Supervisory Strategy of the Federal Public Service Economy – Webinar 7 September 2020
- SME Security Scan
- Interactive Cyber Security E-Learning
- Cyber Security KIT
- Contact tracing apps: balancing public health and personal privacy
- Cyber Talk: Contact tracing apps: balancing public health and personal privacy – 30 June 2020
- Incident Response in the Cloud – Webinar 29 June 2029
- Incident Response in the Cloud
- The Top 10 Focus Points for Security in 2020
- The Top 10 Focus Points for Security in 2020 – Webinar 26 June 2020
- GDPR Two-Year Anniversary: The importance of Privacy as a human right – Webinar 25 June 2020
- The importance of Privacy as a human right
- Security Operations in the Cloud – the AXA experience – Webinar 24 June 2020
- Security Operations in the Cloud
- GDPR Two-Year Anniversary: European Self-Sovereign Identity Framework – Webinar 23 June 2020
- Empower citizens to control their own data/identity with the European Self-Sovereign Identity Framework
- The legal aspects of Cloud computing
- Cyber Talk: After the hack – be prepared with this First Aid legal toolkit – 18 June 2020
- After the hack: be prepared with this First Aid Legal Toolkit
- Assume breach, Microsoft’s approach and experience on Cloud Security – Webinar 15 June 2020
- Assume breach, Microsoft’s approach and experience on Cloud Security
- Operationalizing NIS in digital infrastructures: a testimonial from DNS Belgium – Webinar 11 June 2020
- NIS Implementation: A testimonial from DNS Belgium
- ESA FG – Webinar API Security ING
- GDPR Two-Year Anniversary: The Right to be forgotten is not absolute – Webinar 9 June 2020
- The ‘Right to be forgotten’ is not absolute
- The Impact of Digital Transformation on Security
- GDPR Two-Year Anniversary: How to collect consent without creating consent fatigue? – Webinar 4 June 2020
- How to collect consent without creating consent fatigue?
- GDPR Two-Year Anniversary: Increase your GDPR stakeholders’ involvement – Webinar 28 May 2020
- Best practice to improve your GDPR stakeholder involvement in decision taking
- 2013: KBC, the first European financial institution to move to O365 – Webinar 27 May 2020
- KBC’s Cloud Journey
- GDPR Data Clean-up
- Common API Security Pitfalls
- Don’t share your personal bank codes via a link
- Beware of phishing related to the COVID-19
- Experience Sharing Day on Application Security – 12 March 2020
- NIS Focus Group – 3 March 2020 – Operationalizing the NIS Directive: a transport sector case study
- Privacy Focus Group – 18 February 2020 – DPA in favour of cooperation with CSC
- Cloud Security Focus Group – 16 December 2019 – SaaS security & compliance management challenges
- ESA focus group – 27 November 2019 – ESA Practice and API Security Architecture
- NIS workshop – 26 November 2019 – Operationalizing the NIS Directive in the water distribution industry
- Privacy focus group – 19 November 2019 – Abide by the DPO’s advice; Assess the severity of a breach
- La météo cyber-criminelle – Stand van zaken cybercriminaliteit
- Relax! And think twice before clicking on a link
- How to avoid online financial scams
- Boost your digital health
- Identify suspicious messages before it’s too late
- Take Back the Internet
- Incident Management Guide
- Password phrase
Who's Who
Members in the picture
- Alex Driesen & Sebastien Deleersnyder
- Alexandre Pluvinage
- Axel Legay
- Benoit Hucq & Jeremy Grandclaudon
- David Vanderoost
- Fabrice Clément
- Fabrice Wynants
- Frank Souffriau
- Geert Baudewijns
- Isabelle Marchand & Patrick Wynant
- Jan Leonard
- Jef Cools
- Jeroen Fiers & Patrick Hauspie
- Jonas Buyle & Wouter Decruy
- Joris Pinoy
- Kurt Ceuppens
- Kurt Gielen
- Marc Vael
- Nathalie Ragheno
- Pascal Rogiest
- Rigo Van den Broeck
- Séverine De Potter
- Simen Van der Perre & Wim Van Langenhove
- Thibaut Roisin
- Thijs Braem
- Thomas Declerck
- Ulrich Seldeslachts
- Yuri Bobbert
Who's Who
People
- Alex Driesen
- Alexandre Pluvinage
- Anse Keisse
- Arnaud Recko
- Axel Legay
- Bart Preneel
- Bavo Boutsen
- Benoit Hucq
- Benoît Montens
- Benoît Moreau
- Björn Crul
- Bojan Spasic
- Cathy Suykens
- Christian Mathijs
- Clarence Pinto
- David Vanderoost
- Dirk Buysse
- Dirk Valcke
- Eric Van Cangh
- Fabrice Clément
- Fabrice Wynants
- Filip Herman
- Frank Souffriau
- Geert Baudewijns
- Georges Ataya
- Gunther Penne
- Guy Hofmans
- Guy Kindermans
- Henk Dujardin
- Isabelle Marchand
- Iva Tasheva
- Jan De Blauwe
- Jan Léonard
- Jan Populaire
- Jef Cools
- Jeremy Grandclaudon
- Jeremy Schmidt
- Jeroen Fiers
- Jo De Brabandere
- Jo Van Damme
- Johan Kestens
- Jonas Buyle
- Joris Pinoy
- Kameliya Stoeva
- Karim Azer-Nessim
- Karine Goris
- Karl Dobbelaere
- Kris Vermeulen
- Kurt Berghs
- Kurt Ceuppens
- Kurt Gielen
- Laurie-Anne Bourdain
- Lieven Desmet
- Marc Vael
- Meenakshi Sundaram
- Michael Boeynaems
- Nathalie Claes
- Nathalie Ragheno
- Noëmie Honoré
- Olivier De Visscher
- Pascal Champagne
- Pascal Rogiest
- Patrick Hauspie
- Patrick Wynant
- Peter Debasse
- Peter Spiegeleer
- Phédra Clouner
- Pieter Byttebier
- Rigo Van den Broeck
- Roel Peeters
- Roel Wouters
- Sam Van Hauwaert
- Saskia Van Uffelen
- Sebastien Deleersnyder
- Séverine De Potter
- Sévérine Waterbley
- Shreeji Doshi
- Simen Van der Perre
- Sofie De Moerloose
- Stéphane Vince
- Stéphanie De Clercq
- Taco Mulder
- Thibaut Roisin
- Thijs Braem
- Thomas Declerck
- Tom Swerts
- Ulrich Seldeslachts
- Vincent Haerinck
- Walter Adriaens
- Wim Van Langenhove
- Wouter Avondstondt
- Wouter Decruy
- Yuri Bobbert
- Yves Van Wassenhove