Public speaking
Empowering a brighter future ✨
I drive change through strategic discussions and technical deep dives. While still focused on other initiatives, I’m open to exploring speaking opportunities again. Reach out anytime.

Quantum computing and its impact on cybersecurity
Quantum computers perform calculations exponentially faster than our current computers, potentially threatening the security of our digital, encrypted communications, such as online banking. So, how can we prepare for the future?
Quantum computing and its impact on cybersecurity
Today, at 12:15 PM CEST, I’ll bring you up to speed on current developments such as ‘post-quantum’ cryptography and quantum key distribution (QKD), as well as opportunities in cybersecurity to enhance threat detection and enable more robust defence mechanisms.
Join me at #RISK digital to examine the changing risk landscape and make quantum part of your long-term cyber strategy.
This event already took place.
Constructing an effective privacy initiative for measurable outcomes
There is no ‘one-size-fits-all’ approach to privacy. After all, privacy is contextual, subjective, and culturally influenced. So, how can we construct an effective privacy program with meaningful key performance and risk indicators?
Constructing an effective privacy initiative for measurable outcomes
Today, at 12:30 PM CET, I’ll share why we need to pivot our privacy programs beyond mere compliance with data protection regulations. I’ll also share how organisations can build a privacy program that delivers measurable and impactful outcomes.
Join me for Global Privacy Day from the comfort of your own (home) office.
This event already took place.
ChatGPT: the data privacy nightmare?
ChatGPT has taken the world by storm. Within two months of its release, it reached 100 million active users, making it the fastest-growing consumer application ever—but what about the collection and (re)use of all this data?
ChatGPT: the data privacy nightmare?
Today, at 12:30 PM CET, I’ll share several concerns relating to personal data and intellectual property, what measures are said to be in place, and what the regulatory and operational future may hold to support AI language models.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
Practice what you preach: A CISO’s guide to mental health
Despite the crucial nature of well-being, it’s often neglected in the workplace. So, how can we restore prioritising people over processes and technology to increase our overall efficiency and productivity—and achieve the resilience we truly seek?
Practice what you preach: A CISO’s guide to mental health
Today, at 10:15 AM BST, I’ll dive into the importance and methods of cultivating and maintaining a psychologically safe environment, how to deal with specific stress factors, and why building relationships in the workplace goes a long way for getting people to work with you and for you.
Secure your VIP ticket to join me at the CIO + CISO Visions Summit in London.
This event already took place.
The future of privacy—what to expect in 2023 and beyond
Given the speed and developments of emerging technologies such as artificial intelligence, safeguarding the privacy of individuals across the globe has become increasingly important. So, what’s next in store for us in data protection?
The future of privacy—what to expect in 2023 and beyond
Today, at 11:00 AM CEST, I’ll update you on regulatory developments within the privacy and data protection space and what the future of privacy may hold in relation to emerging technologies. After all, we’re just getting started.
Join me at #RISK Amsterdam.
This event already took place.
Cyber Insurance—connecting the dots with a cybersecurity strategy
Insurance is the sole purchase we hope never to need. Yet, it may be critical in reducing our financial losses when shit hits the fan. So, what expenses can cyber insurance cover, and how can we fit this into our cybersecurity strategy?
Cyber Insurance—connecting the dots with a cybersecurity strategy
Today, at 2:40 PM CEST, I’ll share insights into the various components that make up cyber insurance, what we need to keep in mind (and communicate) to avoid unpleasant surprises, and how the cyber insurance market may evolve.
Join me at the Cyber Security & Cloud Expo at TechEx Europe in Amsterdam.
This event already took place.
Identity and access management in remote working: security and compliance challenges
Hybrid and remote working have gained popularity due to their numerous benefits. Yet, it also presents certain security and compliance challenges. So, how can we support these working scenarios and make them viable?
Identity and access management in remote working: security and compliance challenges
Today, at 2:45 PM CEST, I’ll share which factors contribute to increased security and compliance risks, which key considerations to make when implementing identity and access management solutions, and what the future may hold.
Join me at #RISK Digital from the comfort of your own (home) office.
This event already took place.
Decoding the CISO's mind: decision-making insights
No CISO operates alike. We can attribute this to our varying skill sets, unique context, risk appetite, organisational structure, and other factors. So, how can we make educated decisions that align with our business goals?
Decoding the CISO's mind: decision-making insights
Today, at 4:00 PM CET, I'll share my insights for informed decision-making. I'll leverage my experience within commercial environments, where meeting compliance baselines and objectives, such as building (consumer) trust, must ultimately lead to increased revenue.
Join me at the Cyber Together Xtra Mile live stream, where I'll share my distinctive insights.
This event already took place.
A playbook for new CISOs: identifying the quick wins and avoiding missteps
Stepping into the role of a CISO requires quick action to meet numerous demands and expectations. So, what shortcuts can we take to promptly boost an organisation’s security posture and effectively contribute to its success?
A playbook for new CISOs: identifying the quick wins and avoiding missteps
Today, at 10:30 AM GMT, I’ll share ways to identify, shape and prioritise your security agenda, get this across to stakeholders, and stay sane amid the rapidly evolving digital landscape.
Join me for my best tips & tricks for getting started as a CISO at the European Information Security Summit in London.
This event already took place.
How challenging have data protection and privacy become?
A universal solution to data protection and privacy doesn’t exist. Moreover, getting it ‘right’ requires ongoing thought to various changing contextual factors, including individuals’ preferences. Is it even possible to piece this all together?
How challenging have data protection and privacy become?
Today, at 2:00 PM CET, I’ll shed light on several factors that drive diverse data protection and privacy needs, why these require our ongoing attention and support, and how to aim for the ultimate sweet spot.
Join me on the ever-evolving challenges within the privacy realm to commemorate this year’s Global Privacy Day.
This event already took place.
Getting started on your Zero Trust journey
A ‘zero-trust’ approach to cybersecurity is touted as a potential solution to enhance enterprise security. However, taking on Zero Trust can be overwhelming. So, how can we dip our toes in the water and steer towards a rewarding experience?
Getting started on your Zero Trust journey
Today, at 3:20 PM CET, I’ll share what steps we can take to get started and how to gradually move beyond the traditional network principles in a controlled way—strategising the “never trust, always verify” philosophy.
Join me at the Cybersecurity Leadership Summit in Berlin.
This event already took place.
Adopting a prevention-first approach to security
Working alongside instead of against each other is crucial to fostering safety in the broadest sense possible. That said, under the Chatham House Rule, I invite you to come and discuss how to adopt a prevention-first approach to security.
Adopting a prevention-first approach to security
Today, at 3:30 PM CET, I’ll kick off and warm up the stage for security professionals willing to share their knowledge, experience, and advice on cultivating a proactive approach to security—including what not to do when it comes to people, automation, and AI. After all, sharing is caring, right?
Feel welcome to grab a seat and join our interactive group discussion at the Benelux Cyber Summit in Amsterdam.
This event already took place.
The growing skills gap in cybersecurity
Let’s face it. All business operations will inevitably merge with the digital realm that expands and transforms by the minute. So, why are we reluctant to provide essential training to those who must continue to protect our crown jewels?
The growing skills gap in cybersecurity
Today, at 3:00 PM GMT, I’ll discuss what happens if your organisation doesn’t get a grip to bridge necessary skill gaps, what methods and resources you can use to train staff, and how to cultivate a sustainable and flourishing workforce.
Join me at the latest edition of the CIO & CISO Visions Leadership Summit in London.
This event already took place.
Consumer trust, data subject rights and weaponised access requests
Following privacy principles from the outset and throughout is vital for trust. Yet, many organisations fail to give proper care and attention to honour our fundamental right to privacy—even up to our data subject rights. Why is that?
Consumer trust, data subject rights and weaponised access requests
Today, at 1:25 PM CEST, I'll share how to follow up on such requests from start to finish, manage relevant challenges, and explain why some organisations may struggle to deliver what individuals seek.
Join me and secure your complimentary VIP ticket for Digital Trust Europe in Amsterdam.
This event already took place.
Cyber Security & Cloud Expo Europe
After attending and speaking about Zero Trust last year, I’m excited to share that I’ll be chairing this year’s edition of Europe’s leading Cyber Security & Cloud exhibition and conference in Amsterdam!
Cyber Security & Cloud Expo Europe
This week, 5.000+ attendees from across Europe will come together to learn more about the newest developments in the cyber security and cloud ecosystem—covering numerous topics around cloud security, the threat landscape, and scaling into the future.
Book your ticket for the Cyber Security & Cloud Expo World Series in Rotterdam.
This event already took place.
Privacy enhancing technologies: hype or benefits?
Privacy is more than ‘just’ a regulatory topic. To me, it’s about preserving our need for autonomy and authenticity without fear of judgement or consequence. So, how can we help protect this in an increasingly growing information society?
Privacy enhancing technologies: hype or benefits?
Today, at 5:00 PM CEST, I’ll discuss several privacy-enhancing technologies, how much of this is ‘hype,’ and what the future holds.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
The future of cybersecurity fabrics
Ransomware, state-sponsored attacks, data breaches, fraud, and black swan events increasingly dominate the news. So, where do we go from here, and do blue teams stand a chance of preventing such events?
The future of cybersecurity fabrics
Today, at 3:30 PM CEST, I’ll discuss the need for a cybersecurity fabric approach to help identify sophisticated attacks in a timely manner and the related challenges involved.
Join me at KuppingerCole Live for the discussion on protecting our ecosystem.
This event already took place.
Getting taken seriously in the workplace as a privacy professional
It’s unsettling when we don’t get heard, particularly when we’re the people’s voice for privacy and data protection needs. So, how can we get our message through—one that resonates and leads to action?
Getting taken seriously in the workplace as a privacy professional
Today, at 8:00 PM CEST, I’ll be setting the stage to exchange experiences, tips, and tricks that may aid us in overcoming such challenges. After all, every little ‘win’ in privacy and data protection is a victory for us all, particularly in this day and (digital) age.
Join me at the Women Leading Privacy Roundtable to reclaim the power-equal relation.
This event already took place.
GRC women sharing advice on success and progression
Nobody has all the answers nor always gets it right the first time. Besides, if you were to ask me, perfection isn’t thrilling. On the other hand, being able to deliver in the end is. So, why not simply enjoy our ride?
GRC women sharing advice on success and progression
Today, at 4:00 PM CEST, I'll share my experience and advice to those looking at developing a career in the GRC space, including that, if anything, we're never failing but succeeding slowly.
Join me for this Women in Governance, Risk and Compliance webinar.
This event already took place.
Microservices FinSec Foundations: Security Agenda
Even though money isn’t the key to happiness, it does enable us to address our basic needs. As such, suddenly finding yourself being a victim of financial fraud and losing your security blanket can be a beyond terrifying experience.
Microservices FinSec Foundations: Security Agenda
Today, at 10:45 AM CEST, I’ll discuss ways to deliver secure online financial services and why a microservice architecture may be particularly appropriate.
Join me at FinSec 2022, where I'll share takeaways from my former experience securing a cryptocurrency exchange.
This event already took place.
Measuring the effectiveness of your security awareness program
Many of us are creatures of habit. Yet, repetitive practices may render us less attentive in the information security realm. So, how can we measure our effectiveness in keeping each other on our toes with our security awareness efforts?
Measuring the effectiveness of your security awareness program
Today, at 5:00 PM CEST, I’ll explore methods for testing and evaluating security awareness and measuring this stance within organisations.
Join me for this teissTalk episode to discuss what works and what doesn’t.
This event already took place.
AppSec: Striking a balance with the OWASP top 10
Poor application security is one of the leading causes of breaches. Yet, the increasing demand for rapid delivery puts pressure on developers’ secure coding practices. So, where do we draw the (base)line?
AppSec: Striking a balance with the OWASP top 10
Today, at 6:30 PM CET, I’ll unveil the ten most critical application security concerns (‘the OWASP Top 10‘) and explain why fending against them is vital for your business to flourish.
Join me at DevNetwork’s largest developer & engineering conference in Europe.
This event already took place.
Building your incident reponse plan
It’s not a matter of ‘if’ but ‘when’, isn’t it? Many of us recognise the value of keeping a stocked first-aid kit around or acting fast when facing a medical emergency. So, how can we likewise prepare and recover when a security incident strikes?
Building your incident reponse plan
Today, at 6:00 PM CEST, I’ll share my insights on incident response planning, what not to overlook when shit hits the fan, and how this aids in getting your business back on its feet as soon as possible.
Join the HUB Security discussion on building and enhancing your incident response plan.
This event already took place.
Technology isn’t enough: it’s time to turn the tables
Until Skynet becomes a reality, humankind will continue to be in control. Yet, we risk being so captivated by and dependent on leveraging technical advancements that we may lose sight of what is happening right before our eyes.
Technology isn’t enough: it’s time to turn the tables
I’ll share my take on what issues arise if security is treated as a technical problem (and not a business one), what kind of threats are caused by human errors, how to avoid these, and how to leverage a sense of community to build a more resilient organisation.
Join me today at the CISO Visions Cybersecurity Summit in London.
This event already took place.
Diversity in Privacy Mentor Q&A
Some of us associate asking someone for advice and guidance with vulnerability and weakness. Yet, if anything, isn’t it simply a commendable trait to seek ways to increase our value?
Diversity in Privacy Mentor Q&A
Today, at 4:00 PM CEST, I’ll set the stage for like-minded privacy professionals to help empower our privacy community—by talking through challenges, sharing experiences, and answering your questions.
Join me at the IAPP Diversity in Privacy Mentor Q&A for some takeaways and food for thought.
This event already took place.
Why third-party management needs re-evaluating
When done right, leveraging third-party expertise reduces costs and elevates our businesses. Yet, when managed poorly, we inherently increase our exposure to, among other things, operational risk. So, how can we strike a balance?
Why third-party management needs re-evaluating
Today, at 11:00 AM CEST, I’ll share my insights on effectively managing third-party risk and why this is paramount to drive performance and increase resilience in today’s business environment.
Join me at CISO Europe from the comfort of your own (home) office.
This event already took place.
Security and compliance in the age of data overload
Compliance does not equal adequate information security, data protection, or vice versa. Yet, in the end, all these efforts boil down to one common goal: managing risk. So, how can we unite our efforts and create a harmonious alliance?
Security and compliance in the age of data overload
Today, at 6:20 PM CET, I’ll discuss how we can manage, leverage, and future-proof our collective risk management efforts in the age of data overload.
Join me at the CISO Virtual Think Thank from the comfort of your own (home) office.
This event already took place.
Best practices to get started on your Zero Trust journey
For better or worse, the world keeps evolving. As such, attack vectors continue to expand. So, how can we continue to keep up with the changing landscape securely without sacrificing user experience—or our sanity?
Best practices to get started on your Zero Trust journey
Today, at 4:10 PM CET, I’ll share tips on getting started on a Zero Trust journey, particularly how to avoid an overwhelming experience when moving towards this architecture as a weapon of choice.
Join me at the KuppingerCole virtual event that zeroes in on making the ‘Zero Trust’ philosophy a reality.
This event already took place.
Post-pandemic: what does ‘new work’ mean?
Too often, we fail to see and understand the world through someone else’s eyes. So, how can we become more conscious of our actions (and non-actions) and be more understanding and supportive towards each other?
Post-pandemic: what does ‘new work’ mean?
Today, at 6:00 PM CET, I’ll share my thoughts on what the future of work looks like and my best tips for fostering a happier and healthier work environment.
Want to tune in and be part of the discussion? I look forward to welcoming you and extending the floor to you in our break-out rooms.
This event already took place.
DevSecOps pipeline: integrating security with DevOps
Developers instantly know there’s a problem when their code doesn’t compile (or run), a merge conflict arises, or when unit and integration tests fail—but what about likewise knowing when there’s a security issue?
DevSecOps pipeline: integrating security with DevOps
Today, at 8:00 AM CET, I’ll dive into integrating security into the DevOps pipeline—what we aim to achieve by this, where to start and ‘finish’, and how to overcome challenges.
Join me at CyberSecAsia, where I’ll also pick other industry experts’ brains for their insights and takeaways.
This event already took place.
Fundamentals of privacy for security professionals
Information security includes protecting sensitive data against misuse. Yet, too often, this somehow gets disregarded when assessing the risks of handling someone’s personal data. If anything, isn’t that beyond wildly insensitive?
Fundamentals of privacy for security professionals
Today, at 8:00 PM CET, I’ll walk us through the information privacy principles and how security professionals can use their skills to cultivate a genuinely safe environment.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
The state of the developer industry
Technological advancements enable us to pursue new opportunities—reshaping many industries and today’s society. Who knew that we’d all be holding a computer in the palm of our hand at one point?
The state of the developer industry
Today, at 9:00 PM CET, I’ll share my take on how the developer industry has evolved, what skills we need in 2022, and how to attract and maintain talent.
Join the discussion at the DevNetwork VIP Lounge (noon PST) at the world’s largest developer & engineering conference series.
This event already took place.
Cybersecurity culture in companies
We can drive change in behaviours, beliefs, and attitudes by fostering a sense of belonging–centred on acceptance, attention, and support. So, why do we often disregard this when trying to build a security culture?
Cybersecurity culture in companies
Today, at 3:15 PM CET, I’ll share why we, as security professionals, need to start listening to others and how this encourages people to do better and stimulates the intrinsic motivation behind the change we wish to see.
Join us me the VigiTrust Advisory Board programme and learn how to move from a ‘rulebook’ approach to one that sticks.
This event already took place.
Making Zero Trust a reality
Assuming all input as potentially malicious is imperative to limit injection attacks, memory leaks, and other effects that may lead to compromised systems. So, what if we’d underpin this concept as an architecture?
Making Zero Trust a reality
Today, at 4:00 PM CET, I’ll discuss the drivers of adopting this “never trust, always verify” strategy over the traditional network-centric approach, how to get started, and what the future holds for us.
Join me during the Tech Monitor livestream on making Zero Trust a reality.
This event already took place.
Deep-sea phishing: why is phishing gaining sophistication and what can businesses do?
Even the best technical measures do not guarantee a fundamentally safe environment. Nowadays, phishing has become the most common form of attack cybercriminals use. Why is this, and what can we do about it?
Deep-sea phishing: why is phishing gaining sophistication and what can businesses do?
Today, at 1:00 PM CET, I’ll explore the most common phishing tactics, why these social engineering attacks are becoming more sophisticated, and what we can do about it.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
Trust no one? Establishing Zero Trust security
Since we’ve created one big supernetwork and constantly cross different network boundaries, there is no going back. So, how do we protect our assets when the sky is our limit?
Trust no one? Establishing Zero Trust security
Today, at 10:40 AM CET, I’ll discuss how changes to our traditional perimeter have enabled a different way of thinking and impacted today’s cybersecurity strategy.
Join me at the Cyber Security & Cloud Expo in Amsterdam.
This event already took place.
A year in review: emerging cyber trends in 2021
Let’s face it. The value of data as a currency continues to unfold–or else there wouldn’t be a motive for the increased cybercrime (or privacy concerns). So, how do we enhance our response?
A year in review: emerging cyber trends in 2021
Today, at 1:30 PM CET, I’ll walk you through the current cyber threat landscape, the key trends of 2021, and share which best practices we need to adopt.
Join me at the Media Benelux Cyber Summit to (re)align our security strategies.
This event already took place.
Gaining governance benefits from utilising a Zero Trust perspective
There is no silver bullet when it comes to cybersecurity. Yet Zero Trust is often religiously portrayed as such when it comes to networks and IT infrastructure. What can we take away from this?
Gaining governance benefits from utilising a Zero Trust perspective
Today, at 12:20 PM CET, I’m going to look past the traditional hype for a moment and explore this design principle as an opportunity to revise our security governance strategy—so that we may reap its benefits without any strings attached.
Join me at the KuppingerCole Cybersecurity Leadership Summit in Berlin.
This event already took place.
Enhancing the presence of women in the cybersecurity job market
Cybersecurity has an image problem. We tend to promote it as a niche within IT instead of a risk management profession available to anyone who is intellectually curious. So, how can we fix this?
Enhancing the presence of women in the cybersecurity job market
Today, at 1:10 PM CEST, I’ll share why we need to address this now, why there is no ‘right’ path to cybersecurity, and how we can help enhance diversity in the security job market.
Join me at CISO Live Europe, where we aim to tackle tomorrow’s information security problems.
This event already took place.
Building a diverse InfoSec team and bringing value to the organisation
I don’t know about you, but I learn much from working with people from different backgrounds and diverse life experiences. So, how can we use this exposure to our advantage?
Building a diverse InfoSec team and bringing value to the organisation
Today, at 5:00 PM CEST, I’ll discuss the benefits of embracing diversity in the workplace, particularly how this resonates with information security and helps reduce blind spots.
Join me for this teissTalk episode on enabling ourselves and supporting our surroundings to grow in new ways.
This event already took place.
Not taken seriously? The challenges of managing internal and external stakeholders
A safe environment is vital to stimulate engagement and innovation. So, how do we tackle unconscious bias, avoid letting others get the best of us, and focus on what truly matters?
Not taken seriously? The challenges of managing internal and external stakeholders
Today, at 1:00 PM CEST, I’ll share how to deal with people who don’t believe you’re experienced enough (or have the correct expertise), use you as a scapegoat, and what I’d tell my younger self.
Join me at the inaugural Women in Governance, Risk and Compliance Series.
This event already took place.
Demonstrating compliance and transparency: to whom and to what extent?
My heart sank ever since a few industry ‘peers’ confessed to fabricating records for the sake of ‘compliance’. Truthfully, I didn’t expect it to be so mortifying to find out that Santa isn’t real.
Demonstrating compliance and transparency: to whom and to what extent?
Today, at 12:30 PM CEST, I’ll share my take on what compliance and transparency truly mean, their significance when approached right, and to whom and to what extent we should demonstrate compliance.
Join me at the IIR Netherlands seminar on data protection and privacy in Amsterdam.
This event already took place.
Social media data breaches: serious or just a ‘scrape’?
Digital privacy and the reach of social media continue to be a trending concern. So, where do we draw the line to avoid misuse and breaching social media users’ expectations?
Social media data breaches: serious or just a ‘scrape’?
Today, at 5:00 PM CEST, I’ll dive into the questionable realm of social media privacy, particularly the rise of scraping practices of readily accessible information.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
Securing your digital transformation with strong security
True digital transformation leaders disrupt the market with a unique business model. So, how do we support such businesses in their evolutionary journey from a security perspective?
Securing your digital transformation with strong security
Today, at 6:15 PM CEST, I’ll discuss why embracing the digital economy’s future is vital and why security (and privacy) must take on the frontrunner role to propel their business towards success.
Join our GRC TV episode, in which we will dive into what organisations need to consider to keep up.
This event already took place.
Our world has changed: The future is managed and secure networks.
Delivering simplicity, security, and service in the rapidly changing digital economy is challenging. Yet, it’s not impossible. So, how do we let go of past constraints and reemerge as winners?
Our world has changed: The future is managed and secure networks.
Today, at 6:00 PM CEST, I’ll discuss the unstoppable road to digital transformation, the future of computer networks, and leveraging managed service providers to your competitive advantage.
Join me at the Discussion Box roundtable, where we will take the time to answer any of your questions.
This event already took place.
Zero-Trust security approach
The adoption of mobile and cloud services continues to increase globally. So, how can we secure our crown jewels when we have eliminated our traditional protection borders?
Zero-Trust security approach
Today, at 6:00 PM CEST, I’ll share how to support our changing cybersecurity environment and make our organisations safer without purchasing new security products.
Join me for an esteemed panel discussion on a zero-trust approach.
This event already took place.
How can you align information security & privacy for the best possible data protection?
Privacy is (way) more than just ‘confidentiality’. Processing one’s personal information should serve—not harm—them. So, how can we help to achieve this from a security stance?
How can you align information security & privacy for the best possible data protection?
Today, I’ll share where information security and privacy meet, how they complement each other, and how to enable the best data protection.
Join me at CISO Live Europe from the comfort of your own (home) office.
This event already took place.
Data breaches: it does happen to every company, it does happen all the time—and it’s a big deal
The number of publicised data breaches continues to increase. Yet, many of us conveniently yearn to believe that such events only happen elsewhere. But isn’t that just wishful thinking?
Data breaches: it does happen to every company, it does happen all the time—and it’s a big deal
Today, at 4:00 PM CEST, I’ll discuss why we must address data breaches proactively rather than reactively, how to lower the risk of such an event, and other related affairs.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
Addressing the cybersecurity knowledge talent and workforce gaps
Building a brighter future requires us to be brave enough to set aside our Ego and be vulnerable. Working together, sharing our knowledge, lessons learned, and insights is a critical success factor.
Addressing the cybersecurity knowledge talent and workforce gaps
Today, at 9:30 PM CEST, I’ll discuss our need to be creative to address cybersecurity knowledge, talent, and workforce gaps.
Join me at C-Vision International Re:Con from the comfort of your own (home) office.
This event already took place.
How to advance your professional development
To me, being forced to pick one field of interest while denying all of my other interests is a total nightmare—following my curiosity down the rabbit hole without limits is what moves me. Sounds familiar?
How to advance your professional development
Today, at 4:00 PM CEST, I’ll share how your multipotentiality in an information security role can create a win-win situation and what truly matters to get into cybersecurity.
Join me at the Infosecurity Europe Virtual Conference from the comfort of your own (home) office.
This event already took place.
What is Zero Trust and why does it matter?
Let’s face it—a false sense of security is the only kind there is. Yet, how do we move forward managing trust in a modern (net)work environment that is increasingly becoming decentralised?
What is Zero Trust and why does it matter?
Today, at 12:10 PM CEST, I’ll discuss coming to terms with our current reality, how the concept of Zero Trust hooks into that, what this looks like in practice, and why this approach seems inevitable in the information technology industry.
Join me at the CDM Media Zero Trust Europe Summit, where I am honoured to share the stage with John Kindervag, the creator of the revolutionary Zero Trust model.
This event already took place.
Privacy engineering design and evaluation
Conceptually, privacy is relatively easy to grasp. But achieving privacy in our interconnected world is a different ballgame. So, how do you balance delivering value without compromising privacy?
Privacy engineering design and evaluation
Today, at 3:15 PM CEST, I’ll share and pick the brains of leading privacy engineers on how to engineer privacy in technologies such as AI or machine learning.
Join me at the Privacy Symposium and learn a practical thing or two about privacy engineering—from implementation to evaluation.
This event already took place.
Security and privacy by design: avoiding a ‘bolt-on’ approach
Reports consistently reveal that many organisations favour a reactive approach to security and privacy—that is, until they’ve been compromised or until regulators have stepped in. Do we truly need to be affected before the value of protecting our data becomes apparent?
Security and privacy by design: avoiding a ‘bolt-on’ approach
Today, at 11:00 AM CET, I’ll share my insights on how we can counteract apathy in risk management and reduce risks by enabling a proactive “security and privacy by design” approach.
Join me for this teissTalk episode for practical tips & tricks to take this to the next level.
This event already took place.
The role of a CISO: how to succeed as a security leader
Truthfully, trust is given—not earned. And the only way to ‘win’ is not to fall short of expectations. So, how do we stay one step ahead without compromising any (unspoken) needs?
The role of a CISO: how to succeed as a security leader
Today, at 12:30 PM CET, I’ll share my lessons learned about upholding value delivery from a supporting security function.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
Top privacy priorities for 2021
The data protection industry continues to experience a global whirlwind of numerous challenges and regulatory developments. So, how can we keep up and navigate through all of this?
Top privacy priorities for 2021
Today, at 7:00 PM CET, I’ll share my insights on staying ahead with forthcoming data protection regulations, changing consumer behaviour, and the rising focus on trust in organisations.
Join me for this webinar and revise your privacy program with useful takeaways.
This event already took place.
Best practice for incident response
A data breach can have far-reaching consequences, potentially damaging your business reputation and competitive advantage for years to come. So, how do we respond and recover from this?
Best practice for incident response
Today, at 5:00 PM CET, I’ll explore which activities are critical to managing and recovering from such a crisis, including how to execute all of these steps well.
Join me at the latest PrivSec Global edition from the comfort of your own (home) office.
This event already took place.
A practical approach to cultivating a security culture
Let’s be honest. The manifestation of threats is not necessarily a given. Yet, protecting against threats always comes with a price. So, how do we cultivate a security culture when we cannot argue a guaranteed return on everyone’s investment?
A practical approach to cultivating a security culture
Today, at 11:20 AM CET, I’ll share how I flip this switch and empower our most valuable assets with a security mindset—by bringing fun, curiosity, and controversy to the table.
Join me at the CIO/CISO Benelux Summit from the comfort of your own (home) office.
This event already took place.
Developing & maintaining secure products
Technology has come to play a vital role in our society. So, how do we adequately protect information systems to avoid significant losses—impacting today’s interconnected world?
Developing & maintaining secure products
Today, at 9:00 AM CET, I’ll share my insights on developing and maintaining fundamentally secure products from both a compliance and engineering stance.
Join me for this Masterclass Webinar from the comfort of your own (home) office.
This event already took place.
Measuring your organisation’s information security posture
Measuring against security benchmarks enables informed decision-making—but how do you ensure that your information security KPIs remain aligned with your business objectives?
Measuring your organisation’s information security posture
Today, at 11:20 AM CEST, I’ll discuss which metrics help you evaluate and mature your organisation’s information security posture—including how to set a clear structure to measure changes and overcome communication challenges.
Join me at the European Information Security Summit from the comfort of your own (home) office.
This event already took place.
Ransomware: facts, threats and countermeasures
Ransomware. It’s the only time a third party shouldn’t encrypt your private data. Sadly, recovering from such an attack is not always possible—sometimes, it devastatingly kills.
Ransomware: facts, threats and countermeasures
Today, at 10:30 AM CET, I’ll share my insights on how to best defend against and recover from ransomware attacks.
Join me at the Virtual CISO Summit for this Masterclass.
This event already took place.