Overview Next training
Are you a busy CISO and find it challenging to keep up with all the new trends? Or have you recently been trained in the subject matter and find yourself lacking clarity regarding the trends? DPI has the training for you that will keep you ‘on track: Stay Tuned as a CISO.
This formula* offers the ideal opportunity to stay up-to-date as a CISO constantly. Each quarter, during this training, we continue to build upon two CISO modules from DPI’s certification path in light of current events. With this subscription formula, you get four training days in one year. During each training day, we zoom in on two topics that are current trends in the world of IT security.
The instructors for Stay Tuned are carefully selected by DPI based on their expertise and didactic talents.
With Stay Tuned as CISO, we are building on our CISO certification training. We zoom in on the various modules covered in this training, specifically:
- First Quarter
- Security Governance & Compliance
- Security Architecture
- Second Quarter
- Secure System Acquisition & Development
- Security Operations
- Third Quarter
- Threat & Vulnerability Management
- Leadership
- Fourth quarter
- Stay updated on regulations, digital trends, and threat landscapes
- CISO case study
CISO, stay tuned, is not a course for beginners. We build on the knowledge acquired in the CISO certification training. Each domain is further explored based on the very latest trends, threats and best practices.
Why take this training?
- You have completed the CISO training (or equivalent through experience), but are interested in more;
- You don’t have the time to follow all the important developments yourself;
- You wish to be constantly updated on what is going on in the world of CISOs.
Target group
This course is aimed at CISOs. Participants in this course should have at least a basic understanding of the main principles in the domains cited above, as covered in the CISO certification course.
Learning Objectives
- Keep abreast of all new trends and techniques;
- Deepen and broaden knowledge;
- Gain an overview of what experts and other CISOs perceive as good practices;
Our didactic approach to this training
This training takes place in a training room in a hotel.
Each training day is taught by at least two speakers and a moderator. Each speaker is a top expert in his or her field.
There is interaction with the group during the training.
Each trainee receives a printed version of the training materials with space for taking notes. In addition, the information (including the recordings) is made available in a digital learning platform. For all knowledge items, the instructor refers to real-life examples.
Final product
This training does not include an exam. The student will receive a certificate of attendance after the training.
How to prepare yourself
Prior knowledge: CISO certification or equivalent.
You do not need to prepare anything before this course except for a refresher on the key fundamentals in the areas to be covered.
It is possible to forward questions in advance. These will be addressed during the training to the extent possible and consistent with the format.
For more info on our instructors, please click here.
Our CISO advisor board members are listed here.
*Subscription Stay Tuned as CISO
This formula entitles you to four one-day trainings, to be followed in four consecutive quarters in English at Novotel Brussels City Center. This subscription is tacitly renewed after one year unless the holder proactively stops it at the latest one month before the end of the subscription.
Session Q1 2026
February 9 – Park Inn by Radisson Brussels Airport
- Securing AI based solutions | Stefaan Van daele & Koen Simoens
As security architect it could be challenging to cope with the fast-evolving AI based solutions though the classic checks and balances still apply.
In this session we provide a methodological approach to analyse and design security for the AI solutions used in your organisation. The approach is built on the OWASP GenAI Security Project and will provide you step by step guidance. Also, some common attack vectors to GenAI solution are reviewed together with possible mitigations. Also, some extra focus will be put on securing AI agents as seems to be both the most common solution approach as well one of most important attack surfaces of the AI solutions.
- Post‑Quantum Cryptography: Why CISOs Must Act Now | Sarah Ampe
Quantum computing will break today’s cryptography, and attackers are already aiming to exploit this today. This session explains the threat, why it matters and what the solution can be. Post-quantum cryptography mitigates the risks introduced by quantum computing but brings its own challenges. Hence, we will focus during this session on practical steps for CISOs to build a quantum‑safe roadmap.
- CISO legal frameworks | Peter Van Dyck
Join this interactive Case-Based Learning Lab, where participants work hands-on with Peter Van Dyck to explore the practical application of legal-tech frameworks.
Starting from real-life cases as they might be presented to a CISO, participants collaboratively analyse challenges and develop concrete solutions.
The session focuses on translating theory into actionable practice.
By the end of the workshop, participants will leave with clear guidelines, practical insights, and tools to support the daily work of a CISO.
Session Q2 2026
May 21 – Park Inn by Radisson Brussels Airport
OWASP ASVS for CISOs | Daniel Cuthbert The OWASP Application Security Verification Standard (ASVS) is a cornerstone for web application security, yet its strategic value for leadership is often overlooked. In this session, Daniel Cuthbert explores how CISOs can leverage ASVS to define security requirements, improve software supply chain resilience, and establish a measurable framework for application security. Moving beyond the technical checkboxes, we focus on how to integrate ASVS into your security strategy to drive consistent and verifiable results.
Legal Cyber Landscape: 10 Years of GDPR, NIS2 & The Cybersecurity Act | Hans Graux As we mark the 10th anniversary of the GDPR, the regulatory landscape for CISOs continues to mature and expand. Hans Graux provides a strategic update on this evolving framework, reflecting on a decade of data protection enforcement and current case law trends. We then shift focus to the European Commission’s “cybersecurity package” of January 2026: the revision of the EU Cybersecurity Act—strengthening supply chain resilience and certification—and the new proposal to refine NIS2 for better alignment and simplified compliance. This session offers practical insights on how to integrate these diverse legal requirements into a single, cohesive security strategy.
Physical Security & IoT in a Cyber World | Stefaan Bolle While digital threats often dominate the headlines, the physical security of infrastructure remains the first line of defense. Stefaan Bolle discusses the critical convergence between physical security, hardware integrity, and the rapidly expanding Internet of Things (IoT) ecosystem. This session covers the modern threat landscape for data centers and corporate sites, the specific vulnerabilities introduced by connected IoT devices, and why a CISO’s strategy is incomplete without robust physical access controls. We conclude with practical insights on how to bridge the gap between “bits, bricks, and sensors.”
Session Q3 2026
September 17 – Park Inn by Radisson Brussels Airport
Communication & Metrics for CISOs | Tom Gilis Effective cybersecurity is as much about clear reporting as it is about technical controls. In this session, Tom Gilis, Global CISO at UCB, explores how leadership can bridge the gap between complex security data and strategic business objectives. Leveraging his extensive experience in both technical research and executive governance, Tom shares how to move beyond “gut feeling” to a data-driven security posture that resonates at the board level. Building on his work with international expert groups, Tom deepens the discussion during the Metrics Workshop. This hands-on segment focuses on defining impactful Key Risk Indicators (KRIs) and KPIs that track improvement over time, rather than just static compliance. From navigating NIS2 requirements to measuring the resilience of OT and AI environments, participants will learn how to build a communication framework that fosters trust, justifies investment, and drives a proactive security culture across the entire organization.
Update on Regulation & Standards | Karl Dobbelaere As the digital regulatory landscape matures into a phase of active enforcement, CISOs must navigate an increasingly complex web of European and national mandates. In this session, Karl Dobbelaere provides a strategic deep dive into the practical implications of the latest standards and the evolving oversight by the Belgian authorities. Drawing on his extensive experience in governance, Karl explores how organizations can transition from mere compliance to a robust, standards-based resilience model.
Threat Casting: Strategizing for the Unforeseeable | Fadwa Rachi While traditional risk management focuses on known vulnerabilities, Threat Casting enables CISOs to anticipate and disrupt systemic risks ten years into the future. In this session, Fadwa Rachi moves beyond theory to demonstrate how this multidisciplinary methodology identifies the convergence of AI, quantum computing, and shifting geopolitics. We focus on transforming “future fictions” into actionable security controls that your organization can implement today to build long-term resilience.Drawing on her expertise in strategic innovation, Fadwa leads a Practical Threat Casting Lab. Participants will engage in back-casting exercises to identify early warning indicators and “flags” that signal a shift in the threat landscape. This hands-on approach moves security from a reactive posture to a strategic business enabler, providing a concrete toolkit for leadership to visualize, track, and mitigate the sophisticated adversaries of the next decade.
Session Q4 2026
November 26 – Park Inn by Radisson Brussels Airport
Leadership: Attracting & Retaining Talent | Koen Van Brussel & Karine Goris The global cybersecurity talent gap is no longer just an HR issue; it is a critical bottleneck for strategic security delivery. In this session, Koen Van Brussel and Karine Goris move beyond the “war for talent” rhetoric to explore practical leadership strategies for building and sustaining high-performing teams. Leveraging their combined experience in executive leadership and organizational culture, they dive into the human-centric side of the CISO role—balancing technical excellence with emotional intelligence. Through a Leadership Interactive Lab, Koen and Karine provide a hands-on toolkit for identifying non-traditional talent and creating a “security-first” culture that discourages burnout. We focus on specific retention drivers, such as continuous learning pathways and purpose-driven work, to ensure your experts stay engaged in an aggressive headhunting market. This session offers actionable insights on how to evolve your leadership style to become a talent magnet, ensuring your team remains resilient and aligned with the organization’s long-term objectives.
CRA: Why Even Your Fridge Might Need a Lawyer | Pedro Démolder & Maxim Baele The Cyber Resilience Act (CRA) marks a seismic shift in product liability, moving cybersecurity from an afterthought to a legal prerequisite for any “product with digital elements.” In this session, Pedro Démolder and Maxim Baele break down the practical impact of this regulation on the entire supply chain. From smart appliances to industrial sensors, they explore how the CRA redefines duty of care and what it means for CISOs who must now govern the security of hardware and software they didn’t even build. In this CRA Readiness Workshop, Pedro and Maxim move beyond the legal jargon to provide a hands-on compliance roadmap. We focus on the “CE marking” requirements, vulnerability reporting mandates, and the mandatory support periods that will soon dictate procurement and development cycles. This session offers a pragmatic toolkit for identifying which products in your inventory fall under the CRA’s high-risk categories and how to build a defensible compliance strategy before the enforcement deadlines hit.
IR: Ransomware Playbook | Robin Bruynseels When a ransomware attack hits, the technical response is only half the battle; the real challenge lies in the rapid-fire decision-making required under extreme pressure. In this session, Robin Bruynseels moves beyond theoretical incident response to provide a battle-tested roadmap for modern extortion scenarios. Drawing on his frontline experience, Robin explores how CISOs can move from reactive firefighting to a structured, playbook-driven approach that minimizes downtime and protects the organization’s reputation. This IR Crisis Simulation focuses on the practical execution of a ransomware playbook, from initial containment to the high-stakes world of negotiation and recovery. We dive into the critical “first 48 hours,” examining how to align technical forensics with legal, communication, and executive requirements. Participants will leave with a concrete toolkit for validating their own playbooks against current adversary tactics, ensuring that when the “when” finally happens, the organization is ready to respond with precision rather than panic.
AI & Data Act Deep Dive | Peggy Valcke With the AI Act now in full effect and the Data Act reshaping how industrial data is shared, the CISO’s remit has expanded from securing infrastructure to governing algorithmic integrity and data interoperability. In this session, Prof. Dr. Peggy Valcke explores the intersection of these landmark regulations, providing a strategic roadmap for navigating the “blue wall” of EU digital governance. Drawing on her role at BIPT and her academic expertise at KU Leuven, Peggy breaks down how these rules move beyond mere privacy to mandate technical robustness and systemic safety.
Price
€2.215
VAT exclusive
The price is for 4 sessions in total and includes lunch, coffee, refreshments and course materials at each session.
SME Portfolio - higher intervention for CYBERSECURITY theme: 45% for small and 35% for medium enterprises.
Book a Call
Annual subscription
Name
Date
Location
Language
Register