Lead when it matters most In today’s cybersecurity landscape, pressure is not the exception it’s the…
Stop Fire-Fighting. Start Securing.
Threat & Vulnerability Management: From Reactive Fire-Fighting to Proactive Security Discipline Date · 25.03.2026 It’s hard…
DPO in 2026: Are you already AI-proof?
There is no escaping it: sooner or later every DPO will have AI on their plate.…
Interview with Jolien Ghyselinck on the occasion of the closing remarks of DPO DAY on 25 May
Jolien, you are DPO of a number of what are called Grant-Endowed Institutions. Those include institutions…
DPO DAY 25 May 2023 – Closing remarks
After this day, after 5 years of GDPR, the role of the DPO is still a…
DPO in the spotlight: Christa Verstraeten
In this article we want to spotlight a data protection officer based on 10 questions they…
The D in GDPR
When implementing or managing our day-to-day GDPR activities, we often look at the regulation, advice from…
Top 10 CISO Challenges: What to Expect and How to Prepare
In the ever-evolving world of cybersecurity, a CISO’s role is anything but static. The responsibility that…
The Competitive Edge of Privacy by Design in Product Development
Data privacy is becoming increasingly important for businesses in gaining the trust of their customers. Companies…
Every IT environment requires a secure architecture to withstand the cyber threat. How can you build…
5 tips to run GDPR compliant marketing campaigns
The marketeers’ playing field witnesses the birth of a new platform or tool almost every week,…