
{"id":18812,"date":"2025-11-14T13:08:34","date_gmt":"2025-11-14T12:08:34","guid":{"rendered":"https:\/\/www.dp-institute.eu\/?p=18812"},"modified":"2025-11-14T13:08:34","modified_gmt":"2025-11-14T12:08:34","slug":"q4-2025-stay-tuned-as-security-leader-program-details","status":"publish","type":"post","link":"https:\/\/www.dp-institute.eu\/nl\/q4-2025-stay-tuned-as-security-leader-program-details\/","title":{"rendered":"Q4 2025 Stay Tuned as Security Leader &#8211; Program details"},"content":{"rendered":"<h2>Course program<\/h2>\n<h3 class=\"sc-agenda-tab-day-title\">December 8th \u2013\u00a0Novotel Brussels City Center<\/h3>\n<ul>\n<li><strong>Executive crisis command: CISO leadership in a cyber resilience simulation<\/strong>,<br \/>\ninteractive roleplay by <a href=\"https:\/\/www.linkedin.com\/in\/%F0%9F%9B%A1%EF%B8%8F-kian-bayat-%F0%9F%A7%A9-030b9677\/\" rel=\"nofollow noopener\" target=\"_blank\">Kian Bayat<\/a> &amp; <a href=\"https:\/\/www.linkedin.com\/in\/egide-nzabonimana\/\" rel=\"nofollow noopener\" target=\"_blank\">Egide Nzabonimana<\/a> (ISACA).<\/li>\n<li><strong>Digital trust by design: how CISOs build assurance programs from business risk scenarios?<\/strong><br \/>\nby <a href=\"https:\/\/www.linkedin.com\/in\/markthomas8\/\" rel=\"nofollow noopener\" target=\"_blank\">Mark Thomas<\/a>, President, Escoute Consulting, ISACA Hall of Fame.<\/li>\n<li><strong>How to bring cyber \/ information security to the agenda of the board?<\/strong><br \/>\nby <a href=\"https:\/\/www.linkedin.com\/in\/thomas-colyn-6b83b6164\/\" rel=\"nofollow noopener\" target=\"_blank\">Thomas Colyn<\/a>, CISO DPG Media<\/li>\n<\/ul>\n<h3 class=\"sc-agenda-tab-day-title\"><a href=\"https:\/\/www.dp-institute.eu\/nl\/stay-tuned-as-security-leader-programma\/\">Register for a free trial session!<\/a><\/h3>\n<hr \/>\n<h3>Morning<\/h3>\n<p><strong>Executive Crisis Command: CISO Leadership in a Cyber Resilience Simulation<\/strong><\/p>\n<p>How prepared are you to steer your organization through the chaos of a cyber crisis? Join us for an <strong>interactive, role-playing simulation<\/strong> designed exclusively for the CISO community.<\/p>\n<p>In this immersive workshop, you\u2019ll take the seat of an executive leader facing a fast-moving cyber incident. Together with peers, you\u2019ll <strong>experience the pressure, the dilemmas, and the critical decisions<\/strong> that determine whether your organization emerges stronger or suffers lasting damage.<\/p>\n<hr \/>\n<p>Through this dynamic exercise, you will:<\/p>\n<ul>\n<li><strong>Experience<\/strong> a realistic cyberattack scenario as part of an executive team.<\/li>\n<li><strong>Understand<\/strong> how each role\u2014CEO, CMO, Audit, CRO, CIO, and CISO\u2014shapes crisis outcomes.<\/li>\n<li><strong>See and feel<\/strong> the benefits of applying best practices in information security and digital trust.<\/li>\n<li><strong>Discover<\/strong> the impact of communication, coordination, and leadership under pressure.<\/li>\n<li><strong>Learn<\/strong> what happens when responsibilities are neglected\u2014and how resilience collapses.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>At the end of the simulation, you will leave with:<\/p>\n<ul>\n<li>A clear grasp of key cybersecurity concepts and crisis structures.<\/li>\n<li>Practical insights into the <strong>strategic role of CISOs in building digital trust<\/strong>.<\/li>\n<li>Lessons you can immediately apply to strengthen your organization\u2019s <strong>resilience and leadership culture<\/strong>.<\/li>\n<\/ul>\n<hr \/>\n<h3><strong>Why attend?<\/strong><\/h3>\n<p>Because in the digital age, trust is your most valuable asset and leadership under pressure defines it. Workshop by Kian Bayat &amp; Egide Nzabonimana (accredited trainers @ ISACA)<\/p>\n<h3>Afternoon<\/h3>\n<p><strong>Digital Trust by Design: How CISOs Can Build Assurance Programs from Business Risk Scenarios?<\/strong><\/p>\n<p>Mark is an internationally known Governance, Risk, and Compliance expert specializing in information assurance, IT risk, IT strategy, service management, cybersecurity, and digital trust.\u00a0 Mark has a wide array of industry experience including government, health care, finance\/banking, manufacturing, and technology services.\u00a0 He has held roles spanning from CIO to IT consulting and is considered a thought leader in frameworks such as COBIT, DTEF, NIST, ITIL and multiple ISO standards.\u00a0\u00a0 Mark is also a two-time recipient of the ISACA John Kuyers award for best conference contributor\/speaker as well as an ISACA Hall of Fame recipient. He is also an APMG product knowledge assessor for the CGEIT, CRISC and CDPSE certifications.<\/p>\n<p><strong>How to bring Cyber \/ Information Security to the agenda of the board<br \/>\n<\/strong><\/p>\n<ol>\n<li>Relationship Information Security &#8211; Board<\/li>\n<li>How to build a \u2019supported\u2019 Information Security strategy<\/li>\n<li>Actionable IT Risk Mgt<\/li>\n<li>IT Risk Ownership<\/li>\n<li>Translation IT Risks to actionable roadmap items<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>By Thomas Colyn, CISO DPG Media<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course program December 8th \u2013\u00a0Novotel Brussels City Center Executive crisis command: CISO leadership in a cyber resilience simulation, interactive roleplay by Kian Bayat &amp; Egide Nzabonimana (ISACA). Digital trust by design: how CISOs build assurance programs from business risk scenarios? by Mark Thomas, President, Escoute Consulting, ISACA Hall of Fame. How to bring cyber \/ [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[615,29],"tags":[],"class_list":["post-18812","post","type-post","status-publish","format-standard","hentry","category-ciso","category-opleidingen"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts\/18812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/comments?post=18812"}],"version-history":[{"count":2,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts\/18812\/revisions"}],"predecessor-version":[{"id":18826,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/posts\/18812\/revisions\/18826"}],"wp:attachment":[{"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/media?parent=18812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/categories?post=18812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dp-institute.eu\/nl\/wp-json\/wp\/v2\/tags?post=18812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}