CSC Logo
  • Home
  • About Us
  • Members
  • Tools
  • Calendar
  • Blog
  • Gallery
  • EN
  • Home
  • About Us
  • Members
  • Tools
  • Calendar
  • Blog
  • Gallery
  • Webcasts
  • White papers
  • Podcasts
  • Topics:
    • Application Security
    • Belgian Cyber Security Convention
    • Cloud Security
    • Community
    • Crypto
    • Cyber Awareness
    • Cyber Insurance
    • Cyber Legal Challenges
    • Cyber Security Certification
    • Cyber Talk
    • Data Protection and Privacy
    • Digital Inclusion
    • Enterprise Security Architecture
    • Governance Risk and Compliance
    • Incident Response and Security Operations
    • Network and Information Systems’ Security
    • Online Fraud
    • OT and ICS Security
    • Cybersecurity Policies

Webcasts

  • Application Security
  • Belgian Cyber Security Convention
  • Cloud Security
  • Community
  • Crypto
  • Cyber Awareness
  • Cyber Insurance
  • Cyber Legal Challenges
  • Cyber Security Certification
  • Cyber Talk
  • Data Protection and Privacy
  • Digital Inclusion
  • Enterprise Security Architecture
  • Governance Risk and Compliance
  • Incident Response and Security Operations
  • Network and Information Systems’ Security
  • Online Fraud
  • OT and ICS Security
  • Cybersecurity Policies
  • Data Protection and Privacy

The importance of Privacy as a human right

Concern over privacy has substantially increased during these unusual Corona times as authorities envisage to use digital technologies in the ...
Read more
  • Cloud Security

Security Operations in the Cloud

In his webinar Mathias Claes (AXA Belgium) shares his experience with the implementation and governance of security controls for applications ...
Read more
  • Data Protection and Privacy

Empower citizens to control their own data/identity with the European Self-Sovereign Identity Framework

A partnership of 30 EU member states and related countries cooperate in the establishment of the European Self-Sovereign Identity Framework enabling ...
Read more
  • Cloud Security

The legal aspects of Cloud computing

In this webinar you learn when a service becomes a cloud computing service from a pan-European legal perspective and which ...
Read more
  • Cyber Talk

After the hack: be prepared with this First Aid Legal Toolkit

In the legally murky world surrounding privacy and hacking, Cathérine helps you navigate the unknown and complicated paths and ...
Read more
  • Cloud Security

Assume breach, Microsoft’s approach and experience on Cloud Security

In this webinar, Bart Asnot shares his experience on how to build, handle and prepare for Cloud-based security.
Read more
  • Network and Information Systems' Security

NIS Implementation: A testimonial from DNS Belgium

In this webinar Kristof Tuyteleers elaborates on all the efforts spent by DNS Belgium in the area of security governance & ...
Read more
  • Enterprise Security Architecture

ESA FG – Webinar API Security ING

During this webinar, Patrice Krakow elaborates on a Platform API Meta-Model (Terminology) and Management API Gateway (North-South traffic) as well ...
Read more
  • Data Protection and Privacy

The ‘Right to be forgotten’ is not absolute

Also known as the right to erasure, the GDPR gives individuals the right to ask organizations to delete their personal ...
Read more
  • Cloud Security

The Impact of Digital Transformation on Security

Migrations towards public cloud are the bulk of the business for an IT integrator, since digital transformation is typically supported ...
Read more
  • Data Protection and Privacy

How to collect consent without creating consent fatigue?

The webinar explores the big issues around the (digital) consent requested from the data subject: the latter is often playing ...
Read more
  • Data Protection and Privacy

Best practice to improve your GDPR stakeholder involvement in decision taking

In this webinar you will get practical advice to improve your relationship with key stakeholders and will learn the strategic ...
Read more
  • ←
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • →
  • Privacy Notice
  • Cookie Policy
  • Disclaimer
  • Downloads
The Cyber Security Coalition uses cookies to optimize your user experience, to analyze website traffic and to enable the use of certain social media features.
Accept selection Accept all Reject all

More info about our cookie policy
Cookies management

Necessary technical cookies
Always Enabled
These cookies are placed anyway when you surf on the Coalition website.
CookieDurationDescription
cookielawinfo-checkbox11 monthsThe cookie is used to store the user consent for the cookies.
cookielawinfo-checkbox-analytical-third-party1 yearThis cookie is set by GDPR Cookie Consent plugin. The purpose of this cookie is to check whether or not the user has given their consent to the usage of cookies under the category 'Analytical Third Party'.
cookielawinfo-checkbox-functional1 yearThis cookie is set by GDPR Cookie Consent plugin. The purpose of this cookie is to check whether or not the user has given their consent to the usage of cookies under the category 'Functional'.
cookielawinfo-checkbox-functional-third-party1 yearThis cookie is set by GDPR Cookie Consent plugin. The purpose of this cookie is to check whether or not the user has given their consent to the usage of cookies under the category 'Functional Third Party'.
cookielawinfo-checkbox-technical1 yearThis cookie is set by GDPR Cookie Consent plugin. The purpose of this cookie is to check whether or not the user has given their consent to the usage of cookies under the category 'Technical'.
viewed_cookie_policy11 monthsThe cookie is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies
These cookies improve your user experience of the Coalition website. They will only be placed after your approval.
CookieDurationDescription
pll_language11 monthsThis cookie is set by Polylang plugin for WordPress powered websites. The cookie stores the language code of the last browsed page.
Functional third party cookies
CookieDurationDescription
yt-remote-connected-devicestemporaryThis cookie stores user video playback preferences for embedded YouTube videos.
yt-remote-device-idtemporaryThis cookie stores user video playback preferences for embedded YouTube videos.
Analytical third party cookies
CookieDurationDescription
GPS30 minutesThis cookie is set by Youtube and registers a unique ID for tracking users based on their geographical location
VISITOR_INFO1_LIVE5 monthsThis cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website.
vuid2 yearsThis domain of this cookie is owned by Vimeo. This cookie is used by vimeo to collect tracking information. It sets a unique ID to embed videos to the website.
YSCThis cookies is set by Youtube and is used to track the views of embedded videos.
Powered by CookieYes Logo
Cookie management