SlideShare a Scribd company logo
An effective strategy to handle
multi-layered IT security today
ISACA         (www.isaca.org)

Membership                          Professional recognition Guidance &
•   Founded in 1969                                          Practices
•   Non-profit, global
    membership association for
    IT & information systems
    professionals
•   +95,000 members
•   190 chapters in 75 countries
•   globally accepted research,
    certifications and community
    collaboration
•   trust in, and value from,
    information systems.
•   ISACA provides its
    members with education,
                                              info@isaca.org
    resource sharing, advocacy,
    professional networking and
                                              ISACA (Official)
    a host of other benefits on a
    local level.                              @ISACANews
How to handle multilayered IT security today
How to handle multilayered IT security today
2 views on controls
Information security
        has become
a critical business function!
© 2011 ISACA
These materials are exclusive for HOGENT.
How to handle multilayered IT security today
How to handle multilayered IT security today
How to handle multilayered IT security today
How to handle multilayered IT security today
How to handle multilayered IT security today
IT risk always exists!
  (whether or not it is
 detected / recognised
 by the organisation).
ISO 27005
How to handle multilayered IT security today
How to handle multilayered IT security today
systemic approach

Linear versus Circular thinking:
Your solution
is as strong …




          … as its weakest link
“I don’t care how many millions of
dollars you spend on security
technology. If you don’t have
people trained properly, I’m going
to get in if I want to get in.”
                         Susie Thunder, Cyberpunk
20
1.   Information Security Governance
2.   Information Risk Management
3.   Information Security Program Development
4.   Information Security Program Management
5.   Incident Management & Response
How to handle multilayered IT security today
How to handle multilayered IT security today
Nov
emb
Marc Vael
Career Summary                         Education/ Certification               Expertise Summary
•   Chief Audit Executive (Smals)      •   Master in Applied Economics (UA)   •   IT Audit & Assurance
•   Managing Director (Valuendo)       •   Master in Information Mgt          •   Information Security
•   Director / CISO (KPMG Belgium)         (Uhasselt)                             Management
•   Sr Mgr (Arthur Andersen)           •   Master in IT (KUL)
                                                                              •   Business Continuity /
•   Quality Control (IBM)              •   CISA (ISACA)                           Disaster Recovery
                                       •   CISM (ISACA)
                                                                              •   Privacy & Data
Involvement                            •   CISSP   (ISC2)                         Protection
                                       •   CGEIT (ISACA)
•   Member Flemish Privacy                                                    •   Risk Management
    Commission                         •   ITIL Service Mgr (BCS)
                                                                              •   IT Governance
                                       •   Prince2 (BCS)
•   Director at ISACA International
                                       •   Board Effectiveness (GUBERNA)
•   Vice President ISACA Belgium
•   Chairman Cloud Computing Task
    Force ISACA International                               marc@vael.net
•   Visiting lecturer at Antwerp Mgt                        http://www.linkedin.com/in/marcvael
    School, Solvay Business School
    and other universities                                  @marcvael

More Related Content

PDF
Cybersecurity nexus vision
PDF
Cybersecurity governance existing frameworks (nov 2015)
PPTX
Data Protection: An Approach to Privacy
PPTX
ION Cape Town - Closing Remarks
PPTX
Wifi-soft Solution @ GITEX
PPTX
Xaas infotech (2)
PDF
Planning for-and implementing ISO 27001
PPTX
SC Congress Amsterdam 2016 - IoT Security
Cybersecurity nexus vision
Cybersecurity governance existing frameworks (nov 2015)
Data Protection: An Approach to Privacy
ION Cape Town - Closing Remarks
Wifi-soft Solution @ GITEX
Xaas infotech (2)
Planning for-and implementing ISO 27001
SC Congress Amsterdam 2016 - IoT Security

Similar to How to handle multilayered IT security today (20)

PDF
IT Controls Cloud Webinar - ISACA
PDF
Gartner Information Security Summit Brochure
PDF
Cloud Auditing
PDF
Cybersecurity It Audit Services Gt April2012
PDF
Agam Profile
PDF
Agama Profile
PDF
Information Security for Small Business
PDF
Information Security for Small Business
PDF
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
PDF
Valuendo cyberwar and security (jan 2012) handout
PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
PPTX
Why physical security just isn’t enough, Sending the heavies into virtualized...
PPT
PDF
Data Integrity Protection
PDF
Download full ebook of The Risk It Framework Isaca instant download pdf
PDF
Cobit as IT Management Best Practice Framework
PDF
Fadi Mutlak - Information security governance
PDF
BSI Information Security Conference, 2010
PDF
Information Security Brochure
PPTX
Risk Management Practices for PCI DSS 2.0
IT Controls Cloud Webinar - ISACA
Gartner Information Security Summit Brochure
Cloud Auditing
Cybersecurity It Audit Services Gt April2012
Agam Profile
Agama Profile
Information Security for Small Business
Information Security for Small Business
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Valuendo cyberwar and security (jan 2012) handout
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Why physical security just isn’t enough, Sending the heavies into virtualized...
Data Integrity Protection
Download full ebook of The Risk It Framework Isaca instant download pdf
Cobit as IT Management Best Practice Framework
Fadi Mutlak - Information security governance
BSI Information Security Conference, 2010
Information Security Brochure
Risk Management Practices for PCI DSS 2.0
Ad

More from Marc Vael (20)

PDF
How secure are chat and webconf tools
PDF
my experience as ciso
PDF
Advantages of privacy by design in IoE
PDF
ISACA Reporting relevant IT risks to stakeholders
PDF
Cloud security lessons learned and audit
PDF
Value-added it auditing
PDF
ISACA Internet of Things open forum presentation
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
PDF
The value of big data analytics
PDF
Social media risks and controls
PDF
The view of auditor on cybercrime
PDF
ISACA Mobile Payments Forum presentation
PDF
Belgian Data Protection Commission's new audit programme
PDF
ISACA Cloud Computing Risks
PDF
Information security awareness (sept 2012) bis handout
PPTX
ISACA smart security for smart devices
PPTX
Securing big data (july 2012)
PPT
ISACA Belgium CERT view 2011
PDF
Valuendo cyberwar and security (okt 2011) handout
PPTX
Isaca india trust & value from cloud computing (aug 2011) print
How secure are chat and webconf tools
my experience as ciso
Advantages of privacy by design in IoE
ISACA Reporting relevant IT risks to stakeholders
Cloud security lessons learned and audit
Value-added it auditing
ISACA Internet of Things open forum presentation
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
The value of big data analytics
Social media risks and controls
The view of auditor on cybercrime
ISACA Mobile Payments Forum presentation
Belgian Data Protection Commission's new audit programme
ISACA Cloud Computing Risks
Information security awareness (sept 2012) bis handout
ISACA smart security for smart devices
Securing big data (july 2012)
ISACA Belgium CERT view 2011
Valuendo cyberwar and security (okt 2011) handout
Isaca india trust & value from cloud computing (aug 2011) print
Ad

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Spectroscopy.pptx food analysis technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
sap open course for s4hana steps from ECC to s4
Spectroscopy.pptx food analysis technology
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

How to handle multilayered IT security today

  • 1. An effective strategy to handle multi-layered IT security today
  • 2. ISACA (www.isaca.org) Membership Professional recognition Guidance & • Founded in 1969 Practices • Non-profit, global membership association for IT & information systems professionals • +95,000 members • 190 chapters in 75 countries • globally accepted research, certifications and community collaboration • trust in, and value from, information systems. • ISACA provides its members with education, info@isaca.org resource sharing, advocacy, professional networking and ISACA (Official) a host of other benefits on a local level. @ISACANews
  • 5. 2 views on controls
  • 6. Information security has become a critical business function!
  • 7. © 2011 ISACA These materials are exclusive for HOGENT.
  • 13. IT risk always exists! (whether or not it is detected / recognised by the organisation).
  • 17. systemic approach Linear versus Circular thinking:
  • 18. Your solution is as strong … … as its weakest link
  • 19. “I don’t care how many millions of dollars you spend on security technology. If you don’t have people trained properly, I’m going to get in if I want to get in.” Susie Thunder, Cyberpunk
  • 20. 20
  • 21. 1. Information Security Governance 2. Information Risk Management 3. Information Security Program Development 4. Information Security Program Management 5. Incident Management & Response
  • 25. Marc Vael Career Summary Education/ Certification Expertise Summary • Chief Audit Executive (Smals) • Master in Applied Economics (UA) • IT Audit & Assurance • Managing Director (Valuendo) • Master in Information Mgt • Information Security • Director / CISO (KPMG Belgium) (Uhasselt) Management • Sr Mgr (Arthur Andersen) • Master in IT (KUL) • Business Continuity / • Quality Control (IBM) • CISA (ISACA) Disaster Recovery • CISM (ISACA) • Privacy & Data Involvement • CISSP (ISC2) Protection • CGEIT (ISACA) • Member Flemish Privacy • Risk Management Commission • ITIL Service Mgr (BCS) • IT Governance • Prince2 (BCS) • Director at ISACA International • Board Effectiveness (GUBERNA) • Vice President ISACA Belgium • Chairman Cloud Computing Task Force ISACA International marc@vael.net • Visiting lecturer at Antwerp Mgt http://www.linkedin.com/in/marcvael School, Solvay Business School and other universities @marcvael