SlideShare a Scribd company logo
1 of 6
Download to read offline
Security Conference - May 20th, 2015 - Trasys
http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]
TRASYS Headquarters +32 (0)2/893.12.11 | info@trasysgroup.com
 
Go to... 
Go to... 
Conference Invitation
Boost your vision on Cyber-Security while relaxed networking. 
May 20th, 2015 at Grimbergen from 17h30 till 18h45, followed by wine tasting as of 19h00.
Security Conference – May 20th, 2015
Security Conference - May 20th, 2015 - Trasys
http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]
 
 
PROGRAMME
& VENUE
Do you have the tools and the visibility to identify the most critical security issues and do you know how to take action ? Can you
ensure business success by keeping users and data safe at all times and not only within the fortress walls ?
Some organisations have already taken steps to raise their security maturity to protect their critical assets. What did they learn
from these choices and what benefits are they having from that ?
Find out more on May 20th, 2015, as of 17h30 at Grimbergen (the Salons de Romree). This conference will feature leaders
sharing their insights and customers drawing their lessons learned in :
Securing corporate communication, with the connectivity required by critical business applications to function, bridging
the gap between security and operations and improving risk and compliance posture;
Switching to active data protection, making the threat of data theft irrelevant with persistent protection of unstructured
information. Combining entreprise-grade policy-driven classification with a powerfull IRM engine to protect unstructured
data in any file format, on any device, throughout the entire data lifecyle.
Boost your vision on cyber-security
17h30 – Welcome and Opening
Security Conference - May 20th, 2015 - Trasys
http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]
 
ORGANISED
IN
PARTNERSHIP
WITH
17h45 – UBS (Union des Banques Suisses) – Active Data Protection
18h15 – PSA Antwerp – Total connectivity for availability of critical business applications
18h45 – Wrap up and conclusions
19h00 – Wine tasting (*) – networking
Venue : Salons de Romree – Brusselsesteenweg  39 – 1850 Grimbergen
(*) St Julien Grand Cru Classé 1998, Pomerol 2004, Château-du-Pape 2007, Bourgogne Grand Cru 2008,…
This conference is organised in partnership with AlgoSec and Secure Islands.
AlgoSec empowers organisations to manage security at the speed of business. Through its application-centric approach, AlgoSec
automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application
delivery while ensuring security.
Secure Islands develops and markets advanced Information Protection and Control (IPC) solutions for the borderless enterprise.
Our policy-driven technology immunizes data at the point of creation, applying classification and protection that persist throughout
the entire data lifecycle.
 
Security Conference - May 20th, 2015 - Trasys
http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]
 
REGISTER
TODAY
We will be happy to welcome or to contact you for more information.
Thank you for completing and submitting the form.
Title
M. Mme Mlle
LastName * FirstName *
Email * FunctionTitle *
Company *
Street * Number * Box
Zip Code * City *
I am interested but will not be able to join. Please contact me.
Validation
I'm not a robot
reCAPTCHA
Privacy - Terms
SubmitSubmit
Security Conference - May 20th, 2015 - Trasys
http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]
QUICK LINKS
Advise
Solve
Integrate
Operate
Source
Transform
Who we serve
How we help
Working @ TRASYS
WHO WE ARE
TRASYS is a €70 million+ IT solutions & services company that helps customers in government, manufacturing, energy & utilities and
financial services to tackle business-critical and transformation challenges. Operating throughout Europe and headquartered in
Brussels, TRASYS prides itself on getting IT done and empowers customers to increase business agility and enhance operating
efficiency.
More info
TRASYS HEADQUARTERS
Terhulpsesteenweg 6c
B-1560 Hoeilaart
Belgium
Phone: +32 (0)2/893.12.11
Fax: +32 (0)2/893.14.00
Email: info@trasysgroup.com
Web: http://www.trasys.be
TRASYS NEWSLETTER
Sign-up to receive our newsletter.
Email:
If you want to unsubscribe,
Register
Security Conference - May 20th, 2015 - Trasys
http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]
click here
Copyright 2014 TRASYS S.A./N.V. | All Rights Reserved
    

More Related Content

Viewers also liked

Wade Wetzel Resume
Wade Wetzel ResumeWade Wetzel Resume
Wade Wetzel ResumeWade Wetzel
 
Agência Drc Publicidade Marketing Digital
Agência Drc Publicidade Marketing DigitalAgência Drc Publicidade Marketing Digital
Agência Drc Publicidade Marketing DigitalAdão Rodrigues
 
Courtney's Resume 2016
Courtney's Resume 2016Courtney's Resume 2016
Courtney's Resume 2016Courtney Weis
 
25. pengenalan sistem e training guru melek it by pak sukani
25. pengenalan sistem e training guru melek it by pak sukani25. pengenalan sistem e training guru melek it by pak sukani
25. pengenalan sistem e training guru melek it by pak sukanisukani
 
SharePoint Search Zero to Search Hero
SharePoint Search Zero to Search HeroSharePoint Search Zero to Search Hero
SharePoint Search Zero to Search HeroEd Musters
 
Star Paper Mill exp.cert
Star Paper Mill exp.certStar Paper Mill exp.cert
Star Paper Mill exp.certRishi Maggo
 
ACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIA
ACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIAACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIA
ACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIADPS
 
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...contactOpinionWay
 
Adobe Premiere Pro Main Updates
Adobe Premiere Pro Main UpdatesAdobe Premiere Pro Main Updates
Adobe Premiere Pro Main UpdatesJoe Nasr
 
The Art of Video Editing
The Art of Video EditingThe Art of Video Editing
The Art of Video EditingJoe Nasr
 
MarkBerg_Portfolio 2016
MarkBerg_Portfolio 2016MarkBerg_Portfolio 2016
MarkBerg_Portfolio 2016mark berg
 

Viewers also liked (17)

Wade Wetzel Resume
Wade Wetzel ResumeWade Wetzel Resume
Wade Wetzel Resume
 
Tasja Matriek
Tasja MatriekTasja Matriek
Tasja Matriek
 
Agência Drc Publicidade Marketing Digital
Agência Drc Publicidade Marketing DigitalAgência Drc Publicidade Marketing Digital
Agência Drc Publicidade Marketing Digital
 
Sicopedagogia
SicopedagogiaSicopedagogia
Sicopedagogia
 
Courtney's Resume 2016
Courtney's Resume 2016Courtney's Resume 2016
Courtney's Resume 2016
 
25. pengenalan sistem e training guru melek it by pak sukani
25. pengenalan sistem e training guru melek it by pak sukani25. pengenalan sistem e training guru melek it by pak sukani
25. pengenalan sistem e training guru melek it by pak sukani
 
Covers
CoversCovers
Covers
 
SharePoint Search Zero to Search Hero
SharePoint Search Zero to Search HeroSharePoint Search Zero to Search Hero
SharePoint Search Zero to Search Hero
 
STAR Exp.cert
STAR Exp.certSTAR Exp.cert
STAR Exp.cert
 
Star Paper Mill exp.cert
Star Paper Mill exp.certStar Paper Mill exp.cert
Star Paper Mill exp.cert
 
Historia de la computadora
Historia de la computadoraHistoria de la computadora
Historia de la computadora
 
ACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIA
ACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIAACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIA
ACCIÓN SOCIAL: REPARACIÓN VÍCTIMAS DE LA VIOLENCIA
 
cv
cvcv
cv
 
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
OpinionWay pour Valeurs Actuelles - Les intentions de vote aux élections régi...
 
Adobe Premiere Pro Main Updates
Adobe Premiere Pro Main UpdatesAdobe Premiere Pro Main Updates
Adobe Premiere Pro Main Updates
 
The Art of Video Editing
The Art of Video EditingThe Art of Video Editing
The Art of Video Editing
 
MarkBerg_Portfolio 2016
MarkBerg_Portfolio 2016MarkBerg_Portfolio 2016
MarkBerg_Portfolio 2016
 

Similar to Cyber Security Conference May 20th Grimbergen

Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...Marek Pietrzyk
 
How to get more out of the network?
How to get more out of the network?How to get more out of the network?
How to get more out of the network?Martin Geddes
 
Franchising with Colt
Franchising with ColtFranchising with Colt
Franchising with ColtBart Froyen
 
Your Guide to 'The Cloud'
Your Guide to 'The Cloud'Your Guide to 'The Cloud'
Your Guide to 'The Cloud'Sam Parker
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessHappiest Minds Technologies
 
Big Data Forum by Institute of Actuaries in Belgium (IABE)
Big Data Forum by Institute of Actuaries in Belgium (IABE)Big Data Forum by Institute of Actuaries in Belgium (IABE)
Big Data Forum by Institute of Actuaries in Belgium (IABE)Mateusz Maj
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...TI Safe
 
Masters of Machines II: Conquering complexity with operational intelligence
Masters of Machines II: Conquering complexity with operational intelligenceMasters of Machines II: Conquering complexity with operational intelligence
Masters of Machines II: Conquering complexity with operational intelligenceSplunk
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Reviewresultsig
 
Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !Microsoft Technet France
 
Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !Microsoft Décideurs IT
 
SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass Dale Butler
 
Gartner magic quadrant 2015
Gartner magic quadrant 2015Gartner magic quadrant 2015
Gartner magic quadrant 2015Satya Harish
 
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsDigital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsMark Morley, MBA
 
M2M Market evolution and value chain components
M2M Market evolution and value chain componentsM2M Market evolution and value chain components
M2M Market evolution and value chain componentsFabio Corna
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMOAMETIC
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 

Similar to Cyber Security Conference May 20th Grimbergen (20)

Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
Marek Pietrzyk - EIC Munich - Future of Secure Collaboration - Secure Informa...
 
How to get more out of the network?
How to get more out of the network?How to get more out of the network?
How to get more out of the network?
 
Franchising with Colt
Franchising with ColtFranchising with Colt
Franchising with Colt
 
Your Guide to 'The Cloud'
Your Guide to 'The Cloud'Your Guide to 'The Cloud'
Your Guide to 'The Cloud'
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awareness
 
Big Data Forum by Institute of Actuaries in Belgium (IABE)
Big Data Forum by Institute of Actuaries in Belgium (IABE)Big Data Forum by Institute of Actuaries in Belgium (IABE)
Big Data Forum by Institute of Actuaries in Belgium (IABE)
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
Masters of Machines II: Conquering complexity with operational intelligence
Masters of Machines II: Conquering complexity with operational intelligenceMasters of Machines II: Conquering complexity with operational intelligence
Masters of Machines II: Conquering complexity with operational intelligence
 
MECSCE 2015 - Brochure
MECSCE 2015 - BrochureMECSCE 2015 - Brochure
MECSCE 2015 - Brochure
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
 
Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !
 
Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !Web/Azure Application Proxy : des apps, de la sécurité, partout !
Web/Azure Application Proxy : des apps, de la sécurité, partout !
 
Information Security @ AVL
Information Security @ AVLInformation Security @ AVL
Information Security @ AVL
 
#MSIGNITE by Metricool
#MSIGNITE by Metricool #MSIGNITE by Metricool
#MSIGNITE by Metricool
 
SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass SMi Group's Cyber Security in Defence Masterclass
SMi Group's Cyber Security in Defence Masterclass
 
Gartner magic quadrant 2015
Gartner magic quadrant 2015Gartner magic quadrant 2015
Gartner magic quadrant 2015
 
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply ChainsDigital Disruption Across Tomorrow's Manufacturing Supply Chains
Digital Disruption Across Tomorrow's Manufacturing Supply Chains
 
M2M Market evolution and value chain components
M2M Market evolution and value chain componentsM2M Market evolution and value chain components
M2M Market evolution and value chain components
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 

Cyber Security Conference May 20th Grimbergen

  • 1. Security Conference - May 20th, 2015 - Trasys http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01] TRASYS Headquarters +32 (0)2/893.12.11 | info@trasysgroup.com   Go to...  Go to...  Conference Invitation Boost your vision on Cyber-Security while relaxed networking.  May 20th, 2015 at Grimbergen from 17h30 till 18h45, followed by wine tasting as of 19h00. Security Conference – May 20th, 2015
  • 2. Security Conference - May 20th, 2015 - Trasys http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]     PROGRAMME & VENUE Do you have the tools and the visibility to identify the most critical security issues and do you know how to take action ? Can you ensure business success by keeping users and data safe at all times and not only within the fortress walls ? Some organisations have already taken steps to raise their security maturity to protect their critical assets. What did they learn from these choices and what benefits are they having from that ? Find out more on May 20th, 2015, as of 17h30 at Grimbergen (the Salons de Romree). This conference will feature leaders sharing their insights and customers drawing their lessons learned in : Securing corporate communication, with the connectivity required by critical business applications to function, bridging the gap between security and operations and improving risk and compliance posture; Switching to active data protection, making the threat of data theft irrelevant with persistent protection of unstructured information. Combining entreprise-grade policy-driven classification with a powerfull IRM engine to protect unstructured data in any file format, on any device, throughout the entire data lifecyle. Boost your vision on cyber-security 17h30 – Welcome and Opening
  • 3. Security Conference - May 20th, 2015 - Trasys http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]   ORGANISED IN PARTNERSHIP WITH 17h45 – UBS (Union des Banques Suisses) – Active Data Protection 18h15 – PSA Antwerp – Total connectivity for availability of critical business applications 18h45 – Wrap up and conclusions 19h00 – Wine tasting (*) – networking Venue : Salons de Romree – Brusselsesteenweg  39 – 1850 Grimbergen (*) St Julien Grand Cru Classé 1998, Pomerol 2004, Château-du-Pape 2007, Bourgogne Grand Cru 2008,… This conference is organised in partnership with AlgoSec and Secure Islands. AlgoSec empowers organisations to manage security at the speed of business. Through its application-centric approach, AlgoSec automates and simplifies security policy management across virtual, cloud and physical environments to accelerate application delivery while ensuring security. Secure Islands develops and markets advanced Information Protection and Control (IPC) solutions for the borderless enterprise. Our policy-driven technology immunizes data at the point of creation, applying classification and protection that persist throughout the entire data lifecycle.  
  • 4. Security Conference - May 20th, 2015 - Trasys http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01]   REGISTER TODAY We will be happy to welcome or to contact you for more information. Thank you for completing and submitting the form. Title M. Mme Mlle LastName * FirstName * Email * FunctionTitle * Company * Street * Number * Box Zip Code * City * I am interested but will not be able to join. Please contact me. Validation I'm not a robot reCAPTCHA Privacy - Terms SubmitSubmit
  • 5. Security Conference - May 20th, 2015 - Trasys http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01] QUICK LINKS Advise Solve Integrate Operate Source Transform Who we serve How we help Working @ TRASYS WHO WE ARE TRASYS is a €70 million+ IT solutions & services company that helps customers in government, manufacturing, energy & utilities and financial services to tackle business-critical and transformation challenges. Operating throughout Europe and headquartered in Brussels, TRASYS prides itself on getting IT done and empowers customers to increase business agility and enhance operating efficiency. More info TRASYS HEADQUARTERS Terhulpsesteenweg 6c B-1560 Hoeilaart Belgium Phone: +32 (0)2/893.12.11 Fax: +32 (0)2/893.14.00 Email: info@trasysgroup.com Web: http://www.trasys.be TRASYS NEWSLETTER Sign-up to receive our newsletter. Email: If you want to unsubscribe, Register
  • 6. Security Conference - May 20th, 2015 - Trasys http://www.trasys.be/...f23d7c61097a5255cb8c&utm_source=Campaign%20Monitor%20Email%20Marketing&utm_term=Dont%20miss%20it[19/04/2015 21:17:01] click here Copyright 2014 TRASYS S.A./N.V. | All Rights Reserved     