SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Marc Vael

Marc Vael

58 Followers
29 SlideShares 1 Clipboard 58 Followers 389 Followings
  • Unblock User Block User
29 SlideShares 1 Clipboard 58 Followers 389 Followings

Personal Information
Organization / Workplace
Brussels Area, Belgium, Vlaams-Brabant Belgium
Occupation
Security, privacy and IT audit expert
Industry
Technology / Software / Internet
Website
www.marcvael.eu
About
I am passionate about IT risks, information security, privacy and IT audit. I am always looking to help and coach people and deliver tangible solutions. I am an experienced international board member bringing +20 years of innovative knowledge to global boards, audit committees and executives helping them manage IT risks, information security, privacy and IT audit topics. My fields of expertise are * IT Audit & Compliance * IT Risk Management * Information Security Management * IT Disaster Recovery * Privacy & Data Protection * IT Outsourcing & Cloud Computing
Contact Details
Tags
vael isaca risk audit marc vael cloud computing security cybersecurity internet of things privacy big data isaca security vael management jan guldentops teams signal whatsapp webconference tool chat information security user experience ciso internet of everything privacy by design eurocacs solvay governance frameworks certifications csx it iot vtc belgian cybersecurity guide informatieveiligheid iia belgium data analytics social media controls cybercrime mobile payments privacy commission smartphone byod cyberwar valuendo vael isaca cert isaca cyberwar epsc valuendo vael planning
See more
Presentations (23)
See all
Isaca india trust & value from cloud computing (aug 2011) print
11 years ago • 905 Views
Valuendo cyberwar and security (okt 2011) handout
11 years ago • 300 Views
ISACA Belgium CERT view 2011
11 years ago • 1984 Views
How to handle multilayered IT security today
11 years ago • 373 Views
Valuendo cyberwar and security (jan 2012) handout
11 years ago • 393 Views
Securing big data (july 2012)
10 years ago • 485 Views
ISACA smart security for smart devices
10 years ago • 8115 Views
Information security awareness (sept 2012) bis handout
10 years ago • 1775 Views
ISACA Cloud Computing Risks
7 years ago • 585 Views
Belgian Data Protection Commission's new audit programme
7 years ago • 305 Views
ISACA Mobile Payments Forum presentation
7 years ago • 1102 Views
The view of auditor on cybercrime
7 years ago • 445 Views
Social media risks and controls
7 years ago • 1311 Views
The value of big data analytics
7 years ago • 724 Views
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
7 years ago • 780 Views
ISACA Internet of Things open forum presentation
7 years ago • 915 Views
Value-added it auditing
7 years ago • 562 Views
Cloud security lessons learned and audit
7 years ago • 875 Views
ISACA Reporting relevant IT risks to stakeholders
7 years ago • 539 Views
Cybersecurity nexus vision
7 years ago • 1054 Views
Cybersecurity governance existing frameworks (nov 2015)
7 years ago • 854 Views
Advantages of privacy by design in IoE
7 years ago • 2300 Views
How secure are chat and webconf tools
2 years ago • 97 Views
Documents (6)
See all
Valuendo 25 Things Not To Do (March 2009) Handout
14 years ago • 261 Views
Valuendo Aiesec Importance Of Planning (2001) Handout
14 years ago • 509 Views
Valuendo Erm In An Extended Environment (March 2007)
14 years ago • 240 Views
Valuendo Erm In An Extended Environment (March 2007)
14 years ago • 164 Views
CobIT presentation
14 years ago • 1819 Views
my experience as ciso
2 years ago • 41 Views
Likes (28)
See all
Cyber Security Challenge Belgium - welcome to our belgian IT security community
Sebastien Deleersnyder • 4 years ago
Infosecurity.be 2019: What are relevant open source security tools you should know and use today?
B.A. • 4 years ago
The Great GDPR MyData Debate - Aurelie Pols - Keynote
Aurélie Pols • 5 years ago
The Future of Innovative Marketing - Carole Lamarque
Carole Lamarque • 7 years ago
Security assessment with a hint of CISSP Prep
EnterpriseGRC Solutions, Inc. • 7 years ago
Security architecture frameworks
John Arnold • 8 years ago
Hit by a Cyberattack: lesson learned
B.A. • 7 years ago
Forget disruption, it's time for Transformation
Scopernia • 7 years ago
The Web Under Our Skin - digital trends for 2015
Bart De Waele • 8 years ago
Re-Invent the Future
Steven Van Belleghem • 9 years ago
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar Prize?
Capgemini • 8 years ago
Mobile Fail: Cracking Open "secure" Android Containers [SecTorCA]
Chris John Riley • 8 years ago
Hacking with Pictures - Hack.LU 2014
Saumil Shah • 8 years ago
Security Operation Center - Design & Build
Sameer Paradia • 8 years ago
Using Agile in non-Agile Organisations (2014 version)
Jose Casal-Gimenez FBCS CITP • 9 years ago
Why Digital Transformation Is the Future
Capgemini • 8 years ago
Beyond breaking bad. The state of agile in ten easy lessons
Sander Hoogendoorn • 8 years ago
A future for IT professionals (?)
Bart Van Loon • 11 years ago
Disruptive Technologies: An Analysis of Disruptive Innovations
Temple University • 13 years ago
Use of ArchiMate at Colruyt Group (presentation by Brechtel Dero at the I.T. Works/LoQutus meetup)
Patrick Van Renterghem • 8 years ago
The Real Deal #bigdata #bigprivacy #oyod Own Your Own Data
Bruno Segers • 9 years ago
Digital disruption how to transform banking
Jo Caudron • 8 years ago
Happiness and future generations happy lunch© #6
Laurence Vanhée • 9 years ago
Skynet project: Monitor, analyze, scale, and maintain a system in the Cloud
Sylvain Kalache • 10 years ago
trendwatching.com's INTERNET OF CARING THINGS
TrendWatching • 9 years ago
A New Perspective on IT Governance in SMEs
Ghent University • 10 years ago
Information security (un)awareness by Marc Vael
CONFENIS 2012 • 10 years ago
21 ways to learn from failures
Marc Heleven • 11 years ago
  • Activity
  • About

Presentations (23)
See all
Isaca india trust & value from cloud computing (aug 2011) print
11 years ago • 905 Views
Valuendo cyberwar and security (okt 2011) handout
11 years ago • 300 Views
ISACA Belgium CERT view 2011
11 years ago • 1984 Views
How to handle multilayered IT security today
11 years ago • 373 Views
Valuendo cyberwar and security (jan 2012) handout
11 years ago • 393 Views
Securing big data (july 2012)
10 years ago • 485 Views
ISACA smart security for smart devices
10 years ago • 8115 Views
Information security awareness (sept 2012) bis handout
10 years ago • 1775 Views
ISACA Cloud Computing Risks
7 years ago • 585 Views
Belgian Data Protection Commission's new audit programme
7 years ago • 305 Views
ISACA Mobile Payments Forum presentation
7 years ago • 1102 Views
The view of auditor on cybercrime
7 years ago • 445 Views
Social media risks and controls
7 years ago • 1311 Views
The value of big data analytics
7 years ago • 724 Views
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
7 years ago • 780 Views
ISACA Internet of Things open forum presentation
7 years ago • 915 Views
Value-added it auditing
7 years ago • 562 Views
Cloud security lessons learned and audit
7 years ago • 875 Views
ISACA Reporting relevant IT risks to stakeholders
7 years ago • 539 Views
Cybersecurity nexus vision
7 years ago • 1054 Views
Cybersecurity governance existing frameworks (nov 2015)
7 years ago • 854 Views
Advantages of privacy by design in IoE
7 years ago • 2300 Views
How secure are chat and webconf tools
2 years ago • 97 Views
Documents (6)
See all
Valuendo 25 Things Not To Do (March 2009) Handout
14 years ago • 261 Views
Valuendo Aiesec Importance Of Planning (2001) Handout
14 years ago • 509 Views
Valuendo Erm In An Extended Environment (March 2007)
14 years ago • 240 Views
Valuendo Erm In An Extended Environment (March 2007)
14 years ago • 164 Views
CobIT presentation
14 years ago • 1819 Views
my experience as ciso
2 years ago • 41 Views
Likes (28)
See all
Cyber Security Challenge Belgium - welcome to our belgian IT security community
Sebastien Deleersnyder • 4 years ago
Infosecurity.be 2019: What are relevant open source security tools you should know and use today?
B.A. • 4 years ago
The Great GDPR MyData Debate - Aurelie Pols - Keynote
Aurélie Pols • 5 years ago
The Future of Innovative Marketing - Carole Lamarque
Carole Lamarque • 7 years ago
Security assessment with a hint of CISSP Prep
EnterpriseGRC Solutions, Inc. • 7 years ago
Security architecture frameworks
John Arnold • 8 years ago
Hit by a Cyberattack: lesson learned
B.A. • 7 years ago
Forget disruption, it's time for Transformation
Scopernia • 7 years ago
The Web Under Our Skin - digital trends for 2015
Bart De Waele • 8 years ago
Re-Invent the Future
Steven Van Belleghem • 9 years ago
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar Prize?
Capgemini • 8 years ago
Mobile Fail: Cracking Open "secure" Android Containers [SecTorCA]
Chris John Riley • 8 years ago
Hacking with Pictures - Hack.LU 2014
Saumil Shah • 8 years ago
Security Operation Center - Design & Build
Sameer Paradia • 8 years ago
Using Agile in non-Agile Organisations (2014 version)
Jose Casal-Gimenez FBCS CITP • 9 years ago
Why Digital Transformation Is the Future
Capgemini • 8 years ago
Beyond breaking bad. The state of agile in ten easy lessons
Sander Hoogendoorn • 8 years ago
A future for IT professionals (?)
Bart Van Loon • 11 years ago
Disruptive Technologies: An Analysis of Disruptive Innovations
Temple University • 13 years ago
Use of ArchiMate at Colruyt Group (presentation by Brechtel Dero at the I.T. Works/LoQutus meetup)
Patrick Van Renterghem • 8 years ago
The Real Deal #bigdata #bigprivacy #oyod Own Your Own Data
Bruno Segers • 9 years ago
Digital disruption how to transform banking
Jo Caudron • 8 years ago
Happiness and future generations happy lunch© #6
Laurence Vanhée • 9 years ago
Skynet project: Monitor, analyze, scale, and maintain a system in the Cloud
Sylvain Kalache • 10 years ago
trendwatching.com's INTERNET OF CARING THINGS
TrendWatching • 9 years ago
A New Perspective on IT Governance in SMEs
Ghent University • 10 years ago
Information security (un)awareness by Marc Vael
CONFENIS 2012 • 10 years ago
21 ways to learn from failures
Marc Heleven • 11 years ago
Personal Information
Organization / Workplace
Brussels Area, Belgium, Vlaams-Brabant Belgium
Occupation
Security, privacy and IT audit expert
Industry
Technology / Software / Internet
Website
www.marcvael.eu
About
I am passionate about IT risks, information security, privacy and IT audit. I am always looking to help and coach people and deliver tangible solutions. I am an experienced international board member bringing +20 years of innovative knowledge to global boards, audit committees and executives helping them manage IT risks, information security, privacy and IT audit topics. My fields of expertise are * IT Audit & Compliance * IT Risk Management * Information Security Management * IT Disaster Recovery * Privacy & Data Protection * IT Outsourcing & Cloud Computing
Tags
vael isaca risk audit marc vael cloud computing security cybersecurity internet of things privacy big data isaca security vael management jan guldentops teams signal whatsapp webconference tool chat information security user experience ciso internet of everything privacy by design eurocacs solvay governance frameworks certifications csx it iot vtc belgian cybersecurity guide informatieveiligheid iia belgium data analytics social media controls cybercrime mobile payments privacy commission smartphone byod cyberwar valuendo vael isaca cert isaca cyberwar epsc valuendo vael planning
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.