SlideShare a Scribd company logo
#BMIT


Welcome
Seminar Business Continuity
Smart Business Strategies
Business Meets IT - Agenda

•   9.30: Market Research: William Visterin, Smart Business Strategies


•   10.00: Chris De Blende, PwC
    Business Continuity Management: do’s & don’ts


•   10.30: Break


•   11.00: Customer Case - Daniel Meeüs, AG Insurance

•   11.30: Customer Case – Maarten Smulders, Atos Worldline

•   12.00: Customer Case – Albert Brouwer, KPN


•   12.30: Walking Dinner
Business
Continuity
 in Belgium
Business continuity is the activity
performed by an organization
to ensure
that critical business functions
will be available
to customers, suppliers, regulators,
and other entities that must have
access to those functions.


Business continuity is not
something implemented at the time
of a disaster.
The ultimate disaster…
“I know it’s
(very) good for
me, but I don’t
     like it”
Top 5 IT projects in Belgium
What are your main IT priorities for next 12 months?


1.) Upgrade pc environment (Windows, Office)


2.) Consolidation of existing IT Infrastructure (virtualisation,…)


3.) Enterprise software (ERP, CRM,…)


4.) Upgrade disaster recovery & business continuity
   capabilities


5.) Upgrade security infrastructure (firewall, antimaleware,…)




      Smart Business Strategies, 2011
Trends
While we
   were
sleeping…
It’s a digital world
It’s becoming
even more digital…
Scott:
   ”It took me
   three days
 to figure out
that there was
 another side
  to the tape.”
And…
what about Business Continuity?
“Around 90 procent
    of disasters
   are IT issues”
      IDC, 2008
Business Continuity in Europe

    Rank these causes of unscheduled application downtime based on which would have the
    greatest impact on your organization's ability to function.




EUROPE                                                        More Impact     Less Impact

Application Failure                                               49%            2%

OS Failure                                                        37%            2%

Hardware Failure                                                  37%            4%

Network Outage                                                    42%            2%

Power Outage                                                      29%            8%

Natural Disaster                                                  22%           18%

Denial of Service Attack                                          14%           20%

Terrorism                                                         23%           27%
Misperception is changing because:

•   Better awareness, identify, measure and quantify risks

•   Better understanding of the economic impact of disasters
    and events (335 disasters and with 100 billion $ damage in US, China, France,…)
•   Government & industry regulations                 (22 US regulations to adress DR/BC)


•   Answer to our partners and customers                       (preparedness audit requests)


•   Risk for single point of failure         (consolidation)


•   Less tolerance for downtime and data loss



           Forrester, 2011
Research
Research

1.) Infrastructure

2.) Security

3.) Application Development

4.) Disaster Recovery
Market Research

•   Smart Business Strategies & InSites
    Consulting (june 2012).
    N = 400,
    about infrastructure

•   Computer Profile (october 2012)
    N = 28.500
    about security
Market Research

•   ZDNet.be, N = 220
    about disaster recovery

•   Coleman Parkes, N= 50
    about application development
Research

Infrastructure
Cloud
Server
Storage
Research

Security
Show me the money
Research

 Application
Development
How users and programmers see each other
Worst jobs to have?
Worst jobs to have? *



1.   Phone sex operator

2.   Ferry cabin cleaner

3.   IT-manager


     *   Indianapolis Business Journal
Research

1.) Infrastructure

2.) Security

3.) Application Development

4,) Disaster Recovery
Research

 Application
Development
Research Application Development


74% geeft aan dat zij te kampen hebben
  met een personeelstekort.




44% van de organisaties vindt regelmatig
  bugs in nieuwe releases op het moment
  dat deze in gebruik zijn genomen.


Coleman Parkes, N= 50
Research Application Development (bis)



56% nood aan mobiele en cloud-applicaties
 leidt tot een versnelling in ontwikkeling
 van nieuwe applicatie-releases.


44% vindt dat het budget niet in verhouding
  staat met vereisten rond beschikbaarheid
  en nieuwe functionaliteit aan applicaties.
“I think we need to come up with a
new approach to business continuity”
Research

Disaster recovery
Typical senior executive reaction:




“I know there’s a risk of XYZ
  event,…

  but it hasn’t happened yet”
Business Continuity in Belgium

 Heeft u al een ‘disaster’ meegemaakt
 op kantoor? (downtime, panne,…)

20% - Ja, meermaals

23% - Ja, één keer

53% - Neen, nog nooit

4% - Weet niet

Source: Smart Business Strategies, 2011
Disaster recovery in Belgium

 Beschikt u in uw bedrijf over een
     disaster recovery plan?

66% - Ja

14% - Neen, maar staat op de planning

17% - Neen, niet gepland

3% - Weet niet
 Source: Smart Business Strategies, 2011
Business Continuity in Europe



Between
75% and 80%
                   73.4 percent said that their organization did have a plan.

…organization with a disaster
recovery plan.



Source: Business Continuity Central
Still a way to go…
And finally…
“Denial is not a river in Egypt”
“Never waste a crisis”
“Never waste a crisis”
Kind regards,




Thank You!

@wvisterin
Business Meets IT - Agenda

•   9.30: Market Research: William Visterin, Smart Business Strategies


•   10.00:Chris De Blende, PwC
    Business Continuity Management: do’s & don’ts


•   10.30: Break


•   11.00: Customer Case - Daniel Meeüs, AG Insurance

•   11.30: Customer Case – Maarten Smulders, Atos Worldline

•   12.00: Customer Case – Albert Brouwer, KPN


•   12.30: Walking Dinner

More Related Content

What's hot

Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
Lumension
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
IBM Sverige
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
Enterprise Management Associates
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
IBM Security
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
Infinity Technologies
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
Carahsoft
 
It's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyIt's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint Strategy
Lumension
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
esbosman
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Ulf Mattsson
 
Yankee Herd Intelligence Will Reshape Anti Malware
Yankee Herd Intelligence Will Reshape Anti MalwareYankee Herd Intelligence Will Reshape Anti Malware
Yankee Herd Intelligence Will Reshape Anti Malwaretswong
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
Valiant Technology
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
Dell EMC World
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 

What's hot (20)

presCyberNISC2015
presCyberNISC2015presCyberNISC2015
presCyberNISC2015
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
It's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyIt's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint Strategy
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Yankee Herd Intelligence Will Reshape Anti Malware
Yankee Herd Intelligence Will Reshape Anti MalwareYankee Herd Intelligence Will Reshape Anti Malware
Yankee Herd Intelligence Will Reshape Anti Malware
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 

Viewers also liked

Q.sh
Q.shQ.sh
Aktueel bedrijfswagenfr
Aktueel bedrijfswagenfrAktueel bedrijfswagenfr
Aktueel bedrijfswagenfrWagenverkopen
 
Temamøte om breiband: 2 Telenor
Temamøte om breiband: 2 TelenorTemamøte om breiband: 2 Telenor
Temamøte om breiband: 2 Telenor
Western Norway Research Institute
 
Mezhdunarodnye organizatsii
Mezhdunarodnye organizatsii Mezhdunarodnye organizatsii
Mezhdunarodnye organizatsii lizabezmenova
 
Rekruttering: Vi treng folk – vi får folk! Enoro
Rekruttering: Vi treng folk – vi får folk! EnoroRekruttering: Vi treng folk – vi får folk! Enoro
Rekruttering: Vi treng folk – vi får folk! Enoro
Western Norway Research Institute
 
Hipertensi¢n arterial
Hipertensi¢n arterialHipertensi¢n arterial
Hipertensi¢n arterial
dikon perez valencia
 
P3 eines de pintura (ii)
P3   eines de pintura (ii)P3   eines de pintura (ii)
P3 eines de pintura (ii)xevisala
 
Presentación1
Presentación1Presentación1
Presentación1
Nazaret Moreno
 
Sabash u can do it (Demo)
Sabash u can do it (Demo)Sabash u can do it (Demo)
Sabash u can do it (Demo)
Asad Ali
 
Trends in Business Intelligence & Analytics
Trends in Business Intelligence & AnalyticsTrends in Business Intelligence & Analytics
Trends in Business Intelligence & Analytics
William Visterin
 
Velferdsteknologi- USHT
Velferdsteknologi- USHTVelferdsteknologi- USHT
Velferdsteknologi- USHT
Western Norway Research Institute
 
Economics of Sanitation for Informed Decision Making
Economics of Sanitation for Informed Decision MakingEconomics of Sanitation for Informed Decision Making
Economics of Sanitation for Informed Decision Making
International WaterCentre
 
UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...
UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...
UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...
Andreas Kunz
 
ქართველები მეორე მსოფლიო ომში
ქართველები მეორე მსოფლიო ომშიქართველები მეორე მსოფლიო ომში
ქართველები მეორე მსოფლიო ომში
marika rekhviashvili
 
ზმნა
ზმნაზმნა
ზმნა
Caro Xardziani
 
Programa del curso: Aprendizaje significativo como elemento fundamental en la...
Programa del curso: Aprendizaje significativo como elemento fundamental en la...Programa del curso: Aprendizaje significativo como elemento fundamental en la...
Programa del curso: Aprendizaje significativo como elemento fundamental en la...
JAVIER SOLIS NOYOLA
 
La libertad
La libertadLa libertad
La libertad
Alison Jaque
 

Viewers also liked (20)

Q.sh
Q.shQ.sh
Q.sh
 
Aktueel bedrijfswagenfr
Aktueel bedrijfswagenfrAktueel bedrijfswagenfr
Aktueel bedrijfswagenfr
 
Temamøte om breiband: 2 Telenor
Temamøte om breiband: 2 TelenorTemamøte om breiband: 2 Telenor
Temamøte om breiband: 2 Telenor
 
Mezhdunarodnye organizatsii
Mezhdunarodnye organizatsii Mezhdunarodnye organizatsii
Mezhdunarodnye organizatsii
 
Rekruttering: Vi treng folk – vi får folk! Enoro
Rekruttering: Vi treng folk – vi får folk! EnoroRekruttering: Vi treng folk – vi får folk! Enoro
Rekruttering: Vi treng folk – vi får folk! Enoro
 
Guapos, listos y ricos
Guapos, listos y ricosGuapos, listos y ricos
Guapos, listos y ricos
 
Unleash_PA_on_HANA
Unleash_PA_on_HANAUnleash_PA_on_HANA
Unleash_PA_on_HANA
 
Hipertensi¢n arterial
Hipertensi¢n arterialHipertensi¢n arterial
Hipertensi¢n arterial
 
P3 eines de pintura (ii)
P3   eines de pintura (ii)P3   eines de pintura (ii)
P3 eines de pintura (ii)
 
Presentación1
Presentación1Presentación1
Presentación1
 
Sabash u can do it (Demo)
Sabash u can do it (Demo)Sabash u can do it (Demo)
Sabash u can do it (Demo)
 
Trends in Business Intelligence & Analytics
Trends in Business Intelligence & AnalyticsTrends in Business Intelligence & Analytics
Trends in Business Intelligence & Analytics
 
Velferdsteknologi- USHT
Velferdsteknologi- USHTVelferdsteknologi- USHT
Velferdsteknologi- USHT
 
Economics of Sanitation for Informed Decision Making
Economics of Sanitation for Informed Decision MakingEconomics of Sanitation for Informed Decision Making
Economics of Sanitation for Informed Decision Making
 
UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...
UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...
UI5 Custom Controls (German language!) - Präsentation von den DSAG Thementage...
 
ქართველები მეორე მსოფლიო ომში
ქართველები მეორე მსოფლიო ომშიქართველები მეორე მსოფლიო ომში
ქართველები მეორე მსოფლიო ომში
 
"მიწის ყივილი"
"მიწის ყივილი""მიწის ყივილი"
"მიწის ყივილი"
 
ზმნა
ზმნაზმნა
ზმნა
 
Programa del curso: Aprendizaje significativo como elemento fundamental en la...
Programa del curso: Aprendizaje significativo como elemento fundamental en la...Programa del curso: Aprendizaje significativo como elemento fundamental en la...
Programa del curso: Aprendizaje significativo como elemento fundamental en la...
 
La libertad
La libertadLa libertad
La libertad
 

Similar to Business Meets IT presentation: Business Continuity

Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
State-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdf
State-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdfState-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdf
State-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdf
Fadli Wirya Wirawan
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-resultsAccenture
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
Andris Soroka
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
Booz Allen Hamilton
 
Technology and Leadership: The IT Innovation Gap
Technology and Leadership:  The IT Innovation GapTechnology and Leadership:  The IT Innovation Gap
Technology and Leadership: The IT Innovation GapJP Allen
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRP
Jorge Sebastiao
 
Why Managed Services
Why Managed ServicesWhy Managed Services
Why Managed Services
PacketTrap Msp
 
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation SlidesHow To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
SlideTeam
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing Innovations
Dell EMC World
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BC
AISDC
 
BCI Counting The Cost
BCI Counting The CostBCI Counting The Cost
BCI Counting The Cost
haemmerle-consulting
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
VMUG IT
 

Similar to Business Meets IT presentation: Business Continuity (20)

Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
State-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdf
State-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdfState-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdf
State-of-Cybersecurity-2022_WHPSC22_res_eng_0322.pdf
 
Data growth-protection-trends-research-results
Data growth-protection-trends-research-resultsData growth-protection-trends-research-results
Data growth-protection-trends-research-results
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
Technology and Leadership: The IT Innovation Gap
Technology and Leadership:  The IT Innovation GapTechnology and Leadership:  The IT Innovation Gap
Technology and Leadership: The IT Innovation Gap
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Emerging Risks, BCP & DRP
Emerging Risks, BCP & DRPEmerging Risks, BCP & DRP
Emerging Risks, BCP & DRP
 
Why Managed Services
Why Managed ServicesWhy Managed Services
Why Managed Services
 
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation SlidesHow To Handle Cybersecurity Risk Powerpoint Presentation Slides
How To Handle Cybersecurity Risk Powerpoint Presentation Slides
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing Innovations
 
360-Degree Approach to DR / BC
360-Degree Approach to DR / BC360-Degree Approach to DR / BC
360-Degree Approach to DR / BC
 
BCI Counting The Cost
BCI Counting The CostBCI Counting The Cost
BCI Counting The Cost
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 

More from William Visterin

Future of Working - Unizo roadshow
Future of Working - Unizo roadshowFuture of Working - Unizo roadshow
Future of Working - Unizo roadshow
William Visterin
 
From Rome to Egypt: 4 trends in Business IT
From Rome to Egypt: 4 trends in Business ITFrom Rome to Egypt: 4 trends in Business IT
From Rome to Egypt: 4 trends in Business IT
William Visterin
 
Business Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William VisterinBusiness Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William Visterin
William Visterin
 
From Paris Hilton to Walmart: welcome to the Big Data Revolution
From Paris Hilton to Walmart: welcome to the Big Data RevolutionFrom Paris Hilton to Walmart: welcome to the Big Data Revolution
From Paris Hilton to Walmart: welcome to the Big Data Revolution
William Visterin
 
Trends in IT and Storage
Trends in IT and StorageTrends in IT and Storage
Trends in IT and Storage
William Visterin
 
William visterin kickoff_info_security_def
William visterin kickoff_info_security_defWilliam visterin kickoff_info_security_def
William visterin kickoff_info_security_def
William Visterin
 
Perfect Storm in BI & IT
Perfect Storm in BI & ITPerfect Storm in BI & IT
Perfect Storm in BI & IT
William Visterin
 
Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013William Visterin
 
BYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoorBYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoor
William Visterin
 
Kluwer dagvd contr_mobile_visterin_2012
Kluwer dagvd contr_mobile_visterin_2012Kluwer dagvd contr_mobile_visterin_2012
Kluwer dagvd contr_mobile_visterin_2012William Visterin
 
William Visterin Business Meets IT Datacenters
William Visterin Business Meets IT DatacentersWilliam Visterin Business Meets IT Datacenters
William Visterin Business Meets IT Datacenters
William Visterin
 

More from William Visterin (12)

Future of Working - Unizo roadshow
Future of Working - Unizo roadshowFuture of Working - Unizo roadshow
Future of Working - Unizo roadshow
 
From Rome to Egypt: 4 trends in Business IT
From Rome to Egypt: 4 trends in Business ITFrom Rome to Egypt: 4 trends in Business IT
From Rome to Egypt: 4 trends in Business IT
 
Business Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William VisterinBusiness Meets IT Keynote 24/6/2014 William Visterin
Business Meets IT Keynote 24/6/2014 William Visterin
 
From Paris Hilton to Walmart: welcome to the Big Data Revolution
From Paris Hilton to Walmart: welcome to the Big Data RevolutionFrom Paris Hilton to Walmart: welcome to the Big Data Revolution
From Paris Hilton to Walmart: welcome to the Big Data Revolution
 
Trends in IT and Storage
Trends in IT and StorageTrends in IT and Storage
Trends in IT and Storage
 
William visterin kickoff_info_security_def
William visterin kickoff_info_security_defWilliam visterin kickoff_info_security_def
William visterin kickoff_info_security_def
 
Perfect Storm in BI & IT
Perfect Storm in BI & ITPerfect Storm in BI & IT
Perfect Storm in BI & IT
 
Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013Bmit cloud market_survey_visterin_2013
Bmit cloud market_survey_visterin_2013
 
Bmit meet theexperts_2013
Bmit meet theexperts_2013Bmit meet theexperts_2013
Bmit meet theexperts_2013
 
BYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoorBYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoor
 
Kluwer dagvd contr_mobile_visterin_2012
Kluwer dagvd contr_mobile_visterin_2012Kluwer dagvd contr_mobile_visterin_2012
Kluwer dagvd contr_mobile_visterin_2012
 
William Visterin Business Meets IT Datacenters
William Visterin Business Meets IT DatacentersWilliam Visterin Business Meets IT Datacenters
William Visterin Business Meets IT Datacenters
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Business Meets IT presentation: Business Continuity

  • 3.
  • 4.
  • 5. Business Meets IT - Agenda • 9.30: Market Research: William Visterin, Smart Business Strategies • 10.00: Chris De Blende, PwC Business Continuity Management: do’s & don’ts • 10.30: Break • 11.00: Customer Case - Daniel Meeüs, AG Insurance • 11.30: Customer Case – Maarten Smulders, Atos Worldline • 12.00: Customer Case – Albert Brouwer, KPN • 12.30: Walking Dinner
  • 7. Business continuity is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions. Business continuity is not something implemented at the time of a disaster.
  • 9.
  • 10. “I know it’s (very) good for me, but I don’t like it”
  • 11.
  • 12. Top 5 IT projects in Belgium What are your main IT priorities for next 12 months? 1.) Upgrade pc environment (Windows, Office) 2.) Consolidation of existing IT Infrastructure (virtualisation,…) 3.) Enterprise software (ERP, CRM,…) 4.) Upgrade disaster recovery & business continuity capabilities 5.) Upgrade security infrastructure (firewall, antimaleware,…) Smart Business Strategies, 2011
  • 13.
  • 15. While we were sleeping…
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Scott: ”It took me three days to figure out that there was another side to the tape.”
  • 29.
  • 30. “Around 90 procent of disasters are IT issues” IDC, 2008
  • 31. Business Continuity in Europe Rank these causes of unscheduled application downtime based on which would have the greatest impact on your organization's ability to function. EUROPE More Impact Less Impact Application Failure 49% 2% OS Failure 37% 2% Hardware Failure 37% 4% Network Outage 42% 2% Power Outage 29% 8% Natural Disaster 22% 18% Denial of Service Attack 14% 20% Terrorism 23% 27%
  • 32. Misperception is changing because: • Better awareness, identify, measure and quantify risks • Better understanding of the economic impact of disasters and events (335 disasters and with 100 billion $ damage in US, China, France,…) • Government & industry regulations (22 US regulations to adress DR/BC) • Answer to our partners and customers (preparedness audit requests) • Risk for single point of failure (consolidation) • Less tolerance for downtime and data loss Forrester, 2011
  • 33.
  • 34.
  • 36. Research 1.) Infrastructure 2.) Security 3.) Application Development 4.) Disaster Recovery
  • 37. Market Research • Smart Business Strategies & InSites Consulting (june 2012). N = 400, about infrastructure • Computer Profile (october 2012) N = 28.500 about security
  • 38. Market Research • ZDNet.be, N = 220 about disaster recovery • Coleman Parkes, N= 50 about application development
  • 40.
  • 41.
  • 42. Cloud
  • 46. Show me the money
  • 47.
  • 48.
  • 49.
  • 51.
  • 52. How users and programmers see each other
  • 53.
  • 54.
  • 55. Worst jobs to have?
  • 56. Worst jobs to have? * 1. Phone sex operator 2. Ferry cabin cleaner 3. IT-manager * Indianapolis Business Journal
  • 57.
  • 58. Research 1.) Infrastructure 2.) Security 3.) Application Development 4,) Disaster Recovery
  • 60. Research Application Development 74% geeft aan dat zij te kampen hebben met een personeelstekort. 44% van de organisaties vindt regelmatig bugs in nieuwe releases op het moment dat deze in gebruik zijn genomen. Coleman Parkes, N= 50
  • 61. Research Application Development (bis) 56% nood aan mobiele en cloud-applicaties leidt tot een versnelling in ontwikkeling van nieuwe applicatie-releases. 44% vindt dat het budget niet in verhouding staat met vereisten rond beschikbaarheid en nieuwe functionaliteit aan applicaties.
  • 62.
  • 63. “I think we need to come up with a new approach to business continuity”
  • 65. Typical senior executive reaction: “I know there’s a risk of XYZ event,… but it hasn’t happened yet”
  • 66. Business Continuity in Belgium Heeft u al een ‘disaster’ meegemaakt op kantoor? (downtime, panne,…) 20% - Ja, meermaals 23% - Ja, één keer 53% - Neen, nog nooit 4% - Weet niet Source: Smart Business Strategies, 2011
  • 67. Disaster recovery in Belgium Beschikt u in uw bedrijf over een disaster recovery plan? 66% - Ja 14% - Neen, maar staat op de planning 17% - Neen, niet gepland 3% - Weet niet Source: Smart Business Strategies, 2011
  • 68. Business Continuity in Europe Between 75% and 80% 73.4 percent said that their organization did have a plan. …organization with a disaster recovery plan. Source: Business Continuity Central
  • 69. Still a way to go…
  • 71.
  • 72. “Denial is not a river in Egypt”
  • 73. “Never waste a crisis”
  • 74. “Never waste a crisis”
  • 76. Business Meets IT - Agenda • 9.30: Market Research: William Visterin, Smart Business Strategies • 10.00:Chris De Blende, PwC Business Continuity Management: do’s & don’ts • 10.30: Break • 11.00: Customer Case - Daniel Meeüs, AG Insurance • 11.30: Customer Case – Maarten Smulders, Atos Worldline • 12.00: Customer Case – Albert Brouwer, KPN • 12.30: Walking Dinner

Editor's Notes

  1. Digitalisering heeft zich in onze economie de laatste jaren doorgezet: luchtvaart, E-commerce en ook media (Newsweek)