Kalman Tiboldi - CTO & Founder at GemOne-TVH - Simplify or Die: Why Complexity Is the Real IT Challenge
Find out more:
Belgium 16-9-25 Squad Only Physical english
The system works. That’s the problem. It’s old, complex, deeply integrated, and still running your most critical operations. Everyone agrees change is needed. But no one wants to be the one who breaks it. The stakes are too high.
Read MorePoland 17-9-25 Invitation Only Virtual Polish
Serdecznie zapraszamy na warsztaty technologiczne, podczas spotkania Wojciech Małek z Ab Initio Software opowie: Dlaczego kontekst i pamięć są krytyczne dla dużych modeli językowych? Podczas spotkania pokażemy, jak ograniczone okno kontekstowe oraz podatność na halucynacje – nawet przy użyciu technik RAG – wpływają na wiarygodność odpowiedzi LLM-ów. Od pojedynczego agenta do Agentic AI Wyjaśnimy różnicę między klasycznym „AI Agentem” a ekosystemem współpracujących agentów (Agentic AI) – oraz dlaczego ta zmiana podejścia jest przełomowa. Model Context Protocol (MCP) Przedstawimy MCP jako kluczowy element architektury Agentic AI, a także jego miejsce w rodzinie nowych protokołów komunikacji międzyagentowej (m.in. A2A, ANP). Granice rozumowania LRM-ów Podsumujemy najnowsze badania nad Large Reasoning Models, pokazując zarówno ich możliwości, jak i ograniczenia – oraz co to znaczy dla projektantów systemów Agentic AI.
Read MorePoland 17-9-25 Invitation Only Virtual Polish
Procesy HR sa kluczowe dla znajdowania, motywowania i utrzymywania talentów w IT. A skoro bez talentów nie dą sie robić IT to procesy HR wyglądają na kluczowe. A skoro są tak ważne to podlegają optymalizacji w zakresie ich jakości , efektywności i skuteczności. A wiemy w IT, że bez cyfryzacji powyższych nie osiągniemy. A zatem: Jakie procesy w HR sa kluczowe? Jakie z nich dziś śmiało cyfryzujemy? Jakie najnowsze technologie dziś je wspierają? Czy AI jest na tej liście? Spotkanie otworzy Krzysztof Zawistowski, Human Capital Director, Inter Cars, który podzieli się swoimi praktykami i doświadczeniem w powyższych tematach. Potem przez godzinkę podyskutujemy i pozwolimy innym z Was na podzielenie sie swoimi doświadczeniami.
Read MoreBelgium 23-9-25 Squad Only Virtual english
Security teams are overwhelmed. Too many tools. Too many alerts. Too few people. And now, increasing pressure from the board to protect everything, everywhere, all the time. Expect honest reflection, shared strategies, and a conversation that cuts through compliance noise and focuses on what to do when your team is stretched and your risk is rising.
Read MoreItaly 23-9-25 Invitation Only Physical italian
L’adozione sempre più diffusa del Public & Hybrid Cloud, unita all’evoluzione delle minacce informatiche e alla crescente importanza della protezione dei dati, della conformità normativa e della continuità operativa, rende la sicurezza del cloud una priorità strategica per le organizzazioni moderne. La protezione proattiva è diventata essenziale, poiché aspettare solo di reagire agli attacchi può portare a gravi conseguenze. L’approccio Prevention-First sposta il focus sulla prevenzione degli attacchi, piuttosto che sulla remediation: richiede una gestione integrata e predittiva delle vulnerabilità e il rafforzamento delle difese nel cloud, elementi chiave per garantire una sicurezza solida e resiliente e per evitare l'escalation degli attacchi. Durante questa roundtable organizzata da CIONET, concepita come un incontro peer-to-peer per i CIO, CISO e gli esperti di cyber security, esploreremo come integrare la prevenzione delle minacce nella strategia di sicurezza del cloud, proteggendo i sistemi prima che le minacce possano causare danni irreparabili.
Read MoreBelgium Sep 13, 2025 All Members Physical english
Join us for a wonderful ride. The ride is accessible to all levels of riders and doesn't require extensive technical skills. More information will follow soon. Looking forward to ride together!
Read MoreGermany Sep 17, 2025 Country Members Physical german
Cybersecurity ist längst kein reines IT-Thema mehr – sie betrifft das gesamte Unternehmen. Doch während die Bedrohungslage zunimmt, geraten viele Security-Verantwortliche an ihre Belastungsgrenzen: zwischen 24/7-Verantwortung, wachsenden Anforderungen und dem ständigen Innovationsdruck.
Read MoreGermany Sep 17, 2025 Country Members Physical german
IT-Betrieb und Cybersicherheit stehen heute unter extremem Druck: steigende Komplexität, wachsende regulatorische Anforderungen (NIS2, DORA, KRITIS), chronische Ressourcenknappheit – und gleichzeitig eine Bedrohungslage, die keine Verzögerungen duldet. Trotzdem agieren viele IT- und Security-Teams noch immer in Silos. Die Folge: ineffiziente Abläufe, Tool-Wildwuchs, langsame Reaktion auf Vorfälle und unklare Verantwortlichkeiten.
Read MoreGermany Sep 18, 2025 Country Members Virtual german
Nachhaltigkeit ist für CIOs nicht nur ein „Nice-to-have“, sondern eine strategische Priorität – sie beeinflusst direkt die finanzielle Performance, die operative Effizienz und die langfristige Wettbewerbsfähigkeit.
Read MoreBelgium Sep 18, 2025 Country Members Physical french
La dette technique est comparable à la négligence des réparations d'une maison. Ignorer un toit qui fuit peut faire gagner du temps aujourd'hui, mais cela pourrait conduire à l'effondrement du plafond plus tard. Pour remédier à la dette technique, il faut trouver et réparer ces fuites dès maintenant et mettre en place un plan d'entretien de la maison afin qu'elle soit prête pour les extensions futures. Pour résoudre ces problèmes, il faut définir des priorités stratégiques, communiquer clairement avec les parties prenantes et établir une feuille de route à long terme pour la modernisation. Cet événement se déroulera entièrement en français.
Read MoreUK Sep 22, 2025 Invitation Only Physical english
Join us on September 22nd for the first event from the next phase of our CIO series executive roundtables from CIONET, Cognizant and Google Cloud.
Read MoreBelgium Sep 13, 2025 All Members Physical english
Join us for a wonderful ride. The ride is accessible to all levels of riders and doesn't require extensive technical skills. More information will follow soon. Looking forward to ride together!
Read MoreGermany Sep 17, 2025 Country Members Physical german
Cybersecurity ist längst kein reines IT-Thema mehr – sie betrifft das gesamte Unternehmen. Doch während die Bedrohungslage zunimmt, geraten viele Security-Verantwortliche an ihre Belastungsgrenzen: zwischen 24/7-Verantwortung, wachsenden Anforderungen und dem ständigen Innovationsdruck.
Read MoreGermany Sep 17, 2025 Country Members Physical german
IT-Betrieb und Cybersicherheit stehen heute unter extremem Druck: steigende Komplexität, wachsende regulatorische Anforderungen (NIS2, DORA, KRITIS), chronische Ressourcenknappheit – und gleichzeitig eine Bedrohungslage, die keine Verzögerungen duldet. Trotzdem agieren viele IT- und Security-Teams noch immer in Silos. Die Folge: ineffiziente Abläufe, Tool-Wildwuchs, langsame Reaktion auf Vorfälle und unklare Verantwortlichkeiten.
Read MoreGermany Sep 18, 2025 Country Members Virtual german
Nachhaltigkeit ist für CIOs nicht nur ein „Nice-to-have“, sondern eine strategische Priorität – sie beeinflusst direkt die finanzielle Performance, die operative Effizienz und die langfristige Wettbewerbsfähigkeit.
Read MoreBelgium Sep 18, 2025 Country Members Physical french
La dette technique est comparable à la négligence des réparations d'une maison. Ignorer un toit qui fuit peut faire gagner du temps aujourd'hui, mais cela pourrait conduire à l'effondrement du plafond plus tard. Pour remédier à la dette technique, il faut trouver et réparer ces fuites dès maintenant et mettre en place un plan d'entretien de la maison afin qu'elle soit prête pour les extensions futures. Pour résoudre ces problèmes, il faut définir des priorités stratégiques, communiquer clairement avec les parties prenantes et établir une feuille de route à long terme pour la modernisation. Cet événement se déroulera entièrement en français.
Read MoreUK Sep 22, 2025 Invitation Only Physical english
Join us on September 22nd for the first event from the next phase of our CIO series executive roundtables from CIONET, Cognizant and Google Cloud.
Read MoreTrend Vision One allowed this real estate firm to detect and respond 80 percent faster.
A global organization, operating across multiple locations, sought a comprehensive security solution to protect its infrastructure and ensure compliance. Trend Micro's XDR platform has provided the company with a centralized view of its environment, enabling effective threat detection, response, and management.
WHAT IS OUR PRIMARY USE CASE?
It's a perfect tool for monitoring infrastructure, including endpoints, servers, and potential attacks via networks. That's especially true for internet-visible hosts, which we can monitor directly from the tool.
We had problems with users not using legitimate tools, such as pendrives. We needed to protect hosts from external threats and third-party actors. That included monitoring behavior, scanning our infrastructure, and exploitation of vulnerabilities.
Trend Vision One™ absolutely gives us centralized visibility and management. Especially when we integrate it with Active Directory, we get full visibility of our endpoint and server infrastructure. That is very important. A 10 on a scale of one to 10.
HOW HAS IT HELPED MY ORGANIZATION?
The solution has enabled us to completely reorganize our work. I was the first person using this tool in our company, and I completely changed user behavior to become more restricted. In Poland, but also in the United States, we are very strict about abnormal usage of our tools or attempts to download tools that shouldn't be on desktops, laptops, or servers. From my point of view, we are now a completely different organization than when I joined it. Trend Micro is one of the most important security tools we have implemented.
We don't need to use an external vulnerability scanner because Trend Micro XDR has a module for that, and we can save that money. Trend Micro™ Managed XDR is quite nice because I can manage more than 2,000 endpoints. I use the playbooks with particular scenarios for incident management. It's a very nice tool. It competes with anyone on the market. Sometimes, when we detect some kind of threat and we have no idea how we should investigate, troubleshoot, or mitigate the risk, we use the managed service team with Trend Micro engineers. I'm very happy with this team. They are very good professionals.
We respond much faster thanks to the intelligence used by Trend Micro. They have very good knowledge because they have many threat sources. That is why we are reacting much faster than we would if we had to dig deeper without that knowledge and this tool. It would be absolutely impossible to manage this infrastructure by a single admin or even two security admins. We are able to detect and respond about 80 percent faster. It's not only the monitoring and alerting for classic signature threats; there is also a tool for monitoring user behavior. It would be utterly impossible to find abnormal user behavior without this type of tool.
And we have mitigated most of the false positives—more than 90 percent. About one out of 10 alerts may be a false positive. In the beginning, we had to learn about Trend Micro, what was a legitimate action and what was a suspicious or malicious action. We had to learn what the right approach was.
This product is simple to use. Sometimes, especially when new features come out, I need to spend a little bit of time discovering how they work. But overall, it's simple. The interface is quite nice.
The integration is also nice because there are many external tools that we can connect to the platform, such as configuration management tools. Because the platform is integrated, I can manage almost the whole company across our global organization. I can almost manage the infrastructure alone. We have minimized the need to expand our team. It also handles vulnerability management.
We use Trend Micro to cover endpoint protection and server protection. That's one of the key points for our company. And Trend Vision One absolutely gives us centralized visibility and management. Especially when we integrate it with Active Directory, we get full visibility of our endpoint and server infrastructure. That is very important. A 10 on a scale of one to 10.
We also use the solution's Executive Dashboards. We present the findings in steering committees periodically. Sometimes, there is a repetitive alert or event. Directly from this dashboard, I can see the groups of this type of event. For me, it's quite a nice tool for presenting the results to the C level and the whole company for those who are not technically experienced.
And especially because of the new European regulation called NIST 2, we are using the solution's Risk Index feature. We calculate our risk score and we can see how it is changing in the timeline. Is it growing? Is there a new vulnerability detected? We can also compare our risk score with organizations of the same size or in the same industry and see if we are better or worse.
We respond much faster thanks to the intelligence used by Trend Micro. They have very good knowledge because they have many threat sources. That is why we are reacting much faster than we would if we had to dig deeper without that knowledge and this tool. It would be absolutely impossible to manage this infrastructure by a single admin or even two security admins.
The area for improvement is mobile security. We have just finished a proof of concept for Zero Trust Secure Access. We withdrew from this PoC because it does not have that many points for proxy across Europe. Our organization is across Europe, and it will be nice when it is possible to have Trend Micro proxies across many more countries. At this time, they are only located in Germany and the UK. For us, it's not enough. We are waiting for them to increase the points of contact, and after that, we will return to this project.
From my experience, it was quite a nice tool, and I could manage almost all of the actions that I could not manage in a traditional way. Traditionally, I could allow or block usage of an application. But using the Zero Trust Secure Access tool, I could manage the schema of the usage. I will wait for this tool to change in the next few months.
FOR HOW LONG HAVE I USED THE SOLUTION?
I have been using Trend Micro XDR for almost 20 months.
WHAT DO I THINK ABOUT THE STABILITY OF THE SOLUTION?
It's a stable product. We haven't detected any issues other than the false positives, but that's normal.
WHAT DO I THINK ABOUT THE SCALABILITY OF THE SOLUTION?
We use it in multiple locations because our company is spread across Europe and Asia, as well as the United States and Canada. We have more than 2,000 users, and the solution covers 400 or 500 assets.
If our company were to increase over two to three months to 10,000 users, it would not be a problem. We have the ability to extend as we scale our users. It's very simple and absolutely flexible.
HOW ARE CUSTOMER SERVICE AND SUPPORT?
Their technical support is nice. On a scale of one to 10, it's a 10. They respond fast using email, phone, and the customer service portal.
HOW WOULD YOU RATE CUSTOMER SERVICE AND SUPPORT?
Positive.
WHICH SOLUTION DID I USE PREVIOUSLY AND WHY DID I SWITCH?
I used competitors' tools, Secureworks, as well as Carbon Black. These are nice tools, but they are very heavy to implement and heavy on daily operations. Trend Micro is much better, much more flexible, and I have much more visibility. It is a cost- and time-saving tool.
HOW WAS THE INITIAL SETUP?
Our deployment is a hybrid. We have advanced our implementation a lot. The first implementation was only one of the features called OfficeScan. That was a few years ago, and the implementation was in the United States. After that, we moved forward with the implementation across servers and endpoints, including Mac and Microsoft endpoints.
The whole project took about three months, with the custom discovery and the fine tuning. We had two people involved, one in Europe and one in the US.
Sometimes, maintenance is required if there is a new feature. It needs to be restarted. But this function is done by Trend Micro engineers because we are using the XDR in the cloud. We don't touch it. There is maintenance on our side for Deep Discovery because that part is an onprem solution. But it's simple to manage.
WHAT OTHER ADVICE DO I HAVE?
They are implementing new tools, like Trend Micro Apex One™ and Trend Micro™ Deep Discovery™ Inspector. They are ready for implementation on the console, and we are waiting to transition to these tools.
For the new features, I prefer doing a proof of concept, like we did for the Zero Trust Secue Access platform. That was a good move because we saved time when it came to resolving issues on the user side. We had a few users in every department, and we tried to discover what would happen if we implemented this tool. That is my approach to being safe with such products. We can do things without any technical training and can disconnect users around the world using one switch. For new features, I'm a big fan of using a proof of concept
77 Views 0 Likes Read More
Embark on a culinary journey through the ever-evolving world of digital leadership with our third edition of the CIONET Cookbook: Recipes for Digital Success. Unveiling the intricate trilemma faced by today’s Master Chefs, our trailblazing European CIOs address a challenge at the nexus of customer interests, digital transformation strategies, and IT modernisation. Their secret? Synchronising the gearing between customer, business, and technology to create a frictionless movement through the digital landscape.
The CIONET Cookbook uses the analogy of a five-star restaurant to explain the importance of optimally integrated technology, with the CIO as Master Chef. In order to provide the best service to its customers, a top restaurant must have the right atmosphere, an inviting menu, a well-equipped kitchen, talented and committed front-of-house and kitchen staff and smooth-running processes that ensure an enjoyable experience for diners.
Geopolitical tensions have dominated the headlines for over two years now. In this context, the cyber threat landscape is also evolving rapidly. The protection and security of critical infrastructure – both physical and digital – is becoming increasingly important.
In our new app, our members connect with other digital leaders from around the world to find better solutions to their challenges.
Connect with digital leaders like you
Share ideas, best practices, and new resources
Experience inspiring and thought-provoking content and conversations you can’t find anywhere else
Make better, more well-informed decisions about the topics that are most important to you
Head of IT Germany and Regional Office Lead Munich, Microsoft
IT Director, IT Thinker
Vice president IT & Compliance, VisionaryRCM (A Carlyle Grp Company)
CIONET’s mission is to help IT executives become more at ease and above all more successful in their jobs. So they can do more than just keep up with change but ultimately define it. CIONET opens up a whole new universe of opportunities in IT management.
With the largest membership of corporate digital leaders across Europe, Latin America, US and Australia, CIONET has the expertise and pioneering vision to solve or address any IT management challenge.
From our local and global events, from our publications and research to our executive education programmes, everything we do is aimed at making sure digital leaders maximise their potential.
with digital leaders who share your interests, who face the same challenges, who care about the same topics.
stories, experiences, and ideas around our shared mission.
from our exclusive events, publications and research.
inspiration, thought-provoking conversations, expert perspectives and exclusive first-hand content each and every day
and make better, more well-informed decisions on how to lead your digital business.
your potential. Realise your ambitions.
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!
Would you like to know more about CIONET, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!