Kalman Tiboldi - CTO & Founder at GemOne-TVH - Simplify or Die: Why Complexity Is the Real IT Challenge
Find out more:
Belgium 9-9-25 Squad Only Physical english
As Belgium navigates the complexities of GDPR and various data sovereignty regulations, organizations across multiple industries face both challenges and opportunities in managing their data across borders. The quest for compliance often intersects with the need for business growth, raising questions about the balance between protection and progress. How can companies effectively own and safeguard their data while ensuring compliance without stifling innovation and expansion in a multi-industry landscape?
Read MorePoland 9-9-25 Invitation Only Virtual Polish
Utrzymanie talentów w organizacji IT ulokowanej na konkurencyjnym rynku pracy to nie lada zadanie. A jeśli do tego mówimy o organizacji z sektora publicznego? O swoich i swojej organizacji doświadczeniach, metodach i programach opowie Anna Wituła z CIRF. Będzie to jak zawsze okazja do dyskusji na temat różnych sposobów na utrzymanie talentów w firmie.
Read MoreBelgium 11-9-25 Squad Only Virtual english
You’ve built the portal. Added the chatbot. Rolled out self-service. But your support lines are still ringing. And your frontline teams are still improvising. If you want digital services to feel seamless, not just look polished, this session brings you back to where value is felt: at the frontline.
Read MorePoland 11-9-25 Invitation Only Virtual Polish
W fabrykach cyberbezpieczeństwo często zależy od podwykonawców – integratorów, dostawców systemów automatyki i firm serwisowych, które mają zaskakująco szeroki dostęp do infrastruktury OT. W tej prezentacji Igor Zbyryt z BZK pokaże, jak z perspektywy końcowego użytkownika i integratora wygląda współpraca z tymi firmami oraz jakie realne ryzyka to niesie – również w kontekście NIS2. Zamiast wyliczać różnice między IT a OT, skupi się na wspólnym mianowniku i tym, co trzeba zmienić w podejściu organizacji, żeby cyber w produkcji zaczęło działać.
Read MoreBelgium 13-9-25 All Members Physical english
Join us for a scenic ride along the route of the Brabantse Pijl!This ride is suitable for all levels of cyclists and doesn’t require advanced technical skills. We’ll start at de Zoete Waters, where parking is available, and head into the charming Brabant region. Along the way, we’ll tackle some of the area’s iconic climbs — including the legendary Moskesstraat, known for its cobbled character and history in pro cycling. Expect a relaxed, friendly atmosphere and beautiful views throughout. Whether you're training, exploring, or just riding for fun, you’re more than welcome to join!
Read MoreBelgium 16-9-25 Squad Only Physical english
The system works. That’s the problem. It’s old, complex, deeply integrated, and still running your most critical operations. Everyone agrees change is needed. But no one wants to be the one who breaks it. The stakes are too high.
Read MoreGermany Sep 9, 2025 Country Members Physical german
Vom ersten Use Case zur strategischen Neuausrichtung CIONET lädt bereits zum vierten Mal zu einem exklusiven Roundtable für CIOs und Digitalverantwortliche aus Logistik und Handel ein. Im Mittelpunkt des Abends steht die Frage, wie Unternehmen ihre KI-Initiativen erfolgreich skalieren und aus ersten Use Cases echten strategischen Mehrwert schaffen. Microsoft 365 für Frontline Worker: Moderne Tools, die Mitarbeitende im Tagesgeschäft entlasten ServiceNow für Prozessintegration: Automatisierte End-to-End-Workflows – vom Schadensfall bis zur Retourenabwicklung KI-gestützte Disposition und Planung: Mit smarten Algorithmen zur optimierten Supply Chain Digitale Lieferketten und letzte Meile: Transparenz, Effizienz und Kundenzentrierung durchgängig gedacht
Read MoreBelgium Sep 13, 2025 All Members Physical english
Join us for a wonderful ride. The ride is accessible to all levels of riders and doesn't require extensive technical skills. More information will follow soon. Looking forward to ride together!
Read MoreGermany Sep 17, 2025 Country Members Physical german
Cybersecurity ist längst kein reines IT-Thema mehr – sie betrifft das gesamte Unternehmen. Doch während die Bedrohungslage zunimmt, geraten viele Security-Verantwortliche an ihre Belastungsgrenzen: zwischen 24/7-Verantwortung, wachsenden Anforderungen und dem ständigen Innovationsdruck.
Read MoreGermany Sep 17, 2025 Country Members Physical german
IT-Betrieb und Cybersicherheit stehen heute unter extremem Druck: steigende Komplexität, wachsende regulatorische Anforderungen (NIS2, DORA, KRITIS), chronische Ressourcenknappheit – und gleichzeitig eine Bedrohungslage, die keine Verzögerungen duldet. Trotzdem agieren viele IT- und Security-Teams noch immer in Silos. Die Folge: ineffiziente Abläufe, Tool-Wildwuchs, langsame Reaktion auf Vorfälle und unklare Verantwortlichkeiten.
Read MoreGermany Sep 18, 2025 Country Members Virtual german
Nachhaltigkeit ist für CIOs nicht nur ein „Nice-to-have“, sondern eine strategische Priorität – sie beeinflusst direkt die finanzielle Performance, die operative Effizienz und die langfristige Wettbewerbsfähigkeit.
Read MoreBelgium Sep 18, 2025 Country Members Physical french
La dette technique est comparable à la négligence des réparations d'une maison. Ignorer un toit qui fuit peut faire gagner du temps aujourd'hui, mais cela pourrait conduire à l'effondrement du plafond plus tard. Pour remédier à la dette technique, il faut trouver et réparer ces fuites dès maintenant et mettre en place un plan d'entretien de la maison afin qu'elle soit prête pour les extensions futures. Pour résoudre ces problèmes, il faut définir des priorités stratégiques, communiquer clairement avec les parties prenantes et établir une feuille de route à long terme pour la modernisation. Cet événement se déroulera entièrement en français.
Read MoreGermany Sep 9, 2025 Country Members Physical german
Vom ersten Use Case zur strategischen Neuausrichtung CIONET lädt bereits zum vierten Mal zu einem exklusiven Roundtable für CIOs und Digitalverantwortliche aus Logistik und Handel ein. Im Mittelpunkt des Abends steht die Frage, wie Unternehmen ihre KI-Initiativen erfolgreich skalieren und aus ersten Use Cases echten strategischen Mehrwert schaffen. Microsoft 365 für Frontline Worker: Moderne Tools, die Mitarbeitende im Tagesgeschäft entlasten ServiceNow für Prozessintegration: Automatisierte End-to-End-Workflows – vom Schadensfall bis zur Retourenabwicklung KI-gestützte Disposition und Planung: Mit smarten Algorithmen zur optimierten Supply Chain Digitale Lieferketten und letzte Meile: Transparenz, Effizienz und Kundenzentrierung durchgängig gedacht
Read MoreBelgium Sep 13, 2025 All Members Physical english
Join us for a wonderful ride. The ride is accessible to all levels of riders and doesn't require extensive technical skills. More information will follow soon. Looking forward to ride together!
Read MoreGermany Sep 17, 2025 Country Members Physical german
Cybersecurity ist längst kein reines IT-Thema mehr – sie betrifft das gesamte Unternehmen. Doch während die Bedrohungslage zunimmt, geraten viele Security-Verantwortliche an ihre Belastungsgrenzen: zwischen 24/7-Verantwortung, wachsenden Anforderungen und dem ständigen Innovationsdruck.
Read MoreGermany Sep 17, 2025 Country Members Physical german
IT-Betrieb und Cybersicherheit stehen heute unter extremem Druck: steigende Komplexität, wachsende regulatorische Anforderungen (NIS2, DORA, KRITIS), chronische Ressourcenknappheit – und gleichzeitig eine Bedrohungslage, die keine Verzögerungen duldet. Trotzdem agieren viele IT- und Security-Teams noch immer in Silos. Die Folge: ineffiziente Abläufe, Tool-Wildwuchs, langsame Reaktion auf Vorfälle und unklare Verantwortlichkeiten.
Read MoreGermany Sep 18, 2025 Country Members Virtual german
Nachhaltigkeit ist für CIOs nicht nur ein „Nice-to-have“, sondern eine strategische Priorität – sie beeinflusst direkt die finanzielle Performance, die operative Effizienz und die langfristige Wettbewerbsfähigkeit.
Read MoreBelgium Sep 18, 2025 Country Members Physical french
La dette technique est comparable à la négligence des réparations d'une maison. Ignorer un toit qui fuit peut faire gagner du temps aujourd'hui, mais cela pourrait conduire à l'effondrement du plafond plus tard. Pour remédier à la dette technique, il faut trouver et réparer ces fuites dès maintenant et mettre en place un plan d'entretien de la maison afin qu'elle soit prête pour les extensions futures. Pour résoudre ces problèmes, il faut définir des priorités stratégiques, communiquer clairement avec les parties prenantes et établir une feuille de route à long terme pour la modernisation. Cet événement se déroulera entièrement en français.
Read MoreAziende Industriali di Lugano (AIL) SA locks down its utility grids and IT networks with Trend Micro
Locks down its utility grids and IT networks with Trend Micro
OVERVIEW
Aziende Industriali di Lugano (AIL) SA is a Swiss corporation that produces, transforms, transports, distributes and markets energy, drinking water, water for industrial use, and raw materials for energy production. The company’s products and services are purchased every day by more than 110,000 individuals and businesses in the 56 municipalities of the Sottoceneri region of the Swiss canton of Ticino, which extends from Monte Ceneri to the Swiss border at Novazzano. This makes AIL the most important retail and wholesale distributor of water, natural gas, electricity, and heat of the Ticino canton.
CHALLENGES
Since 2015, Aziende Industriali di Lugano (AIL) has needed a solution that could effectively monitor the entire utilities grid and IT network in order to control the provision of electricity, water, and gas and to take quick action in the event of alarms. “From 2015 to 2017, we tested various solutions, not including Trend Micro, but none of them were able to fully meet our needs, especially in relation to monitoring our utilities grid,” said Michele Rusconi, head of ICT & FO Infrastructures for AIL.
WHY TREND
“One day, our partner MTF Info Centro SA, which had recently begun working with Trend Micro, suggested we try out their network inspection solutions. The monitoring and analysis of traditional IT networks proved to be excellent right from the start, but the solution didn’t yet support utilities grids.” Over the next six months, though, the research team at Trend Micro developed recognition of technical protocols to meet AIL’s needs. “That was when we knew it was the product for us,” Michele Rusconi continued. “Trend Micro was the only company to provide analysis of flows of the entire network, and we also very much appreciated Trend Micro’s support of and focus on us, and this continues to today.” Subsequently, in order to achieve full integration, AIL also chose to adopt the Trend Micro suite for endpoint protection.
"The greatest benefit so far is something we experienced recently when we were the targets of an attack that took advantage of a vulnerability in our systems. The Trend Micro solutions detected it immediately, and in just half a day we were able to apply the right patches. Most likely, without Deep Discovery Inspector, we would have lost an entire day without getting a clear idea of what had happened."
Michele Rusconi - Head of ICT & FO Infrastructures for AIL
SOLUTION
In order to meet AIL’s security needs, Trend Micro came up with a custom protection strategy that monitors the IT and utilities networks and controls the endpoints. The networks are now protected by Deep Discovery, specifically Deep Discovery Inspector for detection and Deep Discovery Analyzer for remediation. For the endpoints, Aziende Industriali di Lugano use the Enterprise Security Suite. These solutions communicate with each other in real time and are managed centrally by the Trend Micro Control Manager.
The cornerstone of this project is Trend Micro Deep Discovery, the most complete solution of its category in combating APT attacks. Not only does Deep Discovery have the tools it takes to detect zero-day exploits and other threats throughout the network and during all phases of an attack, it has also been designed to provide in-depth analysis tools to prevent future attacks. Deep Discovery’s network detention capabilities and custom sandbox analysis can detect the spear phishing email messages that are often at the heart of the attack, identify the malware, and discover the external command-and-control (C&C) sites used by the cybercriminals. Deep Discovery Inspector, in particular, is a network device that provides full control over all network traffic in order to detect any aspect of a targeted attack. Deep Discovery Inspector monitors all network ports and more than 100 protocols to provide the broadest protection available. Specialized detection engines and custom sandboxing identify and analyze malware, C&C communications, and the evasive actions of attackers that are invisible to standard security solutions. Deep Discovery Analyzer, in turn, provides analyses in custom sandboxes, thereby increasing the value of security products, such as endpoint protection, web and email gateways, network security, and other Deep Discovery products.
THE BENEFITS
“The greatest benefit so far is something we experienced recently when we were the targets of an attack that took advantage of a vulnerability in our systems,” said Michele Rusconi. “The Trend Micro solutions detected it immediately, and in just half a day we were able to apply the right patches. Most likely, without Deep Discovery Inspector, we would have lost an entire day without getting a clear idea of what had happened.” As the head of ICT & FO Infrastructures, Rusconi is greatly satisfied with Trend Micro, especially, as he says, “for the convenience of having a complete view over all that transits over the network, not just in relation to threats, but also to protocols that may not always work properly and the ability to make fixes.”
FUTURE DEVELOPMENTS
At Aziende Industriali di Lugano, they have a great many ideas for development. “From an anti-spam project based on Trend Micro solutions to an assessment of our protection in relation to SCADA,” Michele Rusconi concluded, “[with the goal] of having increasing levels of integration and collaboration between the solutions we use in order to ensure maximum security for our company’s critical infrastructures and, in turn, for our customers.”
88 Views 0 Likes Read More
Embark on a culinary journey through the ever-evolving world of digital leadership with our third edition of the CIONET Cookbook: Recipes for Digital Success. Unveiling the intricate trilemma faced by today’s Master Chefs, our trailblazing European CIOs address a challenge at the nexus of customer interests, digital transformation strategies, and IT modernisation. Their secret? Synchronising the gearing between customer, business, and technology to create a frictionless movement through the digital landscape.
The CIONET Cookbook uses the analogy of a five-star restaurant to explain the importance of optimally integrated technology, with the CIO as Master Chef. In order to provide the best service to its customers, a top restaurant must have the right atmosphere, an inviting menu, a well-equipped kitchen, talented and committed front-of-house and kitchen staff and smooth-running processes that ensure an enjoyable experience for diners.
Geopolitical tensions have dominated the headlines for over two years now. In this context, the cyber threat landscape is also evolving rapidly. The protection and security of critical infrastructure – both physical and digital – is becoming increasingly important.
In our new app, our members connect with other digital leaders from around the world to find better solutions to their challenges.
Connect with digital leaders like you
Share ideas, best practices, and new resources
Experience inspiring and thought-provoking content and conversations you can’t find anywhere else
Make better, more well-informed decisions about the topics that are most important to you
Head of IT Germany and Regional Office Lead Munich, Microsoft
IT Director, IT Thinker
Vice president IT & Compliance, VisionaryRCM (A Carlyle Grp Company)
CIONET’s mission is to help IT executives become more at ease and above all more successful in their jobs. So they can do more than just keep up with change but ultimately define it. CIONET opens up a whole new universe of opportunities in IT management.
With the largest membership of corporate digital leaders across Europe, Latin America, US and Australia, CIONET has the expertise and pioneering vision to solve or address any IT management challenge.
From our local and global events, from our publications and research to our executive education programmes, everything we do is aimed at making sure digital leaders maximise their potential.
with digital leaders who share your interests, who face the same challenges, who care about the same topics.
stories, experiences, and ideas around our shared mission.
from our exclusive events, publications and research.
inspiration, thought-provoking conversations, expert perspectives and exclusive first-hand content each and every day
and make better, more well-informed decisions on how to lead your digital business.
your potential. Realise your ambitions.
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!
Would you like to know more about CIONET, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!