<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2528533714139722&amp;ev=PageView&amp;noscript=1">
New call-to-action
https://4295993.fs1.hubspotusercontent-na1.net/hubfs/4295993/INT_CIONET-International/VIDEO/CIONET_HM.mp4
CIONET - What's next

Connecting ambitious digital leaders and businesses around the globe.

Catch up on the upcoming CIONET Events

             
Banner

Belgium Dec 4, 2025 Invitation Only Physical english

Women of CIONET - Christmas Dinner

CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT.

Read More
Banner

International Dec 9, 2025 Public Virtual english

CIONET Awards 2026: Part 1

The CIONET Awards 2026: Part 1, the premier celebration of excellence in digital mission and leadership. During this event the spotlight falls on two of the most critical arenas in modern enterprise: Applications & Architecture and Data & AI. Prepare for a dynamic session where each nominee will present their groundbreaking achievements. 

Read More
Banner

Netherlands Dec 9, 2025 Invitation Only Physical english

Driving Business Value Through Data-Driven IT Cost Management

  Digital transformation and ongoing economic uncertainty are intensifying the pressure on IT leaders to do more with less. In this environment, gaining precise control over IT costs—while continuing to deliver effective, efficient, and innovative technology operations—is more critical than ever. At this exclusive CIONET Executive Roundtable, hosted in partnership with It’s Value, we will explore how Technology Business Management (TBM) principles can help CIOs and IT leaders make data-driven financial decisions that drive measurable business value. Key Discussion Themes Turning data insights into smarter IT investment decisions Setting priorities for cost optimisation and maximising ROI Quantifying and communicating the business value of IT initiatives Evaluating the principles of FinOps and the implications of public, private, and hybrid cloud environments for cost management Embedding effective change management to drive adoption and alignment Achieving tangible business outcomes from AI initiatives while maintaining fiscal discipline The evening will also feature a fireside chat with Sunil Anand, Global Head of Technology Business Management at National Grid. Sunil will share practical lessons and key milestones, retracing the National Grid cost management journey. This dinner offers a unique opportunity to: Exchange experiences with peers facing similar challenges Gain insights from TBM experts and industry practitioners Reassess your own IT financial strategy in a relaxed, collegial setting Join us for an evening of insight, discussion, and connection—designed to help you strengthen IT’s role as a true business value driver.

Read More
Banner

Italy Dec 10, 2025 Invitation Only Physical italian

Observability - The New Business Catalyst

Questa roundtable esclusiva offrirà a CIO, CISO e Leader di ITOps/Engineering un confronto diretto per individuare le migliori strategie di Innovazione che, attraverso l'observability, ottimizzino il Return of Investment. 

Read More
Banner

Belgium Dec 11, 2025 Country Members Physical english

Next Generation Digital Twins - CIONET Belgium: Community Event

Imagine being able to monitor, simulate, and optimise an entire city, factory, or supply chain in real time. Next-generation digital twins are making this vision a reality, transforming how we manage and understand complex systems. By creating dynamic virtual replicas of physical assets and processes, digital twins allow organisations to predict issues, optimize performance, and make data-driven decisions with unprecedented accuracy.This event will explore how digital twins are being used across industries to revolutionize the way we operate and maintain large-scale, intricate systems—whether it’s the infrastructure of a smart city, the efficiency of a factory floor, or the resilience of global supply chains.Examples of Digital Twins in Action:Smart Cities: Urban planners can use digital twins to simulate traffic flow, monitor energy usage, or predict the impact of weather events on infrastructure. This enables cities to optimize resources and improve the quality of life for their citizens.Factories of the Future: Manufacturing plants are leveraging digital twins to monitor equipment in real time, prevent downtime, and optimize production lines. With predictive analytics, factories can avoid costly breakdowns and improve overall efficiency.Supply Chain Management: Complex supply chains, spanning continents and industries, can be modeled as digital twins to track shipments, simulate disruptions, and optimize logistics. Businesses can reduce inefficiencies and respond faster to market demands.Key Themes:Real-Time Monitoring and Simulation: How digital twins provide real-time insights into complex systems, allowing for dynamic response and optimization.Predictive Power: Leveraging AI and data analytics, digital twins help organisations predict and mitigate issues before they happen, from equipment failures to supply chain bottlenecks.Scalability Across Ecosystems: Digital twins aren’t limited to individual assets—learn how they can be scaled across entire ecosystems like smart cities or global supply chains for maximum impact.Building Trust and Security: With digital twins handling critical infrastructure and sensitive data, what are the security and governance frameworks needed to ensure trust in these virtual systems?Why You Should Attend:Next-generation digital twins are no longer just a concept—they are revolutionizing industries by offering a new way to manage complexity. Whether you’re looking to optimize a city, factory, or supply chain, this event will provide practical insights into how digital twins can transform your organisation’s operations and drive future innovation.

Read More
Banner

Netherlands Dec 11, 2025 Invitation Only Physical dutch

FastForward Insights #Security

Navigating tommorrow's threatscape: Cybersecurity insights for digital leaders. Op 28 november in de 3D Makers Zone in Haarlem.

Read More

Recent Cases

Please Log In with your CIONET account first

How Atlassian Enforces Best Practices in Its Cloud Infrastructure

How Atlassian Enforces Best Practices in Its Cloud Infrastructure

INTRODUCTION

This is an updated version of an October 2019 post from the ATLASSIAN Community – How Atlassian enforces Best Practices in its Cloud Infrastructure. Link to original blog post.

The majority of Atlassian’s business runs on Amazon Web Services (AWS). Due to the large scale of our infrastructure, we allow for teams to manage their own changes without a centralised review. Atlassian operates on a “trust, but verify” model: We promote a set of best practices and guidelines for teams to follow and we then check that these best practices are being implemented. Where the target is missed, we help the team readjust.

The most widely known example are S3 buckets that are publicly available and can be accessed by anyone. Countless companies have been caught off guard by accidentally putting confidential information in public buckets. It has prompted Amazon to offer additional safeguards in the form of bucket-level overrides to deny any sort of public object, acknowledging the severity of this problem.

 

At Atlassian, we have added a new tool to our vulnerability management belt so we can assist teams in following the best practices we have established: Trend Micro Cloud One™ – Conformity which specialises in continuously scanning the configuration of cloud infrastructure.

While they offer support for multiple cloud providers as well as checks for all five pillars of the well-architected framework, we use the tool for its “Security” checks for AWS.

 
 
 

ADOPTION

Nearly all of our AWS accounts are being scanned on an hourly basis and the results are reported to the security team. To enable our developers to move fast and remove security as a gatekeeper we didn’t stop there, though. Instead, we integrated Cloud One - Conformity with our vulnerability pipeline which files Jira tickets for any findings we discover through these scans. Our developers live and breathe Jira day in, day out, so surfacing this information here is much more natural for them than having to look for these findings in some third party tool or needing security as an intermediary.

Anyone who has ever tried to deploy a security scanner inside an organisation knows that they are never set-and-forget. Instead, they require fine-tuning to ensure they only produce meaningful results. Every enterprise environment is different and particularly at scale, edge cases exist that scanners would not anticipate. For example, our internal PaaS enforces a set of best practices that have been developed in collaboration with the security team. Some of the configurations that come out of this are secure in this context, but the scanner will still report on them because they generally wouldn’t be. As a result, we spent some time refining the set of rules we care about.

In our first iteration, we decided to focus on our highest severity AWS accounts. These accounts hold our customers' data or manage our infrastructure, for example our CI/CD. In addition, we narrowed down the initial set of rules to those we consider high severity. We then spent some time working closely with those teams that own these important AWS accounts to ensure all findings provide a meaningful security benefit. Based on this feedback, we adjusted the configuration of our rules to fit right into our organisation. Only for this subset of accounts & rules are we creating Jira tickets, as we have verified the quality of these findings.

The next iteration has already started and is expanding out the scope of accounts having Jira tickets created as well as including more rules that are being reviewed. Eventually, all our AWS accounts will be under our security SLA and every check will have been reviewed and configured to the specifics of our environment.

We also continue working closely with the Conformity team, who are responsive to our feedback and quickly fix any bugs we discover in their product. They are great at including our feature requests in their roadmap and always keep us informed on when work is starting on anything we care about. This way, we keep increasing the value their service provides to us which directly translates into an ever increasing security posture.

When the security researcher “benmap” presented at DEF CON 27 recently, the community learned just how vulnerable public EBS volumes can leave a company, reminding everyone that not just S3 buckets can be made public and contain sensitive information. Naturally, we investigated our own environment for such public volumes. Since Conformity was already actively scanning all of our accounts, we were able to perform a fast investigation that gave a complete picture of all public volumes and we could quickly confirm that none of them contained any sensitive information. In addition, we will be alerted to any future volumes that are being made public and can ensure we are not exposing any sensitive information through them.

As a helpful side-effect these scans provide a forcing function for teams to go into their own environments and clean up any stale resources left over from development experiments. Atlassian enables our developers to iterate quickly, try out new features and innovate on our services. As a security team, we are responsible for making sure that these experiments happen within a suitable environment and in a way that don’t put customer data at risk. Part of this responsibility is making sure that unused resources are being cleaned up and Conformity helps us achieve this. We notify developers about resources with insecure configurations and sometimes developers realise they do not need those resources anymore and delete them.

 

With a tool like Trend Micro Cloud One - Conformity in our arsenal, we now have ongoing assurance that our cloud infrastructure is in a good and secure state.

We go beyond just vulnerabilities and use it to actually enforce best practices, which ensures our cloud security posture is best of breed.

Checkout our CIONET COOKBOOK

cookbook

Embark on a culinary journey through the ever-evolving world of digital leadership with our third edition of the CIONET Cookbook: Recipes for Digital Success. Unveiling the intricate trilemma faced by today’s Master Chefs, our trailblazing European CIOs address a challenge at the nexus of customer interests, digital transformation strategies, and IT modernisation. Their secret? Synchronising the gearing between customer, business, and technology to create a frictionless movement through the digital landscape.

The CIONET Cookbook uses the analogy of a five-star restaurant to explain the importance of optimally integrated technology, with the CIO as Master Chef. In order to provide the best service to its customers, a top restaurant must have the right atmosphere, an inviting menu, a well-equipped kitchen, talented and committed front-of-house and kitchen staff and smooth-running processes that ensure an enjoyable experience for diners.

CIONET TV

 
Banner

Gunter Van Craen - CDIO at Bekaert - Embracing Digital Transformation

Banner

Raul Jimenez - Transforming Data and AI Governance at Sika

Banner

Carla Milovanov - Navigating Transformation: Insights from Landal's CIO

Banner

Claudio Balbo - Senior Director and Head of IT Architecture at Intesa Sanpaolo - Revolutionizing Core Banking

Banner

Angélique Bidault-Verliac - CDPO, SNCF Connect & Tech - Data, AI, and Customer-First Transformation

Banner

Rajat Dhawan - Group Chief Digital & Technology Officer at Soho House - How Data & AI Enhance Member Experiences

CIONET Reports

 
Banner
Get your copy

How CIOs drive game changing results at scale?

The role of the CIO has evolved from managing systems to shaping outcomes: growth, resilience, and competitive edge are now won or lost in the technology arena. Today ’ s CIOs must balance stability with innovation, control costs while attracting scarce talent, and modernise legacy infrastructure while adopting emerging technologies.

Banner
Get your copy

A research proposal_AI and the Human Experience

As AI transitions from a specialised tool to an all-pervasive force, understanding its profound implications for our human lives is no longer merely academic but an urgent imperative for social well-being and strategic preparedness.

Banner
Get your copy

Cybersecurity in critical infrastructure

Geopolitical tensions have dominated the headlines for over two years now. In this context, the cyber threat landscape is also evolving rapidly. The protection and security of critical infrastructure – both physical and digital – is becoming increasingly important.

Join over 10.000 digital leaders worldwide

in our exclusive CIO community

Latest CIONET News

Join your local CIONET community

Discover the CIONET app

Staying ahead of trends and connecting with other CIOs was never easier.

In our new app, our members connect with other digital leaders from around the world to find better solutions to their challenges.

Connect with digital leaders like you

Share ideas, best practices, and new resources

Experience inspiring and thought-provoking content and conversations you can’t find anywhere else

Make better, more well-informed decisions about the topics that are most important to you

Anna Kopp (1)

Anna Kopp

Head of IT Germany and Regional Office Lead Munich, Microsoft

“The CIONET App allows us to learn from eachother and and find the courage to be authentic by hearing stories from others! Thanks to Tobias and the whole team for bringing us together:-) ”
Mauricio Amaro

Mauricio Amaro

IT Director, IT Thinker

“The main things that I would like to get from our community of Digital Leaders are: networking, share experiences, share best practices and successful cases, and comments and recommendations about providers.”
Vijay Anand

Vijay Anand

Vice president IT & Compliance, VisionaryRCM (A Carlyle Grp Company)

“The CIONET app provides a really cool platform to network and share insights.”

About CIONET

CIONET’s mission is to help IT executives become more at ease and above all more successful in their jobs. So they can do more than just keep up with change but ultimately define it. CIONET opens up a whole new universe of opportunities in IT management.

With the largest membership of corporate digital leaders across Europe, Latin America, US and Australia, CIONET has the expertise and pioneering vision to solve or address any IT management challenge.

Why join CIONET?

From our local and global events, from our publications and research to our executive education programmes, everything we do is aimed at making sure digital leaders maximise their potential.

Connect

with digital leaders who share your interests, who face the same challenges, who care about the same topics.

Share

stories, experiences, and ideas around our shared mission.

Learn

from our exclusive events, publications and research.

Find

inspiration, thought-provoking conversations, expert perspectives and exclusive first-hand content each and every day

Grow

and make better, more well-informed decisions on how to lead your digital business.

Maximise

your potential. Realise your ambitions.

About CIONET

Join CIONET

We'd love to welcome you as the newest member of our CIONET community where Digital Leaders unite. 

You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!

Contact us

Would you like to know more about CIONET, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!