Kalman Tiboldi - CTO & Founder at GemOne-TVH - Simplify or Die: Why Complexity Is the Real IT Challenge
Find out more:
Belgium 9-9-25 Squad Only Physical english
As Belgium navigates the complexities of GDPR and various data sovereignty regulations, organizations across multiple industries face both challenges and opportunities in managing their data across borders. The quest for compliance often intersects with the need for business growth, raising questions about the balance between protection and progress. How can companies effectively own and safeguard their data while ensuring compliance without stifling innovation and expansion in a multi-industry landscape?
Read MorePoland 9-9-25 Invitation Only Virtual Polish
Utrzymanie talentów w organizacji IT ulokowanej na konkurencyjnym rynku pracy to nie lada zadanie. A jeśli do tego mówimy o organizacji z sektora publicznego? O swoich i swojej organizacji doświadczeniach, metodach i programach opowie Anna Wituła z CIRF. Będzie to jak zawsze okazja do dyskusji na temat różnych sposobów na utrzymanie talentów w firmie.
Read MoreBelgium 11-9-25 Squad Only Virtual english
You’ve built the portal. Added the chatbot. Rolled out self-service. But your support lines are still ringing. And your frontline teams are still improvising. If you want digital services to feel seamless, not just look polished, this session brings you back to where value is felt: at the frontline.
Read MorePoland 11-9-25 Invitation Only Virtual Polish
W fabrykach cyberbezpieczeństwo często zależy od podwykonawców – integratorów, dostawców systemów automatyki i firm serwisowych, które mają zaskakująco szeroki dostęp do infrastruktury OT. W tej prezentacji Igor Zbyryt z BZK pokaże, jak z perspektywy końcowego użytkownika i integratora wygląda współpraca z tymi firmami oraz jakie realne ryzyka to niesie – również w kontekście NIS2. Zamiast wyliczać różnice między IT a OT, skupi się na wspólnym mianowniku i tym, co trzeba zmienić w podejściu organizacji, żeby cyber w produkcji zaczęło działać.
Read MoreBelgium 13-9-25 All Members Physical english
Join us for a scenic ride along the route of the Brabantse Pijl!This ride is suitable for all levels of cyclists and doesn’t require advanced technical skills. We’ll start at de Zoete Waters, where parking is available, and head into the charming Brabant region. Along the way, we’ll tackle some of the area’s iconic climbs — including the legendary Moskesstraat, known for its cobbled character and history in pro cycling. Expect a relaxed, friendly atmosphere and beautiful views throughout. Whether you're training, exploring, or just riding for fun, you’re more than welcome to join!
Read MoreBelgium 16-9-25 Squad Only Physical english
The system works. That’s the problem. It’s old, complex, deeply integrated, and still running your most critical operations. Everyone agrees change is needed. But no one wants to be the one who breaks it. The stakes are too high.
Read MoreGermany Sep 9, 2025 Country Members Physical german
Vom ersten Use Case zur strategischen Neuausrichtung CIONET lädt bereits zum vierten Mal zu einem exklusiven Roundtable für CIOs und Digitalverantwortliche aus Logistik und Handel ein. Im Mittelpunkt des Abends steht die Frage, wie Unternehmen ihre KI-Initiativen erfolgreich skalieren und aus ersten Use Cases echten strategischen Mehrwert schaffen. Microsoft 365 für Frontline Worker: Moderne Tools, die Mitarbeitende im Tagesgeschäft entlasten ServiceNow für Prozessintegration: Automatisierte End-to-End-Workflows – vom Schadensfall bis zur Retourenabwicklung KI-gestützte Disposition und Planung: Mit smarten Algorithmen zur optimierten Supply Chain Digitale Lieferketten und letzte Meile: Transparenz, Effizienz und Kundenzentrierung durchgängig gedacht
Read MoreBelgium Sep 13, 2025 All Members Physical english
Join us for a wonderful ride. The ride is accessible to all levels of riders and doesn't require extensive technical skills. More information will follow soon. Looking forward to ride together!
Read MoreGermany Sep 17, 2025 Country Members Physical german
Cybersecurity ist längst kein reines IT-Thema mehr – sie betrifft das gesamte Unternehmen. Doch während die Bedrohungslage zunimmt, geraten viele Security-Verantwortliche an ihre Belastungsgrenzen: zwischen 24/7-Verantwortung, wachsenden Anforderungen und dem ständigen Innovationsdruck.
Read MoreGermany Sep 17, 2025 Country Members Physical german
IT-Betrieb und Cybersicherheit stehen heute unter extremem Druck: steigende Komplexität, wachsende regulatorische Anforderungen (NIS2, DORA, KRITIS), chronische Ressourcenknappheit – und gleichzeitig eine Bedrohungslage, die keine Verzögerungen duldet. Trotzdem agieren viele IT- und Security-Teams noch immer in Silos. Die Folge: ineffiziente Abläufe, Tool-Wildwuchs, langsame Reaktion auf Vorfälle und unklare Verantwortlichkeiten.
Read MoreGermany Sep 18, 2025 Country Members Virtual german
Nachhaltigkeit ist für CIOs nicht nur ein „Nice-to-have“, sondern eine strategische Priorität – sie beeinflusst direkt die finanzielle Performance, die operative Effizienz und die langfristige Wettbewerbsfähigkeit.
Read MoreBelgium Sep 18, 2025 Country Members Physical french
La dette technique est comparable à la négligence des réparations d'une maison. Ignorer un toit qui fuit peut faire gagner du temps aujourd'hui, mais cela pourrait conduire à l'effondrement du plafond plus tard. Pour remédier à la dette technique, il faut trouver et réparer ces fuites dès maintenant et mettre en place un plan d'entretien de la maison afin qu'elle soit prête pour les extensions futures. Pour résoudre ces problèmes, il faut définir des priorités stratégiques, communiquer clairement avec les parties prenantes et établir une feuille de route à long terme pour la modernisation. Cet événement se déroulera entièrement en français.
Read MoreGermany Sep 9, 2025 Country Members Physical german
Vom ersten Use Case zur strategischen Neuausrichtung CIONET lädt bereits zum vierten Mal zu einem exklusiven Roundtable für CIOs und Digitalverantwortliche aus Logistik und Handel ein. Im Mittelpunkt des Abends steht die Frage, wie Unternehmen ihre KI-Initiativen erfolgreich skalieren und aus ersten Use Cases echten strategischen Mehrwert schaffen. Microsoft 365 für Frontline Worker: Moderne Tools, die Mitarbeitende im Tagesgeschäft entlasten ServiceNow für Prozessintegration: Automatisierte End-to-End-Workflows – vom Schadensfall bis zur Retourenabwicklung KI-gestützte Disposition und Planung: Mit smarten Algorithmen zur optimierten Supply Chain Digitale Lieferketten und letzte Meile: Transparenz, Effizienz und Kundenzentrierung durchgängig gedacht
Read MoreBelgium Sep 13, 2025 All Members Physical english
Join us for a wonderful ride. The ride is accessible to all levels of riders and doesn't require extensive technical skills. More information will follow soon. Looking forward to ride together!
Read MoreGermany Sep 17, 2025 Country Members Physical german
Cybersecurity ist längst kein reines IT-Thema mehr – sie betrifft das gesamte Unternehmen. Doch während die Bedrohungslage zunimmt, geraten viele Security-Verantwortliche an ihre Belastungsgrenzen: zwischen 24/7-Verantwortung, wachsenden Anforderungen und dem ständigen Innovationsdruck.
Read MoreGermany Sep 17, 2025 Country Members Physical german
IT-Betrieb und Cybersicherheit stehen heute unter extremem Druck: steigende Komplexität, wachsende regulatorische Anforderungen (NIS2, DORA, KRITIS), chronische Ressourcenknappheit – und gleichzeitig eine Bedrohungslage, die keine Verzögerungen duldet. Trotzdem agieren viele IT- und Security-Teams noch immer in Silos. Die Folge: ineffiziente Abläufe, Tool-Wildwuchs, langsame Reaktion auf Vorfälle und unklare Verantwortlichkeiten.
Read MoreGermany Sep 18, 2025 Country Members Virtual german
Nachhaltigkeit ist für CIOs nicht nur ein „Nice-to-have“, sondern eine strategische Priorität – sie beeinflusst direkt die finanzielle Performance, die operative Effizienz und die langfristige Wettbewerbsfähigkeit.
Read MoreBelgium Sep 18, 2025 Country Members Physical french
La dette technique est comparable à la négligence des réparations d'une maison. Ignorer un toit qui fuit peut faire gagner du temps aujourd'hui, mais cela pourrait conduire à l'effondrement du plafond plus tard. Pour remédier à la dette technique, il faut trouver et réparer ces fuites dès maintenant et mettre en place un plan d'entretien de la maison afin qu'elle soit prête pour les extensions futures. Pour résoudre ces problèmes, il faut définir des priorités stratégiques, communiquer clairement avec les parties prenantes et établir une feuille de route à long terme pour la modernisation. Cet événement se déroulera entièrement en français.
Read MoreD2C gains clear view into its internal network with Trend Micro
Gains clear view into its internal network with Trend Micro
OVERVIEW
Established in 2000 by NTT Docomo, Dentsu, and NTT Advertising, the D2C integrated digital marketing group is highly regarded for its mobile advertising and is expanding to take its digital market-based activities from Japan to the rest of Asia and beyond. As a digital marketing company, security is important and it swiftly acquired PrivacyMark and an ISMS certification. Since targeted attacks and internal crime have recently become more prevalent, the company has also implemented security awareness training.
CHALLENGES
D2C employees have access to a range of information in their work. “We manage web access and software using whitelists, but employees can use just about anything if they ask,” says D2C’s Yosuke Nohira. “Risk is inherent, so security is always important,” adds D2C’s Tatsuya Suzuki.
Increased damage from targeted attacks worldwide led D2C to shift its approach to IT in 2012 from information management to information security and overhaul its security. Out went antivirus software for personal use and in came Trend Micro™ OfficeScan™ to centralize virus detection and countermeasures. “The trial edition was extremely light,” recalls Nohira.
However, in 2014 an incident with its ASP email service led D2C to reconsider its security measures. “We didn’t know what was happening in our internal network, and information was potentially being leaked so visualization became an urgent issue,” says Nohira.
We have been able to greatly reduce the amount of time we spend on security management and operations.
Yosuke Nohiro
Assistant Manager, Group Management Department,
Corporate Division, D2C Inc.
WHY TREND
D2C started looking for a solution to detect invisible threats and check for information leaks. It implemented Deep Discovery Inspector and took advantage of the Trend Micro Connected Threat Defense, which provides a layered approach to security that prevents, detects, and responds to threats.
“Network visualization and detecting unknown threats were key. Furthermore, the advantages of great manageability provided by using the same pattern file as OfficeScan, a single point of contact, and automated responses with a Connected Threat Defense were attractive,” says Nohira.
SOLUTION
Deep Discovery Inspector monitors traffic with mirror ports and visualizes communication between a network and the internet. The sandbox inspects suspicious files, which met D2C’s requirements.
Deep Discovery Inspector sends detected threat information to OfficeScan via Trend Micro Control Manager. This enables threat detection and blocking, even for threats which cannot be detected by pattern files on the client side.
RESULTS
D2C succeeded in getting a clearer picture inside their network with Deep Discovery Inspector. “Visualization of the network showed us a lot of suspicious email slipped through the spam filter,” says Mr. Nohira.
Deep Discovery Inspector, thanks to its integration with OfficeScan, detected information and D2C isolated suspicious devices. Suspicious files and URLs/IP addresses that were detected were handled manually – not processed or blocked. However, this recently changed. “Just after the WannaCry ransomware caused a global uproar, we saw a massive increase in suspicious email, sometimes a few hundred a day. We couldn’t keep up, so we made changes to ensure suspicious files, URLs, and IP addresses were automatically isolated, and got through it without damage,” says Nohira. There has been no impact on business through false detection and the operational load has decreased by half.
Also, by adopting Deep Discovery Inspector’s threat levels, D2C has a company-wide standard for situations requiring an urgent response, allowing anyone to respond appropriately. “Deep Discovery Inspector reports are really helpful. We can identify the kind of attack and if there is a risk of information leakage, so it’s easier to explain things to management,” says Suzuki.
WHAT'S NEXT
“We used to just assume we were alright, but Deep Discovery Inspector showed us the real state of affairs. Our CISO highlighted the potential for cyberattacks to be launched against NTT Docomo and Dentsu through D2C, so we will keep concentrating on security, firstly focusing on email security and other countermeasures,” says Suzuki. “We have a small security team meaning a full SIEM implementation is unrealistic, so we want to leverage Trend Micro’s Connected Threat Defense and correlation analysis to create something similar,” adds Nohira.
91 Views 0 Likes Read More
Embark on a culinary journey through the ever-evolving world of digital leadership with our third edition of the CIONET Cookbook: Recipes for Digital Success. Unveiling the intricate trilemma faced by today’s Master Chefs, our trailblazing European CIOs address a challenge at the nexus of customer interests, digital transformation strategies, and IT modernisation. Their secret? Synchronising the gearing between customer, business, and technology to create a frictionless movement through the digital landscape.
The CIONET Cookbook uses the analogy of a five-star restaurant to explain the importance of optimally integrated technology, with the CIO as Master Chef. In order to provide the best service to its customers, a top restaurant must have the right atmosphere, an inviting menu, a well-equipped kitchen, talented and committed front-of-house and kitchen staff and smooth-running processes that ensure an enjoyable experience for diners.
Geopolitical tensions have dominated the headlines for over two years now. In this context, the cyber threat landscape is also evolving rapidly. The protection and security of critical infrastructure – both physical and digital – is becoming increasingly important.
In our new app, our members connect with other digital leaders from around the world to find better solutions to their challenges.
Connect with digital leaders like you
Share ideas, best practices, and new resources
Experience inspiring and thought-provoking content and conversations you can’t find anywhere else
Make better, more well-informed decisions about the topics that are most important to you
Head of IT Germany and Regional Office Lead Munich, Microsoft
IT Director, IT Thinker
Vice president IT & Compliance, VisionaryRCM (A Carlyle Grp Company)
CIONET’s mission is to help IT executives become more at ease and above all more successful in their jobs. So they can do more than just keep up with change but ultimately define it. CIONET opens up a whole new universe of opportunities in IT management.
With the largest membership of corporate digital leaders across Europe, Latin America, US and Australia, CIONET has the expertise and pioneering vision to solve or address any IT management challenge.
From our local and global events, from our publications and research to our executive education programmes, everything we do is aimed at making sure digital leaders maximise their potential.
with digital leaders who share your interests, who face the same challenges, who care about the same topics.
stories, experiences, and ideas around our shared mission.
from our exclusive events, publications and research.
inspiration, thought-provoking conversations, expert perspectives and exclusive first-hand content each and every day
and make better, more well-informed decisions on how to lead your digital business.
your potential. Realise your ambitions.
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!
Would you like to know more about CIONET, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!