<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2528533714139722&amp;ev=PageView&amp;noscript=1">
New call-to-action
be-page-banner (1)

Welcome to CIONET Belgium

Realise your ambition! Connect with your local community of digital leaders.

See what's next

Upcoming Events

 
Banner

Belgium 21-4-26 Invitation Only Physical english

From Victim to Victor: Cyber resilience is a means, providing Business Continuity the goal

In an era where every outage, audit, and cyberattack is a test of organisational survival, resilience has become the new currency of trust. While traditional perimeter security with: firewalls, intrusion detection, and scanners, remains essential, it is no longer a sufficient guarantee against modern threats that bypass these layers to penetrate your core systems. Today, enterprises require security and continuity that are built-in, not bolted-on. This CIONET roundtable focuses on the shift from reactive disaster recovery to proactive Business Continuity. Together with experts from HPE Zerto, we will explore how organisations can transform their recovery strategies into seamless continuity models.

Read More
Banner

Belgium 23-4-26 Country Members Physical & Virtual english

CIOFEST BELGIUM: Leadership in the Agentic Era

AI is no longer confined to supporting human tasks. We are entering the agentic era, where autonomous systems act on behalf of people and organisations. These agents can gather information, make decisions, negotiate terms, and even complete transactions. The implications extend well beyond technology; they touch the very foundations of business models, governance, and leadership. For CIOs and their peers, the rise of “machine customers” and autonomous partners poses new questions: Market impact: How do you compete and create value when some customers and suppliers are machines? Governance: What trust, compliance, and accountability structures are needed when AI acts independently in financial, procurement, or customer-facing processes? Leadership: How should CIOs guide their organisations in redefining roles, responsibilities, and decision-making when agents take over parts of the value chain?Business strategy: What opportunities emerge for new revenue models, platforms, and ecosystems shaped by autonomous interaction? This session shifts the focus from the mechanics of AI agents to the decisions that will shape leadership in the next decade. It is a call for CIOs to prepare for a future where relationships, markets, and strategies are no longer limited to human-to-human interactions, but also extend to human-to-machine and machine-to-machine interactions.

Read More
Banner

Belgium 29-4-26 Invitation Only Physical english

Building Future-Ready Application Ecosystems in the Age of Intelligent Automation

This CIONET workshop is a collaborative deep-dive into the practicalities of"rewiring the building" while it’s still occupied. Drawing onKyndryl’s deep heritage in mission-critical infrastructure and their latestresearch, we will dismantle the "hidden costs" of legacyenvironments. The conversation will focus on the transition from static,monolithic structures to composable architectures that allow intelligent agentsto operate seamlessly across hybrid landscapes.

Read More

Upcoming TRIBE Events

 
Banner

April 2, 2026 Squad Session Invitation Only Virtual english

Taming the SaaS Sprawl: Tracking spend, ownership, and usage before it slips out of control

SaaS gave business units freedom: quick onboarding, no infrastructure, and instant results. But over time, that freedom turned into fragmentation. Each team now buys, renews, and configures its own stack. HR has one platform, finance has another, and marketing probably has ten. The invoices keep coming, usage keeps dropping, and no one is sure who’s accountable for what.

Read More
Banner

May 12, 2026 Squad Session Invitation Only Physical english

Product-Centric IT 2.0: Blending product and project thinking

Everyone says they’ve gone product-centric. In reality, most organisations live in a hybrid world where projects, products, and platforms overlap. Teams manage releases while still chasing deadlines, and governance still thinks in milestones rather than outcomes. The shift is underway, but the mindset hasn’t caught up.

Read More
Banner

May 19, 2026 Squad Session Invitation Only Physical english

AI vs AI in Cybersecurity: When defenders and attackers both use AI

The game has changed, clearly. Attackers have AI, defenders have AI, and both sides are learning faster than anyone expected, or maybe the attackers are just a bit faster. What used to take hours now happens in seconds, and detection windows close before alerts even appear. It’s adaptation beyond automation, and no one gets to sit still.

Read More

CIONET Partner Updates

CIONET Partner Updates

Recent Cases

Please Log In with your CIONET account first

Trend Vision One allowed this real estate firm to detect and respond 80 percent faster.

A global organization, operating across multiple locations, sought a comprehensive security solution to protect its infrastructure and ensure compliance. Trend Micro's XDR platform has provided the company with a centralized view of its environment, enabling effective threat detection, response, and management.

WHAT IS OUR PRIMARY USE CASE?

It's a perfect tool for monitoring infrastructure, including endpoints, servers, and potential attacks via networks. That's especially true for internet-visible hosts, which we can monitor directly from the tool.

We had problems with users not using legitimate tools, such as pendrives. We needed to protect hosts from external threats and third-party actors. That included monitoring behavior, scanning our infrastructure, and exploitation of vulnerabilities.

 

Trend Vision One™ absolutely gives us centralized visibility and management. Especially when we integrate it with Active Directory, we get full visibility of our endpoint and server infrastructure. That is very important. A 10 on a scale of one to 10.

 

HOW HAS IT HELPED MY ORGANIZATION?

The solution has enabled us to completely reorganize our work. I was the first person using this tool in our company, and I completely changed user behavior to become more restricted. In Poland, but also in the United States, we are very strict about abnormal usage of our tools or attempts to download tools that shouldn't be on desktops, laptops, or servers. From my point of view, we are now a completely different organization than when I joined it. Trend Micro is one of the most important security tools we have implemented.

We don't need to use an external vulnerability scanner because Trend Micro XDR has a module for that, and we can save that money. Trend Micro™ Managed XDR is quite nice because I can manage more than 2,000 endpoints. I use the playbooks with particular scenarios for incident management. It's a very nice tool. It competes with anyone on the market. Sometimes, when we detect some kind of threat and we have no idea how we should investigate, troubleshoot, or mitigate the risk, we use the managed service team with Trend Micro engineers. I'm very happy with this team. They are very good professionals.

We respond much faster thanks to the intelligence used by Trend Micro. They have very good knowledge because they have many threat sources. That is why we are reacting much faster than we would if we had to dig deeper without that knowledge and this tool. It would be absolutely impossible to manage this infrastructure by a single admin or even two security admins. We are able to detect and respond about 80 percent faster. It's not only the monitoring and alerting for classic signature threats; there is also a tool for monitoring user behavior. It would be utterly impossible to find abnormal user behavior without this type of tool.

And we have mitigated most of the false positives—more than 90 percent. About one out of 10 alerts may be a false positive. In the beginning, we had to learn about Trend Micro, what was a legitimate action and what was a suspicious or malicious action. We had to learn what the right approach was.

 

 WHAT IS MOST VALUABLE?

This product is simple to use. Sometimes, especially when new features come out, I need to spend a little bit of time discovering how they work. But overall, it's simple. The interface is quite nice.

The integration is also nice because there are many external tools that we can connect to the platform, such as configuration management tools. Because the platform is integrated, I can manage almost the whole company across our global organization. I can almost manage the infrastructure alone. We have minimized the need to expand our team. It also handles vulnerability management.

We use Trend Micro to cover endpoint protection and server protection. That's one of the key points for our company. And Trend Vision One absolutely gives us centralized visibility and management. Especially when we integrate it with Active Directory, we get full visibility of our endpoint and server infrastructure. That is very important. A 10 on a scale of one to 10.

We also use the solution's Executive Dashboards. We present the findings in steering committees periodically. Sometimes, there is a repetitive alert or event. Directly from this dashboard, I can see the groups of this type of event. For me, it's quite a nice tool for presenting the results to the C level and the whole company for those who are not technically experienced.

And especially because of the new European regulation called NIST 2, we are using the solution's Risk Index feature. We calculate our risk score and we can see how it is changing in the timeline. Is it growing? Is there a new vulnerability detected? We can also compare our risk score with organizations of the same size or in the same industry and see if we are better or worse.

 

We respond much faster thanks to the intelligence used by Trend Micro. They have very good knowledge because they have many threat sources. That is why we are reacting much faster than we would if we had to dig deeper without that knowledge and this tool. It would be absolutely impossible to manage this infrastructure by a single admin or even two security admins.

 
 WHAT NEEDS IMPROVEMENT?

The area for improvement is mobile security. We have just finished a proof of concept for Zero Trust Secure Access. We withdrew from this PoC because it does not have that many points for proxy across Europe. Our organization is across Europe, and it will be nice when it is possible to have Trend Micro proxies across many more countries. At this time, they are only located in Germany and the UK. For us, it's not enough. We are waiting for them to increase the points of contact, and after that, we will return to this project.

From my experience, it was quite a nice tool, and I could manage almost all of the actions that I could not manage in a traditional way. Traditionally, I could allow or block usage of an application. But using the Zero Trust Secure Access tool, I could manage the schema of the usage. I will wait for this tool to change in the next few months.

 
 

FOR HOW LONG HAVE I USED THE SOLUTION?

I have been using Trend Micro XDR for almost 20 months.

 
 

WHAT DO I THINK ABOUT THE STABILITY OF THE SOLUTION?

It's a stable product. We haven't detected any issues other than the false positives, but that's normal.

 
 

WHAT DO I THINK ABOUT THE SCALABILITY OF THE SOLUTION?

We use it in multiple locations because our company is spread across Europe and Asia, as well as the United States and Canada. We have more than 2,000 users, and the solution covers 400 or 500 assets.

If our company were to increase over two to three months to 10,000 users, it would not be a problem. We have the ability to extend as we scale our users. It's very simple and absolutely flexible.

 
 

HOW ARE CUSTOMER SERVICE AND SUPPORT?

Their technical support is nice. On a scale of one to 10, it's a 10. They respond fast using email, phone, and the customer service portal.

 
 

HOW WOULD YOU RATE CUSTOMER SERVICE AND SUPPORT?

Positive.

 
 

WHICH SOLUTION DID I USE PREVIOUSLY AND WHY DID I SWITCH?

I used competitors' tools, Secureworks, as well as Carbon Black. These are nice tools, but they are very heavy to implement and heavy on daily operations. Trend Micro is much better, much more flexible, and I have much more visibility. It is a cost- and time-saving tool.

 
 

HOW WAS THE INITIAL SETUP?

Our deployment is a hybrid. We have advanced our implementation a lot. The first implementation was only one of the features called OfficeScan. That was a few years ago, and the implementation was in the United States. After that, we moved forward with the implementation across servers and endpoints, including Mac and Microsoft endpoints.

The whole project took about three months, with the custom discovery and the fine tuning. We had two people involved, one in Europe and one in the US.

Sometimes, maintenance is required if there is a new feature. It needs to be restarted. But this function is done by Trend Micro engineers because we are using the XDR in the cloud. We don't touch it. There is maintenance on our side for Deep Discovery because that part is an onprem solution. But it's simple to manage.

 
 

WHAT OTHER ADVICE DO I HAVE?

They are implementing new tools, like Trend Micro Apex One™ and Trend Micro™ Deep Discovery™ Inspector. They are ready for implementation on the console, and we are waiting to transition to these tools.

For the new features, I prefer doing a proof of concept, like we did for the Zero Trust Secue Access platform. That was a good move because we saved time when it came to resolving issues on the user side. We had a few users in every department, and we tried to discover what would happen if we implemented this tool. That is my approach to being safe with such products. We can do things without any technical training and can disconnect users around the world using one switch. For new features, I'm a big fan of using a proof of concept

CIONET Circles

CIONET Business Circles

Banner
Cyber Circle

CIONET’s Cyber Circle: a new three-event programme exclusively focusing on the most urgent, complex, and high-impact challenges in cybersecurity today. Launched in 2026, this initiative brings together CISOs, CIOs, and senior IT executives with a strong interest in cybersecurity for three curated gatherings each year. As part of CIONET’s trusted executive community, the Cyber Circle provides a confidential, peer-driven environment to exchange insights, share real-world experiences, and address evolving cyber threats. Each session is designed to foster strategic dialogue, strengthen resilience, and elevate cybersecurity as a core driver of business value.

Read More
Banner
Telenet Business Leadership Circle

The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.

Read More
Banner
Les Rencontres

Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !

Read More
Banner
Female Leadership Circle

CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.

Read More

Check out our latest news

Testimonials

Geert Goethals
Geert Goethals
CIO
Sibelga
Bahadir Samli
Bahadir Samli
CIO
ING Belgique
2-Feb-29-2024-11-35-00-9309-AM
Bart Kerkhofs
Director Digital Technology
Tata Steel Nederland
Untitled design (1)-Apr-01-2022-10-58-34-57-AM
Michał Paprocki
Group CIO
Euroclear
1-Feb-29-2024-11-34-59-8990-AM
Manfred Boudreaux-Dehmer
Chief Information Officer
NATO
Untitled design-Nov-22-2023-08-42-05-3178-AM
Annick Faes
Vice President IT and CIO Medical Devices EMEA
Johnson & Johnson
Piet_De_Ceuleners
Piet De Ceuleners
Global IT Director
Melexis
Untitled design-7
Stef Schampaert
Country Managing Director BeLux
Red Hat
Kevin_Ledegen
Kevin Ledegen
Group IT director
SDWorx
Gunter-Van-Craen_Small
Gunter Van Craen
Chief Digital & Information Officer
Bekaert
Thomas Kessler
Thomas Kessler
Partner | CIO Programme Leader
Deloitte
Emmanuel Gob
Emmanuel Gob
CIO
DPD
pascal pauwels
Pascal Pauwels
CIO
Colruyt
Untitled design (4)-Dec-13-2023-10-53-15-5032-AM
Koen Segers
Managing Director Belgium and Luxembourg
Dell Technologies
benoit dewaele
Benoît Dewaele
Group IT Director
Vandemoortele
Dirk Deridder-1
Dirk Deridder
CTO - Technology Services & Practices
SMALS
Untitled design-Sep-18-2023-11-59-29-7866-AM
Koen Vandaele
CIO
Delen Private Bank
Untitled design (4)-Jun-12-2023-01-23-11-7540-PM
Liesbet D'hoker
Managing Director
Kyndryl BeLux
steven-vermeulen
Steven Vermeulen
CIO
Digitaal Vlaanderen
Jack Hamande
Jack Hamande
Director General Digital Transformation
Federale Overheidsdienst Beleid en Ondersteuning
Tom Tomczak
Tom Tomczak
Chief Commercial Officer (CCO)
NRB
an swalens
An Swalens
Head Of IT (CIO)
National Bank of Belgium
Untitled design (2)-Apr-01-2022-10-58-34-68-AM
Elke Laeremans
Chief Technology & Transformation Officer
Krëfel
CIONET Belgium - Advisory Board Member - Koen Van Loo
Koen Van Loo
CIO
Group S.
CIONET Belgium - Advisory Board Member - Steven De Haes
Steven De Haes
Dean
Antwerp Management School
Marleen Thorré
Marleen Thorré
christel-plessers
Christel Plessers
Head of IT European Markets
Mercedes-Benz Europe
bauduin cor
Baudouin Corlùy
Chief Market Development Officer
LCL Data Centers
Steven Soers b&w
Steven Soers
VP Marketing
Telenet Business
CIONET-Belgium-Advisory-Board-Member-Carl-Tilkin-Franssens
Carl Tilkin-Franssens
Expert Consultant
BDO Belgium
Leen Van Rentergem (1)
Leen Van Rentergem
CIO
KU Leuven
bart van de walle b&w
Bart Van de Walle
CIO Belux
DHL

Team

Luc Hendrikx
Luc Hendrikx
Partner - CEO
Inès De Bien
Inès De Bien
Partner - CCO
1-Feb-08-2022-10-22-08-68-AM
Daniel Eycken
Partner - COO
Hendrik Deckers
Hendrik Deckers
Partner - Founder
foto Herman
Herman Roelandts
Tribe Master
Joseph Antoun
Joseph Antoun
Senior Programme Director
1-Dec-16-2021-02-15-57-02-PM
Eman De Sutter
Programme Manager
4-Feb-08-2022-10-22-09-03-AM
Shelly Deracourt
Programme Manager
Untitled design (5)-Sep-01-2022-02-47-55-60-PM
Charlotte Coen
Partner Success Manager
Untitled design (1)-Nov-22-2023-08-56-42-6802-AM
Ivana Bradvica
Programme Manager
Vlera Berishaa (1)
Vlera Berisha
Community Manager
Stanislav Mosan
Stanislav Mosan
Financial Director

Contact us

Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!