.png)
Belgium 13-1-26 Squad Only Virtual english
Migrating legacy systems to the cloud remains one of the toughest balancing acts in IT. Every choice affects stability, cost, and trust at once, and what starts as a modernisation effort quickly turns into a negotiation between ambition and reality. Suddenly budgets rise, dependencies appear late, and timelines tighten as old architectures collide with new expectations. In the end, success depends on sequencing, ownership, and aligning business priorities with infrastructure limits, and not only on technical readiness. Making it work requires more than a plan on paper. Knowing which systems genuinely belong in the cloud, which can wait, and which should stay put shapes the entire roadmap and defines its success. Each refactoring decision sets the level of future flexibility, but it also drives cost and risk. The trade-offs between speed, sustainability, and resilience only become clear once migration begins and pressure builds. Let’s discuss how to plan migrations that stay on track, manage hidden dependencies, and handle downtime with confidence. Let’s also discuss how governance, testing, and vendor coordination keep progress visible and credible. Are you in? A closed conversation for those who turn cloud migration from a disruption into a long-term advantage.
Read More
Belgium 20-1-26 All Members Physical english
CIOs today are being judged less as technology leaders and more as portfolio managers. Every euro is under scrutiny. Boards and CFOs demand lower run costs, higher efficiency, and clear ROI from every digital initiative. Yet, they also expect CIOs to place bets on disruptive technologies that will keep the enterprise competitive in five years. This constant tension is redefining the role. In this session, we go beyond FinOps and cost reporting to tackle the strategic financial dilemmas CIOs face.
Read More
Belgium 22-1-26 Invitation Only Virtual english
AI coding assistants entered development teams quietly, but their impact grows by the day. What started as autocomplete now shapes architecture decisions, documentation, and testing. And when productivity gains are visible, so are new risks: security blind spots, uneven quality, and the slow erosion of shared standards. Teams move faster, but not always in the same direction. The challenge has become integration rather than adoption. And new questions have risen: how do you blend automation into established practices without losing oversight? When is human review still essential, and what should the rules of collaboration between developer and machine look like? As AI tools learn from proprietary code, where do responsibility and accountability sit? Let’s talk about how to redefine those workflows, balancing creativity with control, and protecting code quality in a hybrid human-AI environment. A closed conversation on where AI accelerates progress, where it introduces new debt, and how development culture must evolve to stay credible.
Read More
January 13, 2026 Squad Session Invitation Only Virtual english
Migrating legacy systems to the cloud remains one of the toughest balancing acts in IT. Every choice affects stability, cost, and trust at once, and what starts as a modernisation effort quickly turns into a negotiation between ambition and reality. Suddenly budgets rise, dependencies appear late, and timelines tighten as old architectures collide with new expectations. In the end, success depends on sequencing, ownership, and aligning business priorities with infrastructure limits, and not only on technical readiness. Making it work requires more than a plan on paper. Knowing which systems genuinely belong in the cloud, which can wait, and which should stay put shapes the entire roadmap and defines its success. Each refactoring decision sets the level of future flexibility, but it also drives cost and risk. The trade-offs between speed, sustainability, and resilience only become clear once migration begins and pressure builds. Let’s discuss how to plan migrations that stay on track, manage hidden dependencies, and handle downtime with confidence. Let’s also discuss how governance, testing, and vendor coordination keep progress visible and credible. Are you in? A closed conversation for those who turn cloud migration from a disruption into a long-term advantage.
Read More
January 22, 2026 Squad Session Invitation Only Virtual english
AI coding assistants entered development teams quietly, but their impact grows by the day. What started as autocomplete now shapes architecture decisions, documentation, and testing. And when productivity gains are visible, so are new risks: security blind spots, uneven quality, and the slow erosion of shared standards. Teams move faster, but not always in the same direction. The challenge has become integration rather than adoption. And new questions have risen: how do you blend automation into established practices without losing oversight? When is human review still essential, and what should the rules of collaboration between developer and machine look like? As AI tools learn from proprietary code, where do responsibility and accountability sit? Let’s talk about how to redefine those workflows, balancing creativity with control, and protecting code quality in a hybrid human-AI environment. A closed conversation on where AI accelerates progress, where it introduces new debt, and how development culture must evolve to stay credible.
Read More
January 27, 2026 Squad Session Invitation Only Physical english
Zero Trust sounds simple on paper: trust no one, verify everything. But once you start implementing it, the fun begins. Legacy systems, hybrid networks, and human habits don’t read the manual. The idea is solid; the execution, not so much.
Read More
CIONET Trailblazer: AI Transformation: Bridging the Cultural Divide to Achieve Competitive Advantage
Published on: December 17, 2025 @ 9:16 AM
Leading Community Hospital increases security, reduces time spent on security issues by 50-60 hours
Increases security, reduces time spent on security issues by 50-60 hours
OVERVIEW
In 2016 one of Ontario, Canada’s largest community hospitals set up a more robust security team and system. Samprati Vishal took on the challenge, becoming the hospital’s Chief Information Security Officer. Vishal’s mission was clear, create a security strategy to protect the hospital’s vital systems and data. He quickly brought Trend Micro Apex One and Trend Micro Deep Security on board as the foundation of a powerful, comprehensive security strategy. Three and a half years later this community hospital is confident with the partnership established with Trend Micro.
Trend Micro Apex Central gives me a single pane of glass. That integration is worth its weight in gold.
Samprati Vishal
Chief Information Security Officer, Community Hospital
CHALLENGES
Vishal inherited a complex and diverse IT environment. Hospital employees utilize more than 200 apps and a broad range of devices, including almost 4,000 disparate desktops, to conduct their work. Until recently, the hospital relied on security solutions from various vendors to protect those apps and devices. “Too much diversity created too many vulnerabilities. New threats were emerging every day, and we had no coordinated way to patch systems or remediate threats,” says Vishal.
With an IT team of three and with limited funding, Vishal needed an affordable solution that could provide single-pane-of-glass visibility into security threats and a coordinated approach to security across departments and facilities. COVID-19 added stress to the situation, as many hospital employees moved to remote work. Remote employees needed to access systems and data securely and the hospital needed to ensure the IT systems employees use were consistently monitored and patched.
WHY TREND
When Vishal joined the hospital, he realized the organization had a Trend Micro enterprise license but was not using the full solution. After examining the incumbent security solutions, he decided to standardize on Trend Micro. “The biggest factor in that decision was how seamlessly Trend Micro solutions integrate with one another. It gives me a single pane of glass. That integration is worth its weight in gold,” says Vishal.
The decision to standardize on Trend Micro required internal changes, as he had to prove to others it was the best solution for the job. “Everyone had their own favorite security solution and what they were used to, so there was a bit of convincing involved. Senior management wanted my personal assurance that Trend Micro would cover everything. After examining what Trend Micro had to offer, I was confident it would do the job, and I gave them that assurance,” says Vishal.
We used to spend 50 to 60 hours a month dealing with security issues. Now my team can spend that time working on other enhancements to our security posture.
Samprati Vishal
Chief Information Security Officer, Community Hospital
SOLUTION
Vishal’s team implemented Trend Micro Deep Security to provide advanced server security for physical, virtual, and cloud servers and to protect enterprise applications and data from breaches. Vishal then added Trend Micro Apex One, a blend of advanced threat protection techniques designed to eliminate security gaps across any user activity and any endpoint. Trend Micro Apex Central, a web-based console that provides centralized management for Trend Micro products and services, tied it all together. “Everything connects to Trend Micro Apex Central. I log in and it gives me everything I need in one easy dashboard,” says Vishal.
Vishal says that integration makes Trend Micro more powerful. “Trend Micro Apex One and Deep Security work together to disrupt the attack chain. Using an integrated approach, we cover the entire attack surface.”
RESULTS
In the three and a half years since Vishal came on board and implemented Trend Micro security solutions, the hospital has successfully protected themselves against ransomware attacks. “We have not lost any data, a single PC, or a single minute to security threats, despite the growing number of attacks,” says Vishal.
Meanwhile, Trend Micro tools give Vishal’s team the visibility they need to see emerging security issues before they become a problem, even when employees work remotely. “I can see where an employee might be exposing us to a vulnerability and fix it quickly. It gives me great peace of mind. We used to spend 50 to 60 hours a month dealing with security issues. Now my team can spend that time working on other enhancements to our security posture,” says Vishal.
The virtual patching capability provided by Trend Micro has been crucial in the pandemic, with widely dispersed workers and devices. “The very high frequency and number of threats makes it impossible to patch them in a timely manner. Trend Micro’s vulnerability protection has been a lifesaver for us,” says Vishal.
Finally, improved visibility has shown the hospital’s senior leadership that they are fully protected from cybersecurity attacks and data loss. “Their confidence in our security systems has grown,” says Vishal.
WHAT'S NEXT
The Ontario community hospital continues to modernize its systems. Working with Trend Micro will allow Vishal and his team to continue a steady migration while ensuring the highest levels of security and data protection.
186 Views 0 Likes Read More
Digital Transformation is redefining the future of health care and health delivery. All stakeholders are convinced that these innovations will create value for patients, healthcare practitioners, hospitals, and governments along the patient pathway. The benefits are starting from prevention and awareness to diagnosis, treatment, short- and long-term follow-up, and ultimately survival. But how do you make sure that your working towards an architecturally sound, secure and interoperable health IT ecosystem for your hospital and avoid implementing a hodgepodge of spot solutions? How does your IT department work together with the other stakeholders, such as the doctors and other healthcare practitioners, Life Sciences companies, Tech companies, regulators and your internal governance and administrative bodies?
Read More
The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.
Read More
Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !
Read More
CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.
Read More
Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!