.png)
Belgium 21-4-26 Invitation Only Physical english
In an era where every outage, audit, and cyberattack is a test of organisational survival, resilience has become the new currency of trust. While traditional perimeter security with: firewalls, intrusion detection, and scanners, remains essential, it is no longer a sufficient guarantee against modern threats that bypass these layers to penetrate your core systems. Today, enterprises require security and continuity that are built-in, not bolted-on. This CIONET roundtable focuses on the shift from reactive disaster recovery to proactive Business Continuity. Together with experts from HPE Zerto, we will explore how organisations can transform their recovery strategies into seamless continuity models.
Read More
Belgium 23-4-26 Country Members Physical & Virtual english
AI is no longer confined to supporting human tasks. We are entering the agentic era, where autonomous systems act on behalf of people and organisations. These agents can gather information, make decisions, negotiate terms, and even complete transactions. The implications extend well beyond technology; they touch the very foundations of business models, governance, and leadership. For CIOs and their peers, the rise of “machine customers” and autonomous partners poses new questions: Market impact: How do you compete and create value when some customers and suppliers are machines? Governance: What trust, compliance, and accountability structures are needed when AI acts independently in financial, procurement, or customer-facing processes? Leadership: How should CIOs guide their organisations in redefining roles, responsibilities, and decision-making when agents take over parts of the value chain?Business strategy: What opportunities emerge for new revenue models, platforms, and ecosystems shaped by autonomous interaction? This session shifts the focus from the mechanics of AI agents to the decisions that will shape leadership in the next decade. It is a call for CIOs to prepare for a future where relationships, markets, and strategies are no longer limited to human-to-human interactions, but also extend to human-to-machine and machine-to-machine interactions.
Read More
Belgium 29-4-26 Invitation Only Physical english
This CIONET workshop is a collaborative deep-dive into the practicalities of"rewiring the building" while it’s still occupied. Drawing onKyndryl’s deep heritage in mission-critical infrastructure and their latestresearch, we will dismantle the "hidden costs" of legacyenvironments. The conversation will focus on the transition from static,monolithic structures to composable architectures that allow intelligent agentsto operate seamlessly across hybrid landscapes.
Read More
April 2, 2026 Squad Session Invitation Only Virtual english
SaaS gave business units freedom: quick onboarding, no infrastructure, and instant results. But over time, that freedom turned into fragmentation. Each team now buys, renews, and configures its own stack. HR has one platform, finance has another, and marketing probably has ten. The invoices keep coming, usage keeps dropping, and no one is sure who’s accountable for what.
Read More
May 12, 2026 Squad Session Invitation Only Physical english
Everyone says they’ve gone product-centric. In reality, most organisations live in a hybrid world where projects, products, and platforms overlap. Teams manage releases while still chasing deadlines, and governance still thinks in milestones rather than outcomes. The shift is underway, but the mindset hasn’t caught up.
Read More
May 19, 2026 Squad Session Invitation Only Physical english
The game has changed, clearly. Attackers have AI, defenders have AI, and both sides are learning faster than anyone expected, or maybe the attackers are just a bit faster. What used to take hours now happens in seconds, and detection windows close before alerts even appear. It’s adaptation beyond automation, and no one gets to sit still.
Read More
CIONET Trailblazer: CISO: The Shift from Prevention to Resilience: Turning Visibility into Execution
Published on: January 28, 2026 @ 9:48 AM
CIONET Trailblazer: AI Transformation: Bridging the Cultural Divide to Achieve Competitive Advantage
Published on: December 17, 2025 @ 9:16 AM
Trend Vision One™ provides centralized visibility management across all protection levels
Trend Vision One™ provides centralized visibility management across all protection levels
WHAT IS OUR PRIMARY USE CASE?
Normally, we use the solution for day-to-day investigations. We get alerts when something is going on in the environment. Right now, we are using that tool for the asset management team to identify services or applications that are not allowed for governance and all of these purposes. In addition to that, we use it for isolating devices. We also have a service with them, an MDR service. They analyze information, and they do investigations for us as well.
It allows us to work from a single console instead of having to use four or five separate tools to maintain the same level of security.
HOW HAS IT HELPED MY ORGANIZATION?
Mainly, we were concerned with the visibility of the environment. We didn't have a tool that was able to allow us to see or have visibility of what the endpoints were doing on the servers in the environment. That was the main reason to adopt this solution - to have visibility on the environment as, in the past, we didn't have that capability.
WHAT IS MOST VALUABLE?
The isolation of devices has been really important. We like all the attack surfacemanaged NPEs. It's helping us to identify devices and protect us on the network. That's in combination with third-party integrations as well. We have integrations that are helping us to identify devices using our vulnerability management services. It's scanning the network and it's sending all that data to VisionOne. With that information, we identify devices that are protected on the network and the environment.
The reports are a really good feature for showing results to upper management levels.
The search features help us try to correlate information and identify any suspicious activity. That's another feature that has been really important.
We are using it everywhere except for the network, so we don't have the network discovery service from Trend Micro. However, we have it on endpoint servers and email and also the cloud as well. We use cloud conformity to connect that piece.
Trend Micro has a feature called Vision One, that provides us with centralized visibility management across all protection levels. That's helping us to have a centralized view of the console. That's the main reason why we still have that product.
Centralized visibility is important. When we are doing investigations, we can do everything in one console instead of moving to different screens or different windows. The centralized visibility and management across these protection levels helped with our efficiency. It helps us to identify quicker, any potential threat, or any special activity.
They have this feature called Risk Index which I use sometimes to validate the level of rates we have. We don’t use it often - maybe once every one or two weeks. We use it to rank our security operations overall. Mostly, we just check it out of curiosity.
We use the managed XDR service that they have. It relieves a lot of workload especially during investigations or interim reports about any particular activity - especially with the coverage after hours. It is helping us with the capability there. Also, if something really bad is happening, we have eyes watching all the activity, which is nice.
Using this managed XDR service enables our team to work on other tasks - especially when we, in certain ways, allocate some of the investigation pieces. We basically create a request for them to investigate things, and that allows us to focus on other things to optimize our security toolset. That's really helpful.
We use the attack surface risk management capability they have. We use that heavily right now. It was a big use case in the past few months. We use it to identify multiple devices without protection, the applications that have been used by our users, and which ones are risky. We are using that on a regular basis. It's helped us identify blind spots and more assets. It's positively affected our security posture by improving a lot of our visibility.
XDR helped us decrease our time to detect or respond to threats. In the past, we didn't have that visibility. When we enabled that tool, at the beginning, it was a little bit noisy. That's something to be expected coming from a new tool. However, after testing through these years, things are improving, and now we can see better results, especially during investigation alerts.
The solution has helped us to reduce the amount of time we spend investigating false positive alerts. In the beginning, there was a large amount of false positives. Right now, we are day to day trying to reduce them. At this point, they are lower compared with the beginning of the implementation. Things are improving. We are reducing false positives as we go which is great.
WHAT NEEDS IMPROVEMENT?
We do use the automation capability a little. However, we noticed some limitations, especially on the playbook side. The API we use. We are integrating that with another product, a SOAR product. The playbooks are a little bit limited in what they can do at this point. Let's say that we want to connect on a specific API. The templates we cannot modify very well. When we noticed that limitation, we decided to go and use Trend Micro VisionOne API and connect it to other tools to develop that activity using another product.
Under attack surface management, when you go to the specific sites or applications that the users are accessing, the capability of downloading that report could be better. Let's say, as an example, we want to identify users using chatGPT, for example. We want to download that data through an API or through the GUI. Right now, it's not available as an option. Maybe having the capability of extracting data from VisionOne for specific areas of the tool could work. That's something that could be useful, especially if we want to generate that report and send it to specific teams. Often, we don't want to provide DX to all the people. Sometimes it's easier to just have that file and share that file with the people who need to have that information.
The biggest advantage of Trend Micro™ Managed XDR is that it has helped decrease our time to detect and respond to threats by around 50 percent.
FOR HOW LONG HAVE I USED THE SOLUTION?
I've been using the solution for around three years now.
WHAT DO I THINK ABOUT THE STABILITY OF THE SOLUTION?
The stability is good. It's not very common to have any outages. Sometimes there may be a glitch, however, it's rare. Normally we have 95% stability.
WHAT DO I THINK ABOUT THE SCALABILITY OF THE SOLUTION?
The scalability is good, especially when we are talking about third-party integrations. We can have visibility and control of all different assets. So we can have good scalability and visibility and know more about the environment in places where we didn't have any idea things were happening. It's a SaaS tool, and we don't have to do any maintenance, and it's easy to deploy. It's pretty straightforward.
HOW ARE CUSTOMER SERVICE AND SUPPORT?
When we have specific issues or problems connecting some products we ask for support. They respond really fast. They always try to mitigate and resolve all the issues we have. If they cannot resolve the problem, they normally share some suggestions on how we can mitigate future problems.
HOW WOULD YOU RATE CUSTOMER SERVICE AND SUPPORT?
Positive
WHICH SOLUTION DID I USE PREVIOUSLY AND WHY DID I SWITCH?
We did not use other solutions, although we did use Apex One for a long time. We have also used an EDR product.
HOW WAS THE INITIAL SETUP?
I was involved in the deployment. I was the one leading the data during the implementation. The process is pretty straightforward. It was a little tricky to reduce the false positive alerts, however, the portion of deploying to the environment and connecting the pieces was simple.
From our side, we had three or four people involved in the implementation.
WHAT ABOUT THE IMPLEMENTATION TEAM?
We had some help with the deployment and we had some guidance in the beginning. We requested some support from our account manager.
WHAT'S MY EXPERIENCE WITH PRICING, SETUP COST, AND LICENSING?
The pricing is good if you look at all the compatibilities and features offered by the product. There are features that can increase the pricing. We can put some credits to some features, however, if we want to enable them. With the amount of credit we have, we are covered for all of our needs.
WHAT OTHER ADVICE DO I HAVE?
I'd rate the product eight out of ten.
It is a really good product and easy to deploy. They allow you to have more visibility on your environment, especially if you have any kind of XDR solution. It will increase the visibility of what's happening in the environment. Also, from the perspective of doing maintenance updates or patches, the cloud is the way to go. The product management team does a really good job of increasing the features, and they are listening really closely to what the customer needs via feedback.
WHICH DEPLOYMENT MODEL ARE YOU USING FOR THIS SOLUTION?
Hybrid Cloud
271 Views 0 Likes Read More
CIONET’s Cyber Circle: a new three-event programme exclusively focusing on the most urgent, complex, and high-impact challenges in cybersecurity today. Launched in 2026, this initiative brings together CISOs, CIOs, and senior IT executives with a strong interest in cybersecurity for three curated gatherings each year. As part of CIONET’s trusted executive community, the Cyber Circle provides a confidential, peer-driven environment to exchange insights, share real-world experiences, and address evolving cyber threats. Each session is designed to foster strategic dialogue, strengthen resilience, and elevate cybersecurity as a core driver of business value.
Read More
The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.
Read More
Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !
Read More
CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.
Read More
Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!