.png)
Belgium 13-1-26 Squad Only Virtual english
Migrating legacy systems to the cloud remains one of the toughest balancing acts in IT. Every choice affects stability, cost, and trust at once, and what starts as a modernisation effort quickly turns into a negotiation between ambition and reality. Suddenly budgets rise, dependencies appear late, and timelines tighten as old architectures collide with new expectations. In the end, success depends on sequencing, ownership, and aligning business priorities with infrastructure limits, and not only on technical readiness. Making it work requires more than a plan on paper. Knowing which systems genuinely belong in the cloud, which can wait, and which should stay put shapes the entire roadmap and defines its success. Each refactoring decision sets the level of future flexibility, but it also drives cost and risk. The trade-offs between speed, sustainability, and resilience only become clear once migration begins and pressure builds. Let’s discuss how to plan migrations that stay on track, manage hidden dependencies, and handle downtime with confidence. Let’s also discuss how governance, testing, and vendor coordination keep progress visible and credible. Are you in? A closed conversation for those who turn cloud migration from a disruption into a long-term advantage.
Read More
Belgium 20-1-26 All Members Physical english
CIOs today are being judged less as technology leaders and more as portfolio managers. Every euro is under scrutiny. Boards and CFOs demand lower run costs, higher efficiency, and clear ROI from every digital initiative. Yet, they also expect CIOs to place bets on disruptive technologies that will keep the enterprise competitive in five years. This constant tension is redefining the role. In this session, we go beyond FinOps and cost reporting to tackle the strategic financial dilemmas CIOs face.
Read More
Belgium 22-1-26 Invitation Only Virtual english
AI coding assistants entered development teams quietly, but their impact grows by the day. What started as autocomplete now shapes architecture decisions, documentation, and testing. And when productivity gains are visible, so are new risks: security blind spots, uneven quality, and the slow erosion of shared standards. Teams move faster, but not always in the same direction. The challenge has become integration rather than adoption. And new questions have risen: how do you blend automation into established practices without losing oversight? When is human review still essential, and what should the rules of collaboration between developer and machine look like? As AI tools learn from proprietary code, where do responsibility and accountability sit? Let’s talk about how to redefine those workflows, balancing creativity with control, and protecting code quality in a hybrid human-AI environment. A closed conversation on where AI accelerates progress, where it introduces new debt, and how development culture must evolve to stay credible.
Read More
January 13, 2026 Squad Session Invitation Only Virtual english
Migrating legacy systems to the cloud remains one of the toughest balancing acts in IT. Every choice affects stability, cost, and trust at once, and what starts as a modernisation effort quickly turns into a negotiation between ambition and reality. Suddenly budgets rise, dependencies appear late, and timelines tighten as old architectures collide with new expectations. In the end, success depends on sequencing, ownership, and aligning business priorities with infrastructure limits, and not only on technical readiness. Making it work requires more than a plan on paper. Knowing which systems genuinely belong in the cloud, which can wait, and which should stay put shapes the entire roadmap and defines its success. Each refactoring decision sets the level of future flexibility, but it also drives cost and risk. The trade-offs between speed, sustainability, and resilience only become clear once migration begins and pressure builds. Let’s discuss how to plan migrations that stay on track, manage hidden dependencies, and handle downtime with confidence. Let’s also discuss how governance, testing, and vendor coordination keep progress visible and credible. Are you in? A closed conversation for those who turn cloud migration from a disruption into a long-term advantage.
Read More
January 22, 2026 Squad Session Invitation Only Virtual english
AI coding assistants entered development teams quietly, but their impact grows by the day. What started as autocomplete now shapes architecture decisions, documentation, and testing. And when productivity gains are visible, so are new risks: security blind spots, uneven quality, and the slow erosion of shared standards. Teams move faster, but not always in the same direction. The challenge has become integration rather than adoption. And new questions have risen: how do you blend automation into established practices without losing oversight? When is human review still essential, and what should the rules of collaboration between developer and machine look like? As AI tools learn from proprietary code, where do responsibility and accountability sit? Let’s talk about how to redefine those workflows, balancing creativity with control, and protecting code quality in a hybrid human-AI environment. A closed conversation on where AI accelerates progress, where it introduces new debt, and how development culture must evolve to stay credible.
Read More
January 27, 2026 Squad Session Invitation Only Physical english
Zero Trust sounds simple on paper: trust no one, verify everything. But once you start implementing it, the fun begins. Legacy systems, hybrid networks, and human habits don’t read the manual. The idea is solid; the execution, not so much.
Read More
CIONET Trailblazer: AI Transformation: Bridging the Cultural Divide to Achieve Competitive Advantage
Published on: December 17, 2025 @ 9:16 AM
The Saudi Investment Bank is Transforming to Deliver Secure Banking Experiences
The Saudi Investment Bank, a leading financial institution, sought to enhance its cybersecurity posture to protect its customers and data in the face of evolving threats. Trend Micro's advanced threat detection and response solutions emerged as the ideal choice, enabling SAIB to fortify its security.
OVERVIEW
The Saudi Investment Bank (SAIB) began operating in 1977, quickly establishing recognition in share trading, asset management, leasing, mortgages, insurance, and credit cards. Today, the bank offers traditional wholesale, retail, and commercial banking products. SAIB is also actively engaged in the financing of quasi-government and private industry sectors, as well as the trading of financial products that facilitate and expand the kingdom’s importexport segment.
Built on a vision of simplicity and accessibility, SAIB operates on principles of flexibility and responsiveness towards customers and the continuous empowerment of employees. The company consistently develops the best possible approaches and the smartest solutions to deliver on these principles.
CHALLENGES
Delivering a secure banking experience is at the heart of SAIB’s pledge to its customers and employees. The bank offers its services on a technology stack that is virtualized to a high degree, with several users that consume services delivered from two data centers. However, the threat of a breach is not to be taken lightly. The bank’s stakeholders know that any infiltration could be a heavy blow to the reputation of trust it has earned in the market.
“Our vision is to provide safe and secure environments that our customers can depend on, so they can bank with ease and confidence,” said Ayman Al-Shafai, head of The Saudi Investment Bank’s security operations center. “We are a leading light in digital transformation. We are always proactive in adopting new technologies that allow us to be more creative in the digital services we provide to our customers.”
Having adapted from a traditional infrastructure to a modern, virtualized architecture, SAIB needed to shift from a legacy model of focusing on external threats, to a multi-facetted structure.
As Al-Shafai recalled, “We did have effective defense controls, but given the dynamic threat landscape, we knew we had to adapt to the constantly changing tactics seen from bad actors with an in-depth approach. We saw the need to apply a zero-trust model to balance preventive controls with advanced and insightful detection capabilities. Through such a model, we would be able to deploy in-depth behavior analysis and fight advanced threats.”
Since the implementation of Trend Micro’s multifacetted solution, we have had more visibility into our environment; and the higher the visibility, the better you are able to detect malicious activity.
Ayman Al-Shafai
Head of Security Operations Center
The Saudi Investment Bank
WHY TREND
“Support is absolutely key when you deploy a solution that underpins a core business deliverable,” Al-Shafai explained. “Your vendor has to be a partner that is always available, responsive, and has a finely tuned appreciation of your business and its core ambitions.” SAIB evaluated several solutions in the market that were candidates for delivering on its main objectives of visibility and real-time adaptability. According to Al-Shafai, Trend Micro stood out as being able to deliver around-the-clock support and consistent quality.
“I don’t look at pricing as keenly as I look at the value added by a strategic partner,” he explained. “We’ve been working with Trend Micro for over five years. During this time, we saw that the quality of their products and services never wavered. They were the obvious partner for us.”
Trend Micro has been with us every step of the way, and the support we received after deployment was exceptional—showing us how to effectively use the product rather than just implementing it and leaving us to figure it out on our own.
Ayman Al-Shafai
Head of Security Operations Center
The Saudi Investment Bank
SOLUTION
SAIB was looking for a toolset that was intuitive and did not require heavy administration. In addition, it needed to be able to provide role-specific reporting for a wide array of readers.
“Many people think of cybersecurity as a single solution that, once implemented, renders your infrastructure completely secure,” said Al-Shafai. “But we needed multiple on-premises controls that worked together to give powerful results.”
SAIB deployed Trend Micro™ Deep Discovery™ Inspector to monitor network traffic across all traversal routes—inside data centers, between hosts, and across endpoints. The solution provides enhanced visibility of activity, allowing teams to quickly monitor malicious activity, such as ransomware delivery or advanced persistent threats (APTs).
The bank also opted for Trend Micro™ Deep Discovery™ Analyzer, an open and scalable sandbox analysis platform that provides a real-time, on-premises assessment of files and hyperlinks. It is also capable of integrating samples submitted by threat researchers and incident response professionals. In addition, Trend Micro™ Deep Discovery™ Email Inspector now watches over the company’s corporate communications, protecting users and warning stakeholders of prospective threats as they occur.
“The solution is only the beginning,” said Al-Shafai. “As I said, we needed a partner that was engaged throughout the whole life cycle and beyond. Trend Micro has been with us every step of the way, and the support we received after deployment was exceptional—showing us how to effectively use the product rather than just implementing it and leaving us to figure it out on our own. I would draw particular attention to Trend Micro’s engagement during the early days of the COVID-19 crisis, when they provided us with additional antivirus training for our employees.”
RESULTS
“Since the implementation of Trend Micro’s multi-facetted solution, we have had more visibility into our environment; and the higher the visibility, the better you are able to detect malicious activity,” Al-Shafai noted. “We are looking to protect customers and employees long term, so we need that visibility to detect potential attacks in their early stages.” Al-Shafai is confident that SAIB’s return on investment will be significant, in terms of “the value of preventing losses that could potentially harm the organization’s brand for years to come”.
“The threat landscape is changing on a daily basis, so you need an ecosystem where, if the prevention fails, you detect. We now have both those layers provided by Trend Micro,” explained Al-Shafai.
WHAT'S NEXT
“We’re moving into a new era of banking. With accelerated digitization, there is a need to adopt new technologies like AI, blockchain, and IoT, while embracing open banking initiatives. This will drive a new shift in the attack landscape, demanding more security, control, and visibility across our environments. That’s our next challenge to prepare for and tackle, and we’re looking forward to it.”
293 Views 0 Likes Read More
Digital Transformation is redefining the future of health care and health delivery. All stakeholders are convinced that these innovations will create value for patients, healthcare practitioners, hospitals, and governments along the patient pathway. The benefits are starting from prevention and awareness to diagnosis, treatment, short- and long-term follow-up, and ultimately survival. But how do you make sure that your working towards an architecturally sound, secure and interoperable health IT ecosystem for your hospital and avoid implementing a hodgepodge of spot solutions? How does your IT department work together with the other stakeholders, such as the doctors and other healthcare practitioners, Life Sciences companies, Tech companies, regulators and your internal governance and administrative bodies?
Read More
The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.
Read More
Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !
Read More
CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.
Read More
Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!