.png)
Belgium 10-3-26 All Members Physical english
From modular business design to AI-driven pipelines, architectures, and operationsA composable enterprise is built on modular processes, API-driven ecosystems, low-code platforms, and cloud-native services. It promises speed and adaptability by allowing organisations to reconfigure their capabilities as conditions change. However, modular design alone does not guarantee resilience; the way these systems are engineered and operated is just as important.This is where AI is beginning to make a difference. Beyond generating snippets of code, AI is already influencing how entire systems are developed and run: accelerating CI/CD pipelines, improving test coverage, optimising Infrastructure-as-Code, sharpening observability, and even shaping architectural decisions. These changes directly affect how quickly new business components can be deployed, connected, and retired.In this session, we will examine how CIOs can bring these two movements together:Composable design is the framework for flexibility and modularity.AI-augmented engineering is the force that delivers the speed, quality, and intelligence needed to sustain it.The pitfalls of treating them in isolation: composability that collapses under slow engineering cycles, or AI that only adds complexity without a modular structure.The discussion goes beyond concepts to practical implications: how to architect organisations that can be recomposed at speed, without losing control or reliability. The outcome is an enterprise that is not only modular in design but also engineered to adapt continuously under real-world conditions.
Read More
Belgium 12-3-26 Physical english
Tomato! Tomato! Tomato! Get your tomato now! Every vendor sells security. And every company depends on vendors, partners, and suppliers. The more digital the business becomes, the longer that list grows, and so does the attack surface. One weak link, and there is always one, or one missed update, and trust collapses faster than any firewall can react. What used to be a procurement checklist has become a full-time discipline. Questionnaires, audits, and endless documentation prove that everyone’s “compliant,” yet incidents keep happening. So it’s clear: the issue isn’t lack of policy, or maybe a bit, but mostly lack of visibility. Beyond a certain point, even the most secure organisation is only as safe as its least prepared partner (or an employee who hadn’t had their morning coffee). So how far can you trust your vendors? How do you check what you can’t control? And when does assurance become theatre instead of protection? Does it come at a different cost? Let’s exchange what works and what fails in third-party risk management: live monitoring, shared responsibility models, contractual levers, and the reality of building trust in a chain you don’t own. A closed conversation for those redefining what partnership means when risk is shared but accountability isn’t.
Read More
Belgium 19-3-26 Country Members Physical french
Moins de Partenaires : La consolidation vaut-elle le risque ? Le problème est la prolifération des fournisseurs : trop d'outils causant de la complexité, une taxe d'intégration paralysante et de la redondance. La Taxe d'Intégration est le coût caché (en temps, en échecs et en ressources) d'essayer de faire fonctionner ensemble des systèmes disparates. Cet échange se concentre sur des stratégies éprouvées pour simplifier de manière agressive le parc technologique, consolider les fournisseurs et élever certains fournisseurs clés au rang de partenaires stratégiques.
Read More
March 12, 2026 Squad Session Invitation Only Physical english
Tomato! Tomato! Tomato! Get your tomato now! Every vendor sells security. And every company depends on vendors, partners, and suppliers. The more digital the business becomes, the longer that list grows, and so does the attack surface. One weak link, and there is always one, or one missed update, and trust collapses faster than any firewall can react.
Read More
March 24, 2026 Squad Session Invitation Only Physical english
Every organisation has them, projects that keep running long after their purpose has faded. No one remembers who asked for them, but shutting them down feels riskier than keeping them alive. And eventually, people stay assigned, budgets stay allocated, and energy drains into work that no longer matters. Inertia at its finest.
Read More
March 26, 2026 Squad Session Invitation Only Physical english
AI projects continue to multiply, but proving their value remains difficult. Most organisations can track activity, not impact. Dashboards count pilots and models, yet few translate to measurable business outcomes. The result is familiar: success stories without clarity on what they actually delivered.
Read More
CIONET Trailblazer: CISO: The Shift from Prevention to Resilience: Turning Visibility into Execution
Published on: January 28, 2026 @ 9:48 AM
CIONET Trailblazer: AI Transformation: Bridging the Cultural Divide to Achieve Competitive Advantage
Published on: December 17, 2025 @ 9:16 AM
How do you modernize technology systems to deliver the fastest possible response times?
Discover how Securitas, a global leader in security solutions, partnered with Kyndryl to transform their IT infrastructure and ensure seamless, always-on operations. By modernizing their aging Tier 2 datacenters and implementing advanced, scalable technology, Securitas enhanced the performance and reliability of their Security Operations Centers (SOCs), which are crucial for real-time communication and operational efficiency. This case study is a must-read for CIOs and IT leaders looking to drive digital transformation and achieve high efficiency at scale.
Securitas has been making the world a safer place for 90 years
With 57,000 security endpoints monitored in the Security Operations Center (SOC), the Belgian Securitas operations team processes more than 3 million alarms a year. In Belgium, the company safeguards people, enterprises, private residences, and critical environments including airports, banks, government and military sites, hospitals, nuclear sites, police zones, ports and NATO HQ. They step in to resolve more than 68,000 situations in customer locations, some triggering police or firefighter response.
Ken Vanden Haesevelde, the Securitas IT Infrastructure Lead for Belgium and Luxembourg, describes the Securitas Belgium Security Operations Centers (SOCs) as the “beating heart of their security services.” Always-on system availability in the SOCs is essential to guaranteeing communications with guards on the ground.
In addition to the critical SOC communications, essential business applications enable Securitas guards, operators and staff to access their operational data, anytime and anywhere. Securitas employees, including those working from home, can access timecards and orders for training, uniforms, badging and equipment, HR, payroll and more.
Ken knew that the Securitas aging Tier 2 datacenters were experiencing increasing latency. He had sleepless nights worrying if or when infrastructure performance might compromise the safety of guards in the field.
Any outage would put client trust at risk and threaten the reputation of Securitas. And business expansion plans hinged on upgrading to modern infrastructure that would ensure operations performed with high efficiency at scale.
With datacenter performance challenges and the need to support future business, Ken saw an opportunity to address both with a single solution. Consulting with Wim Vancluysen, his Kyndryl partner, Ken envisioned a modernized infrastructure with:
For years, Securitas relied on Kyndryl as a trusted managed services partner and saw the team as an extension of their own. So Kyndryl was a natural choice for collaborator on Securitas’ infrastructure and network transformation.
Specially trained security officers with innovative data technology such as rugged phones with sensors that alert the SOC if a person is down, and AI capabilities, help provide fastest-possible responses. It’s vital that communications are up 24/7 to comply with security and resilience industry standards.
Securitas SOC operators continually monitor customer sites with cameras and react when alarms go off, which may generate police or firefighter involvement. Incidents in the field need to be addressed within seconds.
While maintaining business continuity in production, Kyndryl experts would work to introduce complex network services, monitoring for each Securitas customer, software support and a managed service desk, back-up and disaster recovery, and infrastructure management services.
Then, they’d need to install new hardware and networking systems and test the connections from the new data centers to client sites and the SOC—all ahead of planning the existing system migration. Working with Kyndryl as a single partner for both business as usual and the new solution helped Ken mitigate risks in coordinating the parallel efforts.
High-availability infrastructure designed to keep thousands of customers safe
Together, the Securitas and Kyndryl team scoped, designed and implemented new server and network infrastructure. Using VMware® tools, they migrated existing systems and applications to the new Kyndryl datacenter in southern Belgium. Using redundant links and dedicated customer VPN tunnels, the network now connects all core applications with 24/7 availability and added security layers around firewalls and load balancers.
To maintain the same high service levels for new and existing clients, Kyndryl networking experts needed to deploy higher bandwidth connections. These would ensure low latency communications between core applications and across operations.
A disaster recovery solution at the new datacenter complex was implemented by Kyndryl. Redundant networking between Securitas service centers, offices and datacenter sites ensured critical applications were available throughout deployment. Examples of improvement results include:
Recovery Time Objective (RTO) measured in minutes not days, so in case of an outage critical applications have excellent RTOs
More than 100 virtual machines migrated, including multi-tier networks and the security layer, together with end-to-end connectivity for Securitas’ customers
Project completed in just 4 months, without business interruptions
As part of new business as usual operations, Kyndryl enforces security parameters for each system, and keeps backup and recovery documents up to date for security compliance, easing the burden on Securitas.
Kyndryl Bridge™ proactively recommends solutions for issues that have not yet occurred and automates issue resolution as permissions allow. Kyndryl Bridge AIOps extends ITSM efficiency by applying solutions to issues tracked over years in thousands of other customer engagements to the Securitas systems. The team expects up to 90% of issues to be automatically resolved as their ITSM evolves and critical applications and system resilience are boosted.
Fix once and resolve-for-all is achieved with IT Service Management (ITSM) software to track system and performance. As they resolve issues, the team creates and distributes Red Hat® Ansible® playbooks across all servers, for automated issues resolution, with 50 playbooks running in the Securitas infrastructure deployment. The team also uses RedHat Ansible for software updates and patches, important to applying compliant systems.
Ken cites Kyndryl’s ongoing communication as a significant reason for the success of the operations and ongoing reassurance the Securitas clients are secure. The Securitas and Kyndryl operations team includes global experts working from more than five nations and in multiple languages. The team is far-flung but keeps in close contact, talking nearly every day.
The modernized infrastructure solution already has proven its business value in being able to accommodate company growth. In July 2022, Securitas announced the acquisition of Stanley Security, the Electronic Security Solutions business from Stanley Black & Decker Inc., growing their worldwide client base to more than 500,000 clients, and expanding their technology capabilities.
The Securitas leadership team extended its Kyndryl partnership with an expansion and approximately 100 new virtual machines to help support the Stanley Security acquisition. The project was completed at the end of February 2024.
Over the years, Kyndryl has always been a Securitas trusted partner through various IT transformations, infrastructure changes and datacenter migrations. Kyndryl exceeds themselves every time with very thorough planning and speed to act all while upholding a superb level of professionalism in all levels of their organization.
A key success outcome is that the modernized high-availability network and infrastructure have eliminated latency issues for end-to-end, fail-proof communication between the SOC and guards. This helps ensure the security of the company’s thousands of customers.
The migration to Tier 4 datacenters took just 4 months—without interruptions, maintaining business continuity for thousands of customers. Disaster recovery initiation for critical applications takes minutes, not days. With 50 playbooks implemented to solve incident alerts automatically and eliminate false alerts, service helpdesk resolution time goals are consistently exceeded. The anticipated 90% standardized ITSM task automation will help free IT experts from routine tasks to work on higher value projects.
Above all, the low latency of the new solution gives Securitas the solid foundation the team needs to evolve services based on remote monitoring technologies, which is the company's strategic business goal. Ken reports an additional key measure: being able to sleep better at night.
Based in Stockholm, Sweden, Securitas is a world-leading safety and security solutions partner offering on-site and mobile guarding, aviation and electronic security, fire and safety services and enterprise risk management.
Securitas’ Belgium employees monitor over 55,000 security endpoints, including residential customers, small organizations, and critical enterprise operations. More than 3.1 million alarms are processed annually, resulting in 53,200 effective interventions.
193 Views 2 Likes Read More
Digital Transformation is redefining the future of health care and health delivery. All stakeholders are convinced that these innovations will create value for patients, healthcare practitioners, hospitals, and governments along the patient pathway. The benefits are starting from prevention and awareness to diagnosis, treatment, short- and long-term follow-up, and ultimately survival. But how do you make sure that your working towards an architecturally sound, secure and interoperable health IT ecosystem for your hospital and avoid implementing a hodgepodge of spot solutions? How does your IT department work together with the other stakeholders, such as the doctors and other healthcare practitioners, Life Sciences companies, Tech companies, regulators and your internal governance and administrative bodies?
Read More
The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.
Read More
Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !
Read More
CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.
Read More
Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!