New call-to-action

Past CIONET Events

27966782255

Belgium 10-2-26 Round Table Invitation Only Physical english

CIONET Round Table - Resilience: Competitive Advantage?!

Escalating global instability and rapid technological shifts are creating systemic risk that transcends the CISO's and CIO’s office and now directly impacts the P&L and shareholder value. Driven by the new demands of EU directives like NIS2 and the accelerating push for digital sovereignty, this exclusive roundtable is designed for CIOs, CISOs as well as for CEOs, CFOs and board Members, who recognise that traditional risk mitigation is no longer sufficient.  We will explore how leading organisations are making proactive, strategic investments to intentionally de-risk their supplier chains, guarantee uninterrupted service, and leverage high-assurance stability as a premium market differentiator. They will show us how to quantify the Resilience Dividend: the tangible growth and customer trust earned by operating with superior, demonstrable stability.

Read More

42806066504

Belgium 5-2-26 Circle - Cyber All Members Physical english

AI for Security, Security for AI

This is the first event of CIONET’s Cyber Circle: a new three-event programme exclusively focusing on the most urgent, complex, and high-impact challenges in cybersecurity today.  This first event of the programme is entirely dedicated to AI's dual role in cybersecurity. To give CISOs clarity and direction, the session is structured around two distinct conversations: Part 1. AI for Security What AI Really Delivers Today — Beyond the Promises AI is marketed as the next revolution in cyber defense — from smarter detection to automated response and predictive analytics. But the reality is mixed: effectiveness varies widely, maturity is still uneven, and many promised capabilities remain aspirational. In this first part, we explore: Real vs hype in AI-driven cyber defense What mature CISOs are actually using today Where AI genuinely improves SOC performance — and where it falls short Hallucinations, false positives, and operational limits How attackers use AI to accelerate phishing, social engineering, and exploit development This is a grounded, experience-based look at what works, what doesn’t, and what is still wishful thinking. Part 2. Security for AI How to Protect AI Systems — New Risks, New Controls As organisations deploy AI models, they introduce entirely new attack surfaces. Securing AI requires capabilities that many cybersecurity teams are only beginning to develop. This second part focuses on: Attacks on AI itself: prompt injection, data poisoning, model extraction, adversarial inputs What leading CISOs are already doing to govern and secure AI applications What is working and failing in protecting AI systems in practice New skills, controls, and architectures required for safe, scalable AI adoption The organisational impact: oversight, risk management, and upcoming regulatory pressure This segment equips CISOs with the insight needed to secure AI responsibly and proactively.

Read More

40687568448

Spain 26-11-25 Advisory Board AB Members Physical spanish

Sesión Consejo Asesor Catalunya Q4

Read More

35727054388

Spain 12-11-25 Round Table Invitation Only Physical spanish

IA Práctica: Navegando con sentido

Cómo la IA puede aportar valor real a los procesos de negocio, simplificar tareas y facilitar la toma de decisiones sin añadir complejidad.

Read More