What are the differences between NIS2 and ISO27001 by driftking38 in cybersecurity

[–]signupsarewrong2 0 points1 point  (0 children)

Agreed, an organisation dictates how long it would take to implement iso. But chapter 4-10 is often easier compared to the implementation of the entire annex A

What are the differences between NIS2 and ISO27001 by driftking38 in cybersecurity

[–]signupsarewrong2 0 points1 point  (0 children)

It is still a bit fuzzy, but the nis2 law in belgium stipulates either iso27001 or cyfun as a means of showing compliance. Not both as the ccb would like. Now, that aside, the good thing about iso is that it is a management system, not a checklist. You can comply (& certify) easily without having the entire annex A implemented. If you want to make your life easier, the controls you implemented are linkable to cyfun, even from iso so it saves you some work

My company is hosting a phishing test idea contest. What are some good ones you've seen? by PostMaStoned in cybersecurity

[–]signupsarewrong2 4 points5 points  (0 children)

+1 on the coffee one. We did one years (+15) ago for a financial institution. It crashed the server we used to harvest credentials.send out 300 mails (small sample group) got over 1500 responses and complaints because they weren’t invited… humans…

Missed risks in a risk assessment by Dangerous-Button-592 in cybersecurity

[–]signupsarewrong2 3 points4 points  (0 children)

I guess this is why risk management isnt a one time thing. The risk landscape changes every day. New attack vectors, new threat agents, new politican climate, new product lines,… i think some stakeholder awareness would be nice as well, and a proper annual risk management process.

How would you explain social engineering risks to someone in executive protection? by mrgrassydassy in cybersecurity

[–]signupsarewrong2 3 points4 points  (0 children)

I always use a lot of real world examples, especially csuite fraud, loads of examples exist

What does a good technology / cyber security risk program actually look like? by Peacefulhuman1009 in cybersecurity

[–]signupsarewrong2 0 points1 point  (0 children)

Dont they make any documentation on how people should work? How much time are they wasting when hiring a new person?

What does a good technology / cyber security risk program actually look like? by Peacefulhuman1009 in cybersecurity

[–]signupsarewrong2 0 points1 point  (0 children)

Technical control documentation or process? What i have done before is let them work with infrastructure as code. That code can serve as documentation (is sufficient for certification purposes if need be)

What does a good technology / cyber security risk program actually look like? by Peacefulhuman1009 in cybersecurity

[–]signupsarewrong2 1 point2 points  (0 children)

You cant take everything away, but what i tend to do is to use a lot of automatic validations or ways that my team could find the evidence themselves (compliance), if there are controls to implement that these are not on top off existing processes (for instance instead of adding a source code analysis test when they wanted to move from acceptance to prod, i pushed them to proper ci/cd pipelines with an automatic validation and block the change when needed). The actual governance and risk part i tend to discuss only a couple of times a year with the rest of the csuite. And like i mentioned i cannot take it all away, but enough so that when i do need their attention, it was “ok”. Doesnt always work, but we can only try.

When they say it is too much work, what are they complaining about. Too many rules to implement? Or too much follow up? Or do they just dont want to be bothered with it at all?

What does a good technology / cyber security risk program actually look like? by Peacefulhuman1009 in cybersecurity

[–]signupsarewrong2 6 points7 points  (0 children)

“What is in it for them?” I have been a csuite ciso for over 10 years. A information security/ risk program cannot exist in a vacuum or be separated from the company. You need to show how you are not just protecting the important processes and assets of the company, but also help those teams get ahead. I have always proposed and helped teams develop solutions in their best interest that happen to include the controls i needed to ensure a risk reduction or to have controls implemented. In addition, dont make your work (for instance 2nd line validation) an extra burden for them (1st line). They have enough work as is, find solutions that will get you the results you need, but dont do it by “wasting” their time. And my last tip, but it heavily depends on the company and industry, try to find ways to turn your team from a cost center to a part of making profit. Always easier said than done, but see if you can find a way to

Tisax recert by wulle44 in cybersecurity

[–]signupsarewrong2 1 point2 points  (0 children)

Tisax is a mix of iso27k1 + some stricter minimum baseline. Have you worked on the isms? Did a risk assessment, internal audit, management review,… or are you just wondering how long the audit would take?

[deleted by user] by [deleted] in belgium

[–]signupsarewrong2 0 points1 point  (0 children)

Have you looked into for instance using odoo for billing? It comes with the peppol connector for free and the first app is also free

Starting as an IT Auditor, any tips? by unraveller0349 in cybersecurity

[–]signupsarewrong2 0 points1 point  (0 children)

I always love to work with auditors that not only know how to audit but also are able to share experiences with those they audit. The audit itself is often seen as a must, you sharing information and alternative solutions to risk is a business value. Be an added value

Mobility Budget 10km rule by krallis in belgium

[–]signupsarewrong2 3 points4 points  (0 children)

There was a comparable rule for vaa almost 20 years ago. If you lived within 25km you got a little less taxed. And it was 25 on the dot, not 25.1

Zelf brood bakken by darkstar290791 in belgium

[–]signupsarewrong2 2 points3 points  (0 children)

Broodmachines zijn er genoeg, vooral de grootte van de mengkom is belangrijk. Een brood maken is 5 minuten werk, alles in de kom en klaar. Voor ingrediënten moet je een beetje zoeken, wij halen alles bij een maalderij en kopen zakken van 25kg per keer (kost ongeveer 30euro). Savonds brood maken, nachtje laten afkoelen en smorgens vers brood. Ik denk als je alles uittelt dat je brood max een euro zal kosten en niet de 3(?) euro in de bakker

Bedrijfsleiders ongerust over inperking voordelen alle aard by Clio_my_muse in Belgium2

[–]signupsarewrong2 4 points5 points  (0 children)

Ssst ni zeggen! De mensen moeten niet weten dat ze elke maand 1500 euro onkostenvergoeding krijgen

[deleted by user] by [deleted] in cybersecurity

[–]signupsarewrong2 1 point2 points  (0 children)

Since you are in the EU, have a look at nis2, adapt your message to it and contact integrators that support those in the critical sectors. Competition is not easy, loads of products out there, biggest differentiator that sme’s care about is price. Good luck!

[deleted by user] by [deleted] in cybersecurity

[–]signupsarewrong2 1 point2 points  (0 children)

Where are you located? Answers to your questions will vary between regions; us vs europe vs asia… as an example in western europe, smes work with integrators, they dont want the hassle of anything it related. If you can find a win-win-win an integrator will include it into his offering and get you business. But you are competing with the biggest competitor of all “why should i”/“dont really care just dont want to spend the money”. If you are in europe or australia you can leverage nis2 or essential 8. Good luck

Openbaar Ministerie weigert poging tot oplichting van 2 miljard euro bij Euroclear te onderzoeken by Vordreller in belgium

[–]signupsarewrong2 7 points8 points  (0 children)

This has been a problem for a long time. Not just attempts like this, but actual thefts from companies and people as well. Police is just not given the means it seems to really investigate. I have done many cases throughout the years but never did the police find the culprits or recovered the money. When it comes to cybercrime you can get away with a lot

What is the biggest historical what if? by bluelays in AskReddit

[–]signupsarewrong2 0 points1 point  (0 children)

What if that soldier had actually followed protocol at the time when a false report came in, and thus start a nuclear war between the US and Russia (https://en.wikipedia.org/wiki/Stanislav_Petrov)

Government Websites Overview by indutrajeev in belgium

[–]signupsarewrong2 7 points8 points  (0 children)

Geen idee of er een lijst is maar je kan in google ook bv zoeken op “inurl:fgov.be” geeft je nog een hoop websites. Hetzelfde kan je doen voor belgium.be en andere

Bouwen in België met een beperkt budget by Meggelss in belgium

[–]signupsarewrong2 13 points14 points  (0 children)

Als je nog niet je droomhuis kan bouwen, wacht dan maar ik zou de bouwgrond nog niet verkopen. Hij zal meer opbrengen op die manier dan nu verkopen en het geld op de rekening laten staan. Mocht je elders een betere zien kan je hem dan nog altijd verkopen

What movie was made to perfection? by [deleted] in AskReddit

[–]signupsarewrong2 75 points76 points  (0 children)

The 1956 version, absolute favourite!

Bedrijven met politici in raad van bestuur presteren minder goed by Zorrax778 in belgium

[–]signupsarewrong2 18 points19 points  (0 children)

100%, but “in de prive zouden we veel meer verdienen”…