Posts

/../assets/images/posts/reinvent.png
Ashish Rajan (Kaizenteq): Data Sovereignty Will Define the Future of Cloud Security and Compliance

Learn from Ashish Rajan (Kaizenteq) what it takes to secure your cloud environments

Jeroen Prinse

Jeroen Prinse

1 min read
/../assets/images/posts/reinvent.png
Paul Watts (ISF): Here is what it takes to be a NextGen CISO!

Learn from Paul Watts (ISF) what it takes to be the next generation CISO

Tags: Leadership
Jeroen Prinse

Jeroen Prinse

2 min read
/../assets/images/posts/mpc data flow.webp
Multi-Party Computation for Secure, Private Data Collaboration

The article explores Multi-Party Computation (MPC). It highlights how MPC allows multiple parties to compute functions over their private data without ever exposing the data itself, maintaining confidentiality throughout the process.

Jeroen Prinse

Jeroen Prinse

4 min read
/../assets/images/posts/reinvent.png
Toon Segers (Roseman Labs): Multi-Party Computation for Secure, Private Data Collaboration

Learn from Toon Segers, co-founder of Roseman Labs and PhD candidate about Multi-Party Computation

Jeroen Prinse

Jeroen Prinse

2 min read
/../assets/images/posts/reinvent.png
Sunette Runhaar (Uber): Why managing Insider Threat is so challenging, and how to start

Learn from world industry expert Sunette Runhaar (Uber) on Insider Threat programs.

Jeroen Prinse

Jeroen Prinse

2 min read
/../assets/images/posts/reinvent.png
Rob van der Veer (SIG): Treat Artificial Intelligence as Software Initiatives

Learn from world industry expert Rob van der Veer what to consider when securing AI.

Tags: AI
Jeroen Prinse

Jeroen Prinse

2 min read