<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Event Archives - KeyTech</title>
	<atom:link href="https://www.keytech.be/nl/category/event-nl/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.keytech.be/nl/category/event-nl/</link>
	<description>Digital innovation with a human touch</description>
	<lastBuildDate>Tue, 09 Apr 2024 14:22:06 +0000</lastBuildDate>
	<language>nl-BE</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Safest, festival voor veilig onderwijs</title>
		<link>https://www.keytech.be/nl/safest-veilig-onderwijs-festival/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 13:44:40 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Nieuws]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=3162</guid>

					<description><![CDATA[<p>Onze cybercrime expert Erik Steenhouwer zal op 13 mei 2024 een presentatie geven op de "Safest" festival in AP Hogeschool Antwerpen.</p>
<p>The post <a href="https://www.keytech.be/nl/safest-veilig-onderwijs-festival/">Safest, festival voor veilig onderwijs</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:2%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Ontdek de digitale duisternis!</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-1" style="--awb-content-alignment:justify;"><p>Onze cybercrime expert <strong>Erik Steenhouwer</strong> zal op <strong>13 mei 2024</strong> een presentatie geven op de &#8220;<a href="https://www.ictdag.be/45/aanbod/sessie/27" target="_blank" rel="noopener"><strong>Safest</strong></a>&#8221; festival in AP Hogeschool Antwerpen.</p>
<p>Studenten en onderwijzers worden er ongedompeld in een opwindende fictie over de modus operandi van cybercriminelen, waarin elke gelijkenis met recente gebeurtenissen geen louter toeval is.</p>
<p><a href="https://www.ictdag.be/45/aanbod/inschrijven" target="_blank" rel="noopener">Schrijf hier in!</a></p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-image-element " style="text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);"><span class=" fusion-imageframe imageframe-none imageframe-1 hover-type-none"><a class="fusion-no-lightbox" href="https://www.ictdag.be/45/aanbod/sessie/27" target="_blank" aria-label="GIQwmxiW8AECrmT" rel="noopener noreferrer"><img fetchpriority="high" decoding="async" width="800" height="493" src="https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-800x493.jpeg" alt class="img-responsive wp-image-3164" srcset="https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-200x123.jpeg 200w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-400x247.jpeg 400w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-600x370.jpeg 600w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-800x493.jpeg 800w, https://www.keytech.be/wp-content/uploads/2024/04/GIQwmxiW8AECrmT-1200x740.jpeg 1200w" sizes="(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px" /></a></span></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-text fusion-text-2"><h3>Inleiding</h3>
<p>Wij dompelen je onder in een opwindende fictie over de modus operandi van cybercriminelen.</p>
<h3></h3>
<h3>Inhoud</h3>
<p>Sommige films of series trekken bij de eerste seconden al onze aandacht omdat de eerste scène meteen het einde van het verhaal onthult, wat ons nieuwsgierig maakt naar wat vooraf ging.</p>
<p>De eerste scène in onze fictie is een real-time uitvoering van een echte * ransomware aanval op een geïsoleerde omgeving.</p>
<p>Zoals steeds reist de vraag bij het slachtoffer : hoe zijn we in deze schokkende situatie terechtgekomen en welke acties gingen hieraan vooraf?</p>
<p>Hier komt de magie tot leven, we bieden je de gelegenheid om de digitale tijd terug te draaien.</p>
<p>We pikken uit de verschillende mogelijke scenario’s een paar uit met telkens demonstraties van de sleutelmomenten die het verhaal beïnvloed hebben en de technische en gedragsmatige maatregelen die we hadden kunnen treffen om de aanval te blokkeren en het scenario te herschrijven met een happy ending.</p>
<h3></h3>
<h3>Resultaat</h3>
<p>Na deze sessie zal je via onthutsende demonstraties onuitwisbare inzichten meenemen over je kwetsbaarheden, samen met essentiële reflexen die je in staat zullen stellen om veiliger te navigeren in de digitale wereld van vandaag.</p>
</div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/nl/safest-veilig-onderwijs-festival/">Safest, festival voor veilig onderwijs</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ontdek de Digitale Duisternis!</title>
		<link>https://www.keytech.be/nl/ontdek-de-digitale-duisternis/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 25 Oct 2023 09:45:37 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Nieuws]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=3077</guid>

					<description><![CDATA[<p>Wij dompelen je onder in het complexe universum van de cybercriminaliteit.</p>
<p>The post <a href="https://www.keytech.be/nl/ontdek-de-digitale-duisternis/">Ontdek de Digitale Duisternis!</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:2%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Meer dan de helft van de ondernemingen werd al het slachtoffer van een cyberaanval!</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:35px;width:100%;"></div><div class="fusion-video fusion-youtube" style="--awb-max-width:854px;--awb-max-height:480px;--awb-align-self:center;--awb-width:100%;" data-autoplay="1"><div class="video-shortcode"><lite-youtube videoid="-2FS4ZfHPko" class="landscape" params="wmode=transparent&autoplay=1&amp;enablejsapi=1" title="YouTube video player 1" data-button-label="Play Video" width="854" height="480" data-thumbnail-size="auto" data-no-cookie="on"></lite-youtube></div></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-text fusion-text-3"><h3><strong>Denkt u dat u veilig bent?</strong></h3>
<p>Neem deel aan een ongekende meeslepende ervaring. Duik in de wereld van hackers, beleef een ransomware-aanval van binnenuit en probeer u niet te laten vangen door de kronkels van het internet.</p>
<p>Hier zijn een paar aanwijzingen over wat u kan verwachten:</p>
<ul>
<li>Een spannend scenario dat begint&#8230; met het einde</li>
<li>Cruciale beslissingen die u in realtime moet nemen</li>
<li>Verrassingen en interactiviteit met een vleugje humor</li>
</ul>
<p><strong>Denkt u dat u alles weet over cyberbeveiliging?</strong></p>
<p><strong><a href="https://cyber-coaching.be/opleidingen-cyberbeveiliging-faba/inschrijvingen/" target="_blank" rel="noopener">Maak een afspraak voor een unieke opleiding!</a></strong></p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div style="text-align:center;"><a class="fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type" target="_blank" rel="noopener noreferrer" href="https://cyber-coaching.be/opleidingen-cyberbeveiliging-faba/"><span class="fusion-button-text awb-button__text awb-button__text--default">Meer informatie</span></a></div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/nl/ontdek-de-digitale-duisternis/">Ontdek de Digitale Duisternis!</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ontdek een &#8220;echte ransomware aanval&#8221; van build tot deployment</title>
		<link>https://www.keytech.be/nl/cybersecurity-aperos-een-echte-ransomware-van-build-tot-deployment/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 Feb 2023 13:21:54 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Nieuws]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/cybersecurity-aperos-een-echte-ransomware-van-build-tot-deployment/</guid>

					<description><![CDATA[<p>Leer hoe u uzelf en uw bedrijf beter kunt beschermen tegen geavanceerde cyberaanvallen en ransomware.</p>
<p>The post <a href="https://www.keytech.be/nl/cybersecurity-aperos-een-echte-ransomware-van-build-tot-deployment/">Ontdek een &#8220;echte ransomware aanval&#8221; van build tot deployment</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:2%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;"><p>Leer de juiste gedragsmatige- en technische maatregelen<br />
om een ramsomware in elke fase van zijn levenscyclus te belemmeren</p></h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-4 awb-text-cols fusion-text-columns-2 fusion-no-small-visibility fusion-no-medium-visibility" style="--awb-content-alignment:justify;--awb-columns:2;--awb-column-spacing:2em;--awb-column-min-width:100px;"><p>Schrijf u in op onze <strong>Cybersecurity Apero’s</strong> (van 12:00 tot 12:30) en geniet van <strong>10 coaching sessies van 30 minuten</strong> van een cybersecurity expert (20 min. presentatie + 10 min. Q&amp;A).</p>
<p>Prijs per deelnemer voor de 10 sessies : <strong>200€ excl.</strong> <strong>BTW </strong>(gefactureerd)</p>
<p>Doelpubliek: Ongeacht uw profiel (manager of werknemer) of technische achtergrond (IT-er of niet), iedereen zal waardevolle tips onthouden tijdens elke cyclus van de verbluffende aanvalsdemonstratie.</p>
<p><strong>Geen product pitching!</strong></p>
<p>De trainingen gaan door in het Engels, maar je kan je vragen stellen in het Frans of Nederlands tijdens het Q&amp;A gedeelte.</p>
<p>Voor elke sessie wordt <strong>2 dagen op voorhand</strong> een <strong>Teams link</strong> doorgestuurd.<br />
Na elke sessie ontvangt iedere ingeschreven deelnemer de powerpoint slides, ook zij die een sessie gemist hebben.<br />
De sessies zijn zo opgebouwd dat je een sessie kan skippen en de volgende toch gemakkelijk kan volgen, maar ze worden niet opgenomen.</p>
<p>Om de kwaliteit van de bandbreedte te waarborgen en iedereen de kans te geven vragen te stellen, zijn de inschrijvingen <strong>beperkt tot 25 personen</strong>, maar u wordt geïnformeerd over de volgende reeks die zal doorgaan in mei en juni als u te laat was om u voor deze reeks in te schrijven.</p>
</div><div class="fusion-text fusion-text-5 fusion-no-large-visibility" style="--awb-content-alignment:center;"><p>Schrijf u in op onze <strong>Cybersecurity Apero’s</strong> (van 12:00 tot 12:30) en geniet van <strong>10 coaching sessies van 30 minuten</strong> van een cybersecurity expert (20 min. presentatie + 10 min. Q&amp;A).</p>
<p>Prijs per deelnemer voor de 10 sessies : <strong>200€ excl.</strong> <strong>BTW </strong>(gefactureerd)</p>
<p>Doelpubliek: Ongeacht uw profiel (manager of werknemer) of technische achtergrond (IT-er of niet), iedereen zal waardevolle tips onthouden tijdens elke cyclus van de verbluffende aanvalsdemonstratie.</p>
<p><strong>Geen product pitching!</strong></p>
<p>De trainingen gaan door in het Engels, maar je kan je vragen stellen in het Frans of Nederlands tijdens het Q&amp;A gedeelte.</p>
<p>Voor elke sessie wordt <strong>2 dagen op voorhand</strong> een <strong>Teams link</strong> doorgestuurd.<br />
Na elke sessie ontvangt iedere ingeschreven deelnemer de powerpoint slides, ook zij die een sessie gemist hebben.<br />
De sessies zijn zo opgebouwd dat je een sessie kan skippen en de volgende toch gemakkelijk kan volgen, maar ze worden niet opgenomen.</p>
<p>Om de kwaliteit van de bandbreedte te waarborgen en iedereen de kans te geven vragen te stellen, zijn de inschrijvingen <strong>beperkt tot 25 personen</strong>, maar u wordt geïnformeerd over de volgende reeks die zal doorgaan in mei en juni als u te laat was om u voor deze reeks in te schrijven.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:35px;width:100%;"></div><div class="fusion-title title fusion-title-4 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Line Up #SeizoenEén</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-content-boxes content-boxes columns row fusion-columns-2 fusion-columns-total-10 fusion-content-boxes-1 content-boxes-timeline-horizontal content-left content-boxes-icon-on-top content-boxes-timeline-layout fusion-delayed-animation" style="--awb-backgroundcolor:var(--awb-color2);--awb-hover-accent-color:var(--awb-custom_color_2);--awb-circle-hover-accent-color:transparent;" data-animation-delay="350" data-animationOffset="top-into-view"><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-1 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/darksideoftheweb.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#1 The dark side of the force</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>The cybercrime business model on the dark web</p>
<p><strong>21 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-2 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/ransomware-pc.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#2 Ransomware illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>The lifecycle of a ransomware from build to deployment</p>
<p><strong>23 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-3 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/suicidebunnies.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#3 Suicide bunnies</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>&#8220;Suicide bunnies&#8221; exposing a big attack/vulnerability surface</p>
<p><strong>28 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-4 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/trojanhorse.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#4 Trojan horses illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>From myth to malwares (malicious software, files, devices, …)</p>
<p><strong>30 march 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-5 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/anobotnet.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#5 Hidden exploits illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>When your computer becomes part of a botnet &#8230;</p>
<p><strong>4 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-6 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/socialnetworkinvasion.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#6 Privacy invasion</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Reduce your fingerprint!</p>
<p><strong>6 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-7 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/credentials.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#7 Password cracking</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Hackers mostly don’t need to break in, when they can just login</p>
<p><strong>11 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-8 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/phishingscam.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#8 Phish' &amp; Scam</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Sophisticated phishing and social engineering techniques in 2023</p>
<p><strong>13 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-9 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/sniffing.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#9 Sniffing illustrated</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Prevent your sensitive data from being intercepted</p>
<p><strong>18 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div style="--awb-backgroundcolor:var(--awb-color2);" class="fusion-column content-box-column content-box-column content-box-column-10 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last content-box-column-last-in-row"><div class="col content-box-wrapper content-wrapper-background link-area-link-icon icon-hover-animation-slide fusion-animated" data-animationType="fadeIn" data-animationDuration="0.25" data-animationOffset="top-into-view"><div class="heading heading-with-icon icon-left"><div aria-hidden="true" class="image"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2023/02/passwordmanagement.jpg" width="545" height="250" alt="" /></div><h2 class="content-box-heading fusion-responsive-typography-calculated" style="--h2_typography-font-size:28px;--fontSize:28;line-height:1.4;">#10 Data breaches</h2></div><div class="fusion-clearfix"></div><div class="content-container">
<p>Protect yourself against data breaches</p>
<p><strong>20 april 2023 from 12h00 to 12h30</strong></p>
</div></div></div><div class="fusion-clearfix"></div></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-bottom:35px;width:100%;"></div><div style="text-align:center;"><a class="fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type" target="_self" href="#" data-toggle="modal" data-target=".fusion-modal.cybersnack_signup_nl"><span class="fusion-button-text awb-button__text awb-button__text--default">INSCHRIJVEN</span></a></div><div class="fusion-modal modal fade modal-1 cybersnack_signup_nl" tabindex="-1" role="dialog" aria-labelledby="modal-heading-1" aria-hidden="true" style="--awb-border-color:var(--awb-color3);--awb-background:var(--awb-color2);"><div class="modal-dialog modal-lg" role="document"><div class="modal-content fusion-modal-content"><div class="modal-header"><button class="close" type="button" data-dismiss="modal" aria-hidden="true" aria-label="Close">&times;</button><h3 class="modal-title" id="modal-heading-1" data-dismiss="modal" aria-hidden="true">Registratie voor onze serie van 10 cybersecurity coachings (30 min.)</h3></div><div class="modal-body fusion-clearfix">
<p>Prijs: <strong>200€ BTW excl.</strong> (gefactureerd aan uw bedrijf) per deelnemer voor de 10 sessies</p>
<div class="fusion-form fusion-form-builder fusion-form-form-wrapper fusion-form-2967" style="--awb-tooltip-text-color:#ffffff;--awb-tooltip-background-color:#333333;" data-form-id="2967" data-config="{&quot;form_id&quot;:2967,&quot;form_post_id&quot;:2967,&quot;post_id&quot;:2970,&quot;form_type&quot;:&quot;ajax&quot;,&quot;confirmation_type&quot;:&quot;message&quot;,&quot;redirect_url&quot;:&quot;&quot;,&quot;redirect_timeout&quot;:&quot;0&quot;,&quot;field_labels&quot;:{&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;vatnumber&quot;:&quot;&quot;},&quot;field_logics&quot;:{&quot;firstname&quot;:&quot;&quot;,&quot;lastname&quot;:&quot;&quot;,&quot;email&quot;:&quot;&quot;,&quot;company&quot;:&quot;&quot;,&quot;vatnumber&quot;:&quot;&quot;,&quot;submit_1&quot;:&quot;&quot;,&quot;notice_1&quot;:&quot;&quot;},&quot;field_types&quot;:{&quot;firstname&quot;:&quot;text&quot;,&quot;lastname&quot;:&quot;text&quot;,&quot;email&quot;:&quot;email&quot;,&quot;company&quot;:&quot;text&quot;,&quot;vatnumber&quot;:&quot;text&quot;,&quot;submit_1&quot;:&quot;submit&quot;,&quot;recaptcha_1&quot;:&quot;recaptcha&quot;,&quot;notice_1&quot;:&quot;notice&quot;},&quot;nonce_method&quot;:&quot;ajax&quot;,&quot;form_views&quot;:&quot;ajax&quot;,&quot;form_views_counting&quot;:&quot;all&quot;}"><form action="https://www.keytech.be/nl/cybersecurity-aperos-een-echte-ransomware-van-build-tot-deployment/" method="post" class="fusion-form fusion-form-2967"><div class="fusion-fullwidth fullwidth-box fusion-builder-row-3-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap" style="width:104% !important;max-width:104% !important;margin-left: calc(-4% / 2 );margin-right: calc(-4% / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2967"><input type="text" autocomplete="off" name="firstname" id="firstname" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Voornaam *" data-holds-private-data="false" minlength="0"/></div><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2967"><input type="text" autocomplete="off" name="lastname" id="lastname" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Achternaam *" data-holds-private-data="false" minlength="0"/></div><div class="fusion-form-field fusion-form-email-field fusion-form-label-above" style="" data-form-id="2967"><input type="email" autocomplete="off" name="email" id="email" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Email *" data-holds-private-data="false"/></div><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2967"><input type="text" autocomplete="off" name="company" id="company" value=""  class="fusion-form-input" required="true" aria-required="true" placeholder="Bedrijf *" data-holds-private-data="false" minlength="0"/></div><div class="fusion-form-field fusion-form-text-field fusion-form-label-above" style="" data-form-id="2967"><input type="text" autocomplete="off" name="vatnumber" id="vatnumber" value=""  class="fusion-form-input" placeholder="BTW-nummer (BE xxxx.xxx.xxx) " data-holds-private-data="false" minlength="10" maxlength="15"/></div><div class="fusion-form-field fusion-form-submit-field fusion-form-label-above" style="" data-form-id="2967"><div class="fusion-button-wrapper fusion-aligncenter"><button type="submit" class="fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span  button-default form-form-submit" style="--awb-margin-bottom:30px;" data-form-number="2967" tabindex=""><span class="fusion-button-text awb-button__text awb-button__text--default">Registreren</span></button></div></div><div class="fusion-form-field fusion-form-recaptcha-field fusion-form-label-above" style="" data-form-id="2967">				<div class="form-creator-recaptcha" >
																							<div class="fusion-form-recaptcha-wrapper">
										<div
							id="g-recaptcha-id-form-2967"
							class="fusion-form-recaptcha-v3 recaptcha-container "
							data-sitekey="6LdQojwiAAAAAPdAow3cEOtGjSwVtrDdKbgCAeue"
							data-badge="inline">
						</div>
						<input
							type="hidden"
							name="fusion-form-recaptcha-response"
							class="g-recaptcha-response"
							id="fusion-form-recaptcha-response-2967"
							value="">
									</div>
															</div>
				</div><div class="form-submission-notices data-notice_1" id="fusion-notices-1" data-instance="1"><div class="fusion-alert alert success alert-success fusion-alert-center fusion-form-response fusion-form-response-success fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed" role="alert"><div class="fusion-alert-content-wrapper"><span class="alert-icon"><i class="awb-icon-check-circle" aria-hidden="true"></i></span><span class="fusion-alert-content">Bedankt voor uw inschrijving. Het is verzonden.</span></div><button type="button" class="close toggle-alert" data-dismiss="alert" aria-label="Close">&times;</button></div><div class="fusion-alert alert error alert-danger fusion-alert-center fusion-form-response fusion-form-response-error fusion-alert-capitalize awb-alert-native-link-color alert-dismissable awb-alert-close-boxed" role="alert"><div class="fusion-alert-content-wrapper"><span class="alert-icon"><i class="awb-icon-exclamation-triangle" aria-hidden="true"></i></span><span class="fusion-alert-content">Er is een fout opgetreden bij het verzenden van uw registratie. Probeer het later nog eens.</span></div><button type="button" class="close toggle-alert" data-dismiss="alert" aria-label="Close">&times;</button></div></div></div></div></div></div><input type="hidden" name="fusion_privacy_store_ip_ua" value="true"></form></div>
</div></div></div></div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/nl/cybersecurity-aperos-een-echte-ransomware-van-build-tot-deployment/">Ontdek een &#8220;echte ransomware aanval&#8221; van build tot deployment</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hacking: the new normal?</title>
		<link>https://www.keytech.be/nl/hacking-the-new-normal/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 05 Oct 2022 21:34:48 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/hacking-the-new-normal/</guid>

					<description><![CDATA[<p>Onze CEO, Erik Steenhouwer, zal aanwezig zijn op Digitalize Flanders voor een toespraak over hacking methodes.</p>
<p>The post <a href="https://www.keytech.be/nl/hacking-the-new-normal/">Hacking: the new normal?</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Hacking: the new normal?</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-6"><p>Onze CEO, Erik Steenhouwer, zal aanwezig zijn op <a href="https://www.digitalizeflanders.be/guest/erik-steenhouwer/" target="_blank" rel="noopener">Digitalize Flanders</a> voor een toespraak over hacking methodes.</p>
<p><a href="https://www.digitalizeflanders.be/"><img decoding="async" class="alignnone wp-image-2574 size-fusion-800" src="https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-800x257.jpg" alt="" width="800" height="257" srcset="https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-200x64.jpg 200w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-300x96.jpg 300w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-400x128.jpg 400w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-600x193.jpg 600w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-768x246.jpg 768w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-800x257.jpg 800w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders-1024x329.jpg 1024w, https://www.keytech.be/wp-content/uploads/2022/10/DIGITALIZE22-Flanders.jpg 1200w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>Aarzel niet om ons te vervoegen! Meer informatie <a href="https://www.digitalizeflanders.be/guest/erik-steenhouwer/" target="_blank" rel="noopener">hier</a>.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Digitalize Flanders &#8211; 20 &amp; 21 oktober 2022 @ Antwerp Expo</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-7"><p>Tijdens deze keynote ontdek je dat de meeste hackers geen mysterieuze tovenaars zijn die vanuit hun donkere kamer met een kap over hun hoofd en gebogen achter hun PC groene teksten typen die dwars door de firewall van een bedrijf breken.</p>
<p>Vaak zijn het gewone mensen die op winstbejag uit zijn en bij gebrek aan technische expertise bestaande geautomatiseerde tools op het dark web gebruiken of youtube tutorials volgen om kwetsbaarheden uit te buiten.</p>
<p>Via deze andere inkijk op de modus operandi van hackers ontdek je welke de meest voorkomende misvattingen zijn en hoe sommige simpele voorzorgen nog steeds een doeltreffende bescherming bieden.</p>
</div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/nl/hacking-the-new-normal/">Hacking: the new normal?</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hoe bescherm je jezelf tegen cybercriminaliteit?</title>
		<link>https://www.keytech.be/nl/hoe-bescherm-je-jezelf-tegen-cybercriminaliteit/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 19 Oct 2021 08:41:02 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/?p=2635</guid>

					<description><![CDATA[<p>In deze Learning Snack leggen wij uit waarom cybercriminaliteit in opmars is en hoe je je ertegen wapent.</p>
<p>The post <a href="https://www.keytech.be/nl/hoe-bescherm-je-jezelf-tegen-cybercriminaliteit/">Hoe bescherm je jezelf tegen cybercriminaliteit?</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:38;line-height:1.4;">Learning Snacks: Hoe bescherm je jezelf tegen cybercriminaliteit?</h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-8"><p>In deze Learning Snack legt onlineveiligheidsexpert Erik Steenhouwer uit waarom cybercriminaliteit in opmars is en hoe je je ertegen wapent.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;"></div><div class="fusion-video fusion-youtube" style="--awb-max-width:842px;--awb-max-height:474px;--awb-align-self:center;--awb-width:100%;"><div class="video-shortcode"><lite-youtube videoid="ETdGyVu1Lws" class="landscape" params="wmode=transparent&autoplay=1&amp;enablejsapi=1" title="YouTube video player 2" data-button-label="Play Video" width="842" height="474" data-thumbnail-size="auto" data-no-cookie="on"></lite-youtube></div></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:15px;width:100%;"></div><div class="fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Waarom cybercriminaliteit in opmars is</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-9"><p>Cybercriminaliteit is zeker geen nieuw fenomeen, maar is de laatste jaren wel exponentieel toegenomen. Zo ben je tegenwoordig met <strong>verschillende apparaten</strong> (tv, smartphone, alarminstallatie, webcam …) verbonden via het internet. Een zwakke beveiliging van een van die toestellen betekent een gevaar voor je hele online omgeving – en dus je persoonlijke gegevens.</p>
<p>Daarnaast biedt cybercriminaliteit een <strong>interessant businessmodel</strong>. Via het <i>dark web</i> kunnen criminelen anoniem te werk gaan en enorm veel geld in handen krijgen met een heel laag risico. Ook het cryptogeld waarmee ze transacties uitvoeren is zo goed als niet terug te brengen tot hun persoon.</p>
<p>Van GDPR-wetgeving tot en met slimme technologie: er bestaan heel wat hulpmiddelen om je te wapenen tegen cybercriminaliteit, maar <strong>één pasklare oplossing is er niet</strong>. Veel internetgebruikers beseffen bovendien niet dat ze ook een doelwit kunnen zijn en dat ze dus het best de nodige maatregelen treffen om geen slachtoffer van digitale misdaad te worden.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Waarom cybercriminaliteit ook voor jou een gevaar is</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-10"><p>Ook jij kwam meer dan waarschijnlijk al in contact met cybercriminaliteit, bewust of onbewust. Zo kreeg je misschien al eens een mail of sms waarin criminelen met een valse identiteit naar persoonlijke gegevens hengelen. Deze veelvoorkomende vorm van cybercriminaliteit heet <strong>phishing</strong>.</p>
<p>Connecteren met een onbeveiligd netwerk, je computer ontgrendeld achterlaten, naar een frauduleuze website surfen … Vaak ligt een eigen handeling rechtstreeks aan de basis van je beveiligingsprobleem. Maar soms zit de <strong>fout bij derden</strong>. Denk maar aan een webshop die door een datalek je gegevens te grabbel gooit. In beide gevallen zijn er gelukkig opties om jezelf te beschermen.</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-three" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h3 class="fusion-title-heading title-heading-left fusion-responsive-typography-calculated" style="margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;">Hoe je je kan beschermen tegen cybercriminaliteit</h3></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-11"><p>Zowel <strong>technologisch</strong> als <strong>gedragsmatig</strong> kan je maatregelen nemen tegen cybercriminaliteit. Zo zijn tools om je paswoorden versleuteld te beheren (bv. <a href="https://www.lastpass.com/" target="_blank" rel="noopener noreferrer">LastPass</a>) een sterke bescherming tegen datalekken op de websites van derden. Je wachtwoorden regelmatig wijzigen is dan weer een actie waarvoor je zelfdiscipline nodig hebt.</p>
<p>In <a href="https://www.cevora.be/nl/vind-je-opleiding?term=cybersecurity&amp;searchAs=EM&amp;languages=%5b%22nl%22%5d" target="_blank" rel="noopener">de opleidingen van Cevora</a> kom je te weten welke maatregelen het meest geschikt zijn voor de verschillende vormen van cybercriminaliteit.</p>
</div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/nl/hoe-bescherm-je-jezelf-tegen-cybercriminaliteit/">Hoe bescherm je jezelf tegen cybercriminaliteit?</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Event</title>
		<link>https://www.keytech.be/nl/cyberevent-2020/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 21 Sep 2020 21:26:24 +0000</pubDate>
				<category><![CDATA[Event]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.keytech.be/cyberevent-2020/</guid>

					<description><![CDATA[<p>Awareness is the first step to action!</p>
<p>The post <a href="https://www.keytech.be/nl/cyberevent-2020/">Cybersecurity Event</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap" style="max-width:calc( 1260px + 0px );margin-left: calc(-0px / 2 );margin-right: calc(-0px / 2 );"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column" style="--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;"><div class="fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column"><div class="fusion-title title fusion-title-11 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two" style="--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;"><h2 class="fusion-title-heading title-heading-center fusion-responsive-typography-calculated" style="margin:0;text-transform:capitalize;--fontSize:38;line-height:1.4;">Cybersecurity Event &#8211; <em>17 September 2020</em></h2></div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="fusion-text fusion-text-12"><p style="text-align: center;">Reflecting on the success of this year we are driven to blow your mind next year!</p>
</div><div class="fusion-separator fusion-full-width-sep" style="align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;"></div><div class="awb-gallery-wrapper awb-gallery-wrapper-1 button-span-no" style="--more-btn-alignment:center;"><div style="margin:-2px;--awb-aspect-ratio:1 / 1;--awb-object-position:49% 24%;--awb-bordersize:0px;" class="fusion-gallery fusion-gallery-container fusion-grid-4 fusion-columns-total-16 fusion-gallery-layout-grid fusion-gallery-1 has-aspect-ratio"><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11-320x202.jpg" width="320" height="202" alt="" title="cyberevent11" aria-label="cyberevent11" class="img-responsive wp-image-1460 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent11-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12-320x202.jpg" width="320" height="202" alt="" title="cyberevent12" aria-label="cyberevent12" class="img-responsive wp-image-1461 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent12-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13-320x202.jpg" width="320" height="202" alt="" title="cyberevent13" aria-label="cyberevent13" class="img-responsive wp-image-1462 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent13-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14-320x202.jpg" width="320" height="202" alt="" title="cyberevent14" aria-label="cyberevent14" class="img-responsive wp-image-1463 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent14-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15-320x202.jpg" width="320" height="202" alt="" title="cyberevent15" aria-label="cyberevent15" class="img-responsive wp-image-1464 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent15-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16-320x202.jpg" width="320" height="202" alt="" title="cyberevent16" aria-label="cyberevent16" class="img-responsive wp-image-1465 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent16-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1-320x202.jpg" width="320" height="202" alt="" title="cyberevent1" aria-label="cyberevent1" class="img-responsive wp-image-1466 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent1-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2-320x202.jpg" width="320" height="202" alt="" title="cyberevent2" aria-label="cyberevent2" class="img-responsive wp-image-1467 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent2-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3-320x202.jpg" width="320" height="202" alt="" title="cyberevent3" aria-label="cyberevent3" class="img-responsive wp-image-1468 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent3-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4-320x202.jpg" width="320" height="202" alt="" title="cyberevent4" aria-label="cyberevent4" class="img-responsive wp-image-1469 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent4-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5-320x202.jpg" width="320" height="202" alt="" title="cyberevent5" aria-label="cyberevent5" class="img-responsive wp-image-1470 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent5-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6-320x202.jpg" width="320" height="202" alt="" title="cyberevent6" aria-label="cyberevent6" class="img-responsive wp-image-1471 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent6-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7-320x202.jpg" width="320" height="202" alt="" title="cyberevent7" aria-label="cyberevent7" class="img-responsive wp-image-1472 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent7-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8-320x202.jpg" width="320" height="202" alt="" title="cyberevent8" aria-label="cyberevent8" class="img-responsive wp-image-1473 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent8-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9-320x202.jpg" width="320" height="202" alt="" title="cyberevent9" aria-label="cyberevent9" class="img-responsive wp-image-1474 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent9-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div style="padding:2px;" class="fusion-grid-column fusion-gallery-column fusion-gallery-column-4 hover-type-none"><div class="fusion-gallery-image"><a href="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10.jpg" rel="noreferrer" data-rel="iLightbox[gallery_image_1]" class="fusion-lightbox" target="_self"><img decoding="async" src="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10-320x202.jpg" width="320" height="202" alt="" title="cyberevent10" aria-label="cyberevent10" class="img-responsive wp-image-1475 fusion-gallery-image-size-fixed" srcset="https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10-320x202.jpg 320w, https://www.keytech.be/wp-content/uploads/2020/09/cyberevent10-700x441.jpg 700w" sizes="(max-width: 320px) 100vw, 320px" /></a></div></div><div class="clearfix"></div></div></div></div></div></div></div>
<p>The post <a href="https://www.keytech.be/nl/cyberevent-2020/">Cybersecurity Event</a> appeared first on <a href="https://www.keytech.be/nl/">KeyTech</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
