{"id":4375,"date":"2025-03-15T09:15:23","date_gmt":"2025-03-15T08:15:23","guid":{"rendered":"https:\/\/ba.be\/medias\/"},"modified":"2025-08-29T11:14:07","modified_gmt":"2025-08-29T09:14:07","slug":"medias","status":"publish","type":"page","link":"https:\/\/ba.be\/fr\/medias\/","title":{"rendered":"m\u00e9dias"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4375\" class=\"elementor elementor-4375 elementor-1110\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4918594 e-flex e-con-boxed e-con e-parent\" data-id=\"4918594\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-30afc41 e-con-full e-flex e-con e-child\" data-id=\"30afc41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b960bf1 elementor-widget elementor-widget-text-editor\" data-id=\"b960bf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;expertise n&rsquo;acquiert de la valeur que lorsqu&rsquo;elle est partag\u00e9e. Au fil des ans, nous avons eu l&rsquo;occasion de partager nos connaissances et notre vision dans de nombreuses publications, podcasts et interviews. Ces archives t\u00e9moignent de notre contribution au d\u00e9bat public et montrent que les m\u00e9dias savent trouver BA pour obtenir des \u00e9claircissements et des analyses. Vous trouverez ci-dessous un aper\u00e7u complet de notre travail.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-301e15b e-con-full e-flex e-con e-child\" data-id=\"301e15b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cc73b8 elementor-widget elementor-widget-heading\" data-id=\"5cc73b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">contact PR<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20f3496 elementor-widget elementor-widget-text-editor\" data-id=\"20f3496\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"mailto:pr@ba.be?subject=PR%20via%20website%20BA%20contact\" target=\"_top\">pr@ba.be<\/a><br><a href=\"tel:+3216298045\">+32 (0)16 29 80 45<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dda1df elementor-widget elementor-widget-heading\" data-id=\"6dda1df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Suivez BA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93ec7b4 elementor-shape-circle e-grid-align-left elementor-grid-0 elementor-widget elementor-widget-social-icons\" data-id=\"93ec7b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-b3ed7e5\" href=\"https:\/\/www.linkedin.com\/company\/5069320\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-x-twitter elementor-repeater-item-51f8910\" href=\"https:\/\/x.com\/batweets\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">X-twitter<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-x-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0edc65f e-flex e-con-boxed e-con e-parent\" data-id=\"0edc65f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad7cce8 e-con-full e-flex e-con e-child\" data-id=\"ad7cce8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0cec768 e-con-full e-flex e-con e-child\" data-id=\"0cec768\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d182f75 elementor-widget elementor-widget-n-accordion\" data-id=\"d182f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2190\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2190\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> vid\u00e9o <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2190\" class=\"elementor-element elementor-element-3025782 e-con-full e-flex e-con e-child\" data-id=\"3025782\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2190\" class=\"elementor-element elementor-element-a5b9a67 e-flex e-con-boxed e-con e-child\" data-id=\"a5b9a67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6674c6d e-tabs-view-vertical elementor-layout-end elementor-widget elementor-widget-video-playlist\" data-id=\"6674c6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;playlist_title&quot;:&quot;Playlist&quot;,&quot;tabs&quot;:[{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=RTAIK3BJ7RE&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen &quot;,&quot;duration&quot;:&quot;1:25:01&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen &lt;\\\/strong&gt;&lt;br \\\/&gt;Wist je dat de kans dat jouw bedrijf te maken krijgt met een cyberaanval 1 op 5 is? Anno 2025 kan je er niet meer omheen: vroeg of laat krijg je te maken met \\u00e9\\u00e9n of andere vorm van hacking of cyberaanval. Als ondernemer is het belangrijk dat je zo goed mogelijk bent voorbereid en je activiteit weerbaar maakt zodat een aanval zo weinig mogelijk impact heeft op je werking, data, klanten, netwerk, website en financi\\u00eble middelen. Je systemen testen en scannen is cruciaal, want zo identificeer je kwetsbaarheden voordat hackers deze kunnen misbruiken. Je kan zo gevoelige informatie zoals klantgegevens en bedrijfsdata beschermen. En dat zorgt dan weer dat je financi\\u00eble verliezen en boetes vermijdt. In dit webinar duikt Jan Guldentops, CEO van BA, erkend security &amp; IT bedrijf en docent cybersecurity aan de AP Hogeschool, in de problematiek, en vooral in de oplossingen die scanning- en testsystemen bieden om je te helpen je bedrijf te beschermen tegen cyberaanvallen. En hij doet dat in mensentaal, zodat je als KMO, webshops of zelfstandige ondernemer \\u00e9cht beter begrijpt hoe je je digitale omgeving veiliger kan maken.       &lt;\\\/p&gt;\\n&lt;p&gt;Je mag een antwoord verwachten op volgende vragen:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Waarom is scannen en testen zo belangrijk?&lt;\\\/li&gt;\\n&lt;li&gt;Welke soorten scansystemen bestaan er en wat doen ze juist?&lt;\\\/li&gt;\\n&lt;li&gt;Wat is ethical hacking en hoe kunnen hackers jouw bedrijf juist helpen?&lt;\\\/li&gt;\\n&lt;li&gt;Wat is de impact van beveiligen en hoe begin je er concreet aan?&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Of je nu een webshop runt, zelfstandig ondernemer bent of een KMO leidt: dit webinar is op maat van niet-IT&#039;ers die hun bedrijf willen beschermen tegen de groeiende cyberrisico&#039;s.&lt;\\\/p&gt;\\n&quot;,&quot;_id&quot;:&quot;8bed692&quot;,&quot;index&quot;:0,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=bFozA9E1iH4&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie&quot;,&quot;duration&quot;:&quot;1:26:42&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie&lt;\\\/strong&gt;&lt;br \\\/&gt;Wist je dat gevoelige klantgegevens en bedrijfsdata zonder de juiste bescherming gemakkelijk in verkeerde handen kunnen vallen? Of dat encryptie, een krachtige beveiligingstechniek, eenvoudig en betaalbaar kan worden toegepast, zelfs zonder technische voorkennis? &lt;\\\/p&gt;\\n&lt;p&gt;Jan Guldentops, cybersecurity-expert met meer dan 20 jaar ervaring, neemt je op een toegankelijke manier mee in de wereld van encryptie en online veiligheid. In een uurtje tijd ontdek je alles over encryptie: &lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Wat is encryptie precies? In eenvoudige, begrijpelijke taal uitgelegd. &lt;\\\/li&gt;\\n&lt;li&gt;Waarom is het onmisbaar? Bescherm jezelf \\u00e9n je klanten tegen datalekken en cyberdreigingen. &lt;\\\/li&gt;\\n&lt;li&gt;Hoe pas je het toe? Praktische tips en stappen die je meteen kunt gebruiken. &lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Of je nu een webshop runt, zelfstandig ondernemer bent of een KMO leidt: dit webinar is op maat van niet-IT&#039;ers die hun bedrijf willen beschermen tegen de groeiende cyberrisico&#039;s.&lt;\\\/p&gt;\\n&quot;,&quot;_id&quot;:&quot;3059bb6&quot;,&quot;index&quot;:1,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=SUtu0i04vZQ&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen&quot;,&quot;duration&quot;:&quot;1:19:16&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen&lt;\\\/strong&gt;&lt;br \\\/&gt;Hoe maak je dat je bedrijf best tegen een cyberstootje kan zonder dure technologische wizards in te schakelen? Al moet je waarschijnlijk wel de hulp van gespecialiseerde leveranciers inroepen, toch is het belangrijk dat je zelf het overzicht \\u00e9n de controle in handen houdt. En dat is precies wat je in deze sessie leert.&lt;br \\\/&gt;Op een uurtje tijd geeft Jan Guldentops, CEO van BA, erkend security &amp; IT bedrijf je tekst en uitleg in mensentaal. Je kan je vragen stellen en kan daarna meteen aan de slag met eenvoudige middelen om de cyberveiligheid en weerbaarheid van je online zaak te verbeteren.   &lt;\\\/p&gt;\\n&lt;p&gt;Wat krijg je ?&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Duidelijke uitleg van de cyber-crime problematiek en terminologie in mensentaal&lt;\\\/li&gt;\\n&lt;li&gt;Zicht op wat een passieve scan van je systeem is en hoe je eventuele gerapporteerde problemen kan oplossen&lt;\\\/li&gt;\\n&lt;li&gt;Een checklist van wat je allemaal moet controleren\\\/afspreken met je leveranciers&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;_id&quot;:&quot;e011e53&quot;,&quot;index&quot;:2,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=WEd-W8Ugq2k&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?&quot;,&quot;duration&quot;:&quot;1:41:56&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?&lt;\\\/strong&gt;&lt;br \\\/&gt;Het is voor \\u2018white hat hackers\\u2019 ( en minder ethische collega\\u2019s) vaak heel eenvoudig om bij je webshop binnen te raken door middel van fishing, social engineering of gewoon door een wachtwoord te raden. Hoe zorg je dan dat je gegevens goed beveiligd zijn? &lt;br \\\/&gt;Op een uurtje tijd geeft Jan Guldentops, CEO van BA, erkend security &amp; IT bedrijf je tekst en uitleg over:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Hoe je je wachtwoorden en andere credentials best bewaart&lt;\\\/li&gt;\\n&lt;li&gt;Hoe multifactorauthenticatie werkt en waarom je dat best inzet&lt;\\\/li&gt;\\n&lt;li&gt;Hoe je omgaat met verschillende gebruikers en waarom je best niet dezelfde credentials voor de hele groep gebruikt&lt;\\\/li&gt;\\n&lt;li&gt;Hoe je de toegang beperkt tot het minimum noodzakelijke&lt;\\\/li&gt;\\n&lt;li&gt;Wat je allemaal best voorziet en wat je vooral niet moet doen&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;Wat krijg je ?&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Een duidelijk overzicht van waar je moet op letten.&lt;\\\/li&gt;\\n&lt;li&gt;Een geautomatiseerde controle van gelekte credentials voor jouw e-mailadres of organisatie.&lt;\\\/li&gt;\\n&lt;li&gt;Een checklist van wat je allemaal moet nakijken en afspreken met je leveranciers.&lt;br \\\/&gt;In mensentaal.&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;_id&quot;:&quot;cd8ce11&quot;,&quot;index&quot;:3,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=RyuSjcIvdB4&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving &quot;,&quot;duration&quot;:&quot;02:41&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving &lt;\\\/strong&gt;&lt;br \\\/&gt;Collega Kevin De Backer en expert Jan Guldentops vertellen over de opstart van het nieuwe V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving voor \\\/ door de lokale besturen. &lt;\\\/p&gt;\\n&lt;p&gt;Het consortium is een los samenwerkingsverband:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Dat streeft naar gezamelijke, geco\\u00f6rdineerde inspanningen cre\\u00ebren die de cyberweerbaarheid verbeteren.&lt;\\\/li&gt;\\n&lt;li&gt;Complementair en versterkend wil zijn met lopende initiatieven van bovenlokale instanties.&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;met 4 doelstellingen:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Kennisdeling en samenwerking op het gebied van collectief in te zetten Experts (mensen)&lt;\\\/li&gt;\\n&lt;li&gt;Samenwerking op het gebied van collectief in te zetten Instrumenten (tools)&lt;\\\/li&gt;\\n&lt;li&gt;Samenwerking op het gebied van samen aanbesteden en kosten delend werken (financieel)&lt;\\\/li&gt;\\n&lt;li&gt;Samenwerking op het gebied van interbestuurlijk werken (disseminatie)&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;_id&quot;:&quot;e8d9b16&quot;,&quot;index&quot;:4,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;title&quot;:&quot;2023-06-01 | V-ICT-OR op de sofa ... een interview met Jan Guldentops&quot;,&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=W_Hm-EQmzXc&quot;,&quot;duration&quot;:&quot;35:30&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;_id&quot;:&quot;8e4f98e&quot;,&quot;vimeo_url&quot;:null,&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;div&gt;&lt;strong&gt;2023-06-01 | V-ICT-OR op de sofa ... een interview met Jan Guldentops&lt;\\\/strong&gt;&lt;\\\/div&gt;\\n&lt;p&gt;&lt;span class=\\&quot;yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\\&quot; dir=\\&quot;auto\\&quot;&gt;&lt;span class=\\&quot;yt-core-attributed-string--link-inherit-color\\&quot; dir=\\&quot;auto\\&quot;&gt;De belangrijkste community voor technologie, data en innovatie op het lokale overheidsniveau. Met V-ICT-OR op de sofa interviewen we om de 2 weken een bijzondere gast uit het brede ecosysteem van de Vlaamse lokale besturen.&lt;br \\\/&gt;Interview met Jan Guldentops, lector, researcher en consultant met expertise in security, privacy en open source tech. Vele vragen worden beantwoord in deze 35 minuten.   &lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&lt;ul class=\\&quot;yt-core-attributed-string__list-group\\&quot; dir=\\&quot;ltr\\&quot;&gt;\\n&lt;li&gt;&lt;span class=\\&quot;yt-core-attributed-string--link-inherit-color\\&quot; dir=\\&quot;auto\\&quot;&gt;Wat zijn in de cursussen (cloud &amp; Security) op AP Hogeschool de belangrijkste lessen die je meegeeft aan de studenten - de toekomstige cyberexperten? &lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;ul class=\\&quot;yt-core-attributed-string__list-group\\&quot; dir=\\&quot;ltr\\&quot;&gt;\\n&lt;li&gt;&lt;span class=\\&quot;yt-core-attributed-string--link-inherit-color\\&quot; dir=\\&quot;auto\\&quot;&gt;Iedereen is op zoek naar de juiste instanties en bronnen om hen cyberveiliger te maken. Welke rol neemt de Vlaamse Toezichtscommissie (VTC) momenteel op in de strijd tegen cybercriminelen?  &lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;ul class=\\&quot;yt-core-attributed-string__list-group\\&quot; dir=\\&quot;ltr\\&quot;&gt;\\n&lt;li&gt;&lt;span class=\\&quot;yt-core-attributed-string--link-inherit-color\\&quot; dir=\\&quot;auto\\&quot;&gt;Na recente cyberaanvallen ben je ook enkele keren, naar &#039;het slagveld&#039; geweest om de schade op te meten en hulp te bieden. Kan je beschrijven hoe het er in een lokaal bestuur op zo\\u2019n momenten aan toe gaat?  &lt;\\\/span&gt;&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&lt;p&gt;&lt;span class=\\&quot;yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\\&quot; dir=\\&quot;auto\\&quot;&gt;&lt;span class=\\&quot;yt-core-attributed-string--link-inherit-color\\&quot; dir=\\&quot;auto\\&quot;&gt; Dit en vele andere vraagstukken komen aan bod in dit interview.&lt;\\\/span&gt;&lt;\\\/span&gt;&lt;\\\/p&gt;\\n&quot;,&quot;index&quot;:5,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=XNcJd3YR-ME&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022&quot;,&quot;duration&quot;:&quot;26:30&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022&lt;\\\/strong&gt;&lt;br \\\/&gt;Develop, deploy and innovate faster without having a massive attack surface? This video will show you how to put the Sec into DevSecOps. &lt;\\\/p&gt;\\n&lt;p&gt;A little over a year ago, Cerm had a problem. They were modernizing their MIS product stack and knew handcrafted security was no longer compatible with their DevOps and Infra-as-code approach and desire to stop their customer being subject to the current cyber-security pandemic. They wanted to move towards zero trust networking and needed a solution that would scale from code and accelerate solution deployments. They decided to integrate NetFoundry into their technology stack. The learnings they had, as well as those from NetFoundry\\u2019s Head of DevOps, Mike Guthrie, will give you insights on how to put the Sec into DevSecOps to develop faster, deploy faster, innovate faster without having a massive attack surface.    &lt;\\\/p&gt;\\n&lt;p&gt;Mike Guthrie is an engineering team leader at NetFoundry in charge of reliability, automation, and visibility. Mike has been doing a mix of software and systems engineering for over 10 years, and enjoys solving any problems related to scale, automation, data, and reliability. In his free time, Mike enjoys spending time with his kids and finding new adventures out in nature.  &lt;\\\/p&gt;\\n&lt;p&gt;Jan Guldentops has more than 25 years of experience in designing, building, securing, and troubleshooting today and tomorrow&#039;s ICT infrastructures on the building blocks of networking, storage, servers, virtualization, mobile, middleware, and clouds great and small.&lt;\\\/p&gt;\\n&quot;,&quot;_id&quot;:&quot;544224c&quot;,&quot;index&quot;:6,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=hfwtpA85osk&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2021-08-02 | Who to trust with the keys to your house?&quot;,&quot;duration&quot;:&quot;09:02&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2021-08-02 | Who to trust with the keys to your house?&lt;\\\/strong&gt;&lt;br \\\/&gt;Because that is what we do! We surround us with all sorts of data security solutions and than we give the key away to companies that promise to help and protect us! The IoT Radar interview with Jan Guldentops about ransomware, greed and back-up procedures. And, for the first time, HI &amp; AI will close off this episode! I hope you enjoy watching The IoT Radar!    &lt;\\\/p&gt;\\n&quot;,&quot;_id&quot;:&quot;ab5f84e&quot;,&quot;index&quot;:7,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=bFozA9E1iH4&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2020-02-20 | The dark web: Fight back to protect your networks and data&quot;,&quot;duration&quot;:&quot;20:14&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2020-02-20 | The dark web: Fight back to protect your networks and data&lt;\\\/strong&gt;&lt;br \\\/&gt;Host Vikram Phatak, Founder &amp; Board Members at NSS Labs and guests:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Thomas Edwards, Special Agent in Charge at U.S Secret Service San Francisco Field Office, The Department of Homeland Security&lt;\\\/li&gt;\\n&lt;li&gt;Ted Ross, Chief Executive Officer &amp; Co-Founder, Spy Cloud&lt;\\\/li&gt;\\n&lt;li&gt;Jan Guldentops, &#039;White Hat&#039; Hacker&lt;\\\/li&gt;\\n&lt;li style=\\&quot;list-style-type: none;\\&quot;&gt; &lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;_id&quot;:&quot;1ae98c6&quot;,&quot;index&quot;:8,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;title&quot;:&quot;2019-03-11 | Awingu as a Security Tool (Jan Guldentops - CEO, B.A.)&quot;,&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=FXpeS30HmRU&quot;,&quot;duration&quot;:&quot;07:11&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;_id&quot;:&quot;afd1692&quot;,&quot;vimeo_url&quot;:null,&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2019-03-11 | Awingu as a Security Tool (Jan Guldentops - CEO, B.A.)&lt;\\\/strong&gt;&lt;br \\\/&gt;Awingu enables users to work from anywhere, on any device. Aside from being easy to use and optimizing efficiency, IT Security Experts such as Jan Guldentops also praise Awingu for its security measures. With Awingu, you only have one front door - and you hold the key.  &lt;\\\/p&gt;\\n&quot;,&quot;index&quot;:9,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=VD4HJdFF3AI&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2018-12-12 | The Security Professional\\u2019s Best Friend: Artificial Intelligence&quot;,&quot;duration&quot;:&quot;11:55&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2018-12-12 | The Security Professional\\u2019s Best Friend: Artificial Intelligence&lt;\\\/strong&gt;&lt;br \\\/&gt;Host Manek Dubash en guests:&lt;\\\/p&gt;\\n&lt;ul&gt;\\n&lt;li&gt;Simon Crumplin, Founder &amp; CEO, Secrutiny&lt;\\\/li&gt;\\n&lt;li&gt;Jan Guldentops, Director, BA Test Labs&lt;\\\/li&gt;\\n&lt;li&gt;Rik Turner, Principal Analyst, Infrastructure Solutions, Ovum&lt;\\\/li&gt;\\n&lt;li&gt;Roark Pollock, SVP of Marketing, Ziften Technologies&lt;\\\/li&gt;\\n&lt;\\\/ul&gt;\\n&quot;,&quot;_id&quot;:&quot;a145808&quot;,&quot;index&quot;:10,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;_id&quot;:&quot;048695f&quot;,&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=mfN8-0eSIdU&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2018-04-19 | GDPR - May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access &quot;,&quot;duration&quot;:&quot;09:00&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2018-04-19 | GDPR - May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access &lt;\\\/strong&gt;&lt;br \\\/&gt;GDPR - are you ready?&lt;br \\\/&gt;The EU is getting serious on personal data protection. On may 25th, 2018, the new General Data Protection Regulation will become effective. All companies, in- or outside the EU region that keep personal data of EU citizens will face new regulations. Fines up to EU 20 million are in place for being not compliant. Companies and government organisations are rushing to get their act together.&lt;br \\\/&gt;eeNews talks with Jan Guldentops from Better Access in Belgium, to hear the latest on these new regulations.&lt;br \\\/&gt;GDPR, May 25th, are you ready?    &lt;\\\/p&gt;\\n&quot;,&quot;index&quot;:11,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=Z5w2NE5d2AM&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2018-01-26 | The &#039;Big Bugs&#039; Spectre and Meltdown are alive and kicking | Can we trust Intel?&quot;,&quot;duration&quot;:&quot;08:29&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2018-01-26 | The &#039;Big Bugs&#039; Spectre and Meltdown are alive and kicking | Can we trust Intel?&lt;\\\/strong&gt;&lt;br \\\/&gt;Three weeks after the \\u2018big bugs\\u2019 Spectre and Meltdown were in the news, there is a lot of confusion bout how to solve the problems. \\u2018This all is a learning phase\\u2019, says Jan Guldentops, infrastructure and security consultant from Better Access Belgium. &lt;\\\/p&gt;\\n&quot;,&quot;_id&quot;:&quot;09354e3&quot;,&quot;index&quot;:12,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;title&quot;:&quot;2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug&quot;,&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=7VWAAIqK-bQ&quot;,&quot;duration&quot;:&quot;06:46&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;_id&quot;:&quot;f2eda19&quot;,&quot;vimeo_url&quot;:null,&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug&lt;\\\/strong&gt;&lt;br \\\/&gt;Intel is facing a difficult start of the year with all the publicity of the processor bug. It seems not only Intel processors but also processors of ARM and AMD face this bug. All processors that use a shared memory model can be exploited and will face security issues. A eeNews Report with Jan Guldentops, Infrastructure &amp; Security Consultant for BA N.V.   &lt;\\\/p&gt;\\n&quot;,&quot;index&quot;:13,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;},{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=mNkMB6vL6w8&quot;,&quot;vimeo_url&quot;:null,&quot;title&quot;:&quot;2005-12-08 | VRT Terzake reportage over Wardriving&quot;,&quot;duration&quot;:&quot;06:04&quot;,&quot;thumbnail&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/ba.be\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/BAbe-intro-zwart-1920.webp&quot;,&quot;id&quot;:1266,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;BAbe intro&quot;,&quot;source&quot;:&quot;library&quot;},&quot;inner_tab_is_content_visible&quot;:&quot;show&quot;,&quot;inner_tab_content_1&quot;:&quot;&lt;p&gt;&lt;strong&gt;2005-12-08 | VRT Terzake reportage over Wardriving&lt;\\\/strong&gt;&lt;br \\\/&gt;In 2001 brachten we met BA Testlabs het eerste grote wardriving verhaal waarin we probeerden een inventaris op te maken van wat er allemaal aan draadloze netwerken te vinden was in ons land en hoe het met de beveiliging van die dingen gesteld is.&lt;\\\/p&gt;\\n&lt;p&gt;Sinds dat verhaal brengt de Belgische media in elke pruimentijd een verhaal over wardriving en draadloze beveiliging.&lt;br \\\/&gt;In 2005 warmde de VRT voor de zoveelste keer het wardriving en draadloze security verhaal weer op. We hebben dit verhaal sinds 1998 gebracht. &lt;\\\/p&gt;\\n&quot;,&quot;_id&quot;:&quot;e153e3f&quot;,&quot;index&quot;:14,&quot;type&quot;:&quot;youtube&quot;,&quot;is_external_url&quot;:null,&quot;hosted_url&quot;:null,&quot;external_url&quot;:null,&quot;section_html_tag&quot;:null,&quot;video_html_tag&quot;:&quot;h4&quot;,&quot;inner_tab_content_2&quot;:&quot;&quot;}],&quot;inner_tab_title_1&quot;:&quot;contenu&quot;,&quot;inner_tab_title_2&quot;:&quot;Tab #2&quot;}\" data-widget_type=\"video-playlist.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"e-tabs\" role=\"region\" aria-labelledby=\"e-playlist-6674c6d\">\n\t\t\t<div class=\"e-tabs-main-area\">\n\t\t\t\t<div class=\"e-tabs-wrapper\">\n\t\t\t\t\t<div class=\"e-tabs-header\">\n\t\t\t\t\t\t<h2 class=\"e-tabs-title\" id=\"e-playlist-6674c6d\">Playlist<\/h2>\n\t\t\t\t\t\t<div class=\"e-tabs-header-right-side\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tabs-videos-count\">15 Vid\u00e9os<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-tabs-toggle-videos-display-button rotate-down e-font-icon-svg e-eicon-caret-down\" viewBox=\"0 0 571.4 571.4\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M571 393Q571 407 561 418L311 668Q300 679 286 679T261 668L11 418Q0 407 0 393T11 368 36 357H536Q550 357 561 368T571 393Z\"><\/path><\/svg>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"e-tabs-items-wrapper\">\n\t\t\t\t\t\t<div class=\"e-tabs-items\" role=\"tablist\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1071\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-tab-content-1071\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen \" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen <\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">1:25:01<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1072\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1072\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">1:26:42<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1073\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1073\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">1:19:16<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1074\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1074\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">1:41:56<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1075\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1075\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving \" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving <\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">02:41<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1076\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1076\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2023-06-01 | V-ICT-OR op de sofa ... een interview met Jan Guldentops\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2023-06-01 | V-ICT-OR op de sofa ... een interview met Jan Guldentops<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">35:30<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1077\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1077\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">26:30<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1078\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1078\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2021-08-02 | Who to trust with the keys to your house?\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2021-08-02 | Who to trust with the keys to your house?<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">09:02<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-1079\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-1079\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2020-02-20 | The dark web: Fight back to protect your networks and data\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2020-02-20 | The dark web: Fight back to protect your networks and data<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">20:14<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-10710\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-10710\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2019-03-11 | Awingu as a Security Tool (Jan Guldentops - CEO, B.A.)\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2019-03-11 | Awingu as a Security Tool (Jan Guldentops - CEO, B.A.)<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">07:11<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-10711\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"11\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-10711\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2018-12-12 | The Security Professional\u2019s Best Friend: Artificial Intelligence\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2018-12-12 | The Security Professional\u2019s Best Friend: Artificial Intelligence<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">11:55<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-10712\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"12\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-10712\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2018-04-19 | GDPR - May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access \" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2018-04-19 | GDPR - May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access <\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">09:00<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-10713\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"13\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-10713\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2018-01-26 | The &#039;Big Bugs&#039; Spectre and Meltdown are alive and kicking | Can we trust Intel?\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2018-01-26 | The 'Big Bugs' Spectre and Meltdown are alive and kicking | Can we trust Intel?<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">08:29<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-10714\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"14\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-10714\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">06:46<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-title-10715\" class=\"e-tab-title e-tab-desktop-title\" aria-selected=\"false\" data-tab=\"15\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-tab-content-10715\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-tab-thumbnail\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ba.be\/wp-content\/uploads\/2025\/03\/BAbe-intro-zwart-1920.webp\" alt=\"2005-12-08 | VRT Terzake reportage over Wardriving\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-play\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-play-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm115.7 272l-176 101c-15.8 8.8-35.7-2.5-35.7-21V152c0-18.4 19.8-29.8 35.7-21l176 107c16.4 9.2 16.4 32.9 0 42z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"icon-watched\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"e-tab-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t<button type=\"button\">2005-12-08 | VRT Terzake reportage over Wardriving<\/button>\n\t\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"e-tab-duration\">06:04<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"shadow shadow-top\" aria-hidden=\"true\"><\/div>\n\t\t\t\t\t\t<div class=\"shadow shadow-bottom\" aria-hidden=\"true\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t\t<div class=\"e-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1071\" class=\"e-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1071\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=RTAIK3BJ7RE\" data-video-type=\"youtube\" data-video-title=\"2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen \" data-video-duration=\"1:25:01\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1072\" class=\"e-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1072\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=bFozA9E1iH4\" data-video-type=\"youtube\" data-video-title=\"2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie\" data-video-duration=\"1:26:42\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1073\" class=\"e-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1073\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=SUtu0i04vZQ\" data-video-type=\"youtube\" data-video-title=\"2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen\" data-video-duration=\"1:19:16\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1074\" class=\"e-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1074\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=WEd-W8Ugq2k\" data-video-type=\"youtube\" data-video-title=\"2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?\" data-video-duration=\"1:41:56\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1075\" class=\"e-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1075\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=RyuSjcIvdB4\" data-video-type=\"youtube\" data-video-title=\"2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving \" data-video-duration=\"02:41\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1076\" class=\"e-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1076\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=W_Hm-EQmzXc\" data-video-type=\"youtube\" data-video-title=\"2023-06-01 | V-ICT-OR op de sofa ... een interview met Jan Guldentops\" data-video-duration=\"35:30\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1077\" class=\"e-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1077\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=XNcJd3YR-ME\" data-video-type=\"youtube\" data-video-title=\"2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022\" data-video-duration=\"26:30\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1078\" class=\"e-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1078\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=hfwtpA85osk\" data-video-type=\"youtube\" data-video-title=\"2021-08-02 | Who to trust with the keys to your house?\" data-video-duration=\"09:02\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1079\" class=\"e-tab-content elementor-clearfix\" data-tab=\"9\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1079\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=bFozA9E1iH4\" data-video-type=\"youtube\" data-video-title=\"2020-02-20 | The dark web: Fight back to protect your networks and data\" data-video-duration=\"20:14\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10710\" class=\"e-tab-content elementor-clearfix\" data-tab=\"10\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10710\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=FXpeS30HmRU\" data-video-type=\"youtube\" data-video-title=\"2019-03-11 | Awingu as a Security Tool (Jan Guldentops - CEO, B.A.)\" data-video-duration=\"07:11\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10711\" class=\"e-tab-content elementor-clearfix\" data-tab=\"11\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10711\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=VD4HJdFF3AI\" data-video-type=\"youtube\" data-video-title=\"2018-12-12 | The Security Professional\u2019s Best Friend: Artificial Intelligence\" data-video-duration=\"11:55\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10712\" class=\"e-tab-content elementor-clearfix\" data-tab=\"12\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10712\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=mfN8-0eSIdU\" data-video-type=\"youtube\" data-video-title=\"2018-04-19 | GDPR - May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access \" data-video-duration=\"09:00\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10713\" class=\"e-tab-content elementor-clearfix\" data-tab=\"13\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10713\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=Z5w2NE5d2AM\" data-video-type=\"youtube\" data-video-title=\"2018-01-26 | The &#039;Big Bugs&#039; Spectre and Meltdown are alive and kicking | Can we trust Intel?\" data-video-duration=\"08:29\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10714\" class=\"e-tab-content elementor-clearfix\" data-tab=\"14\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10714\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=7VWAAIqK-bQ\" data-video-type=\"youtube\" data-video-title=\"2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug\" data-video-duration=\"06:46\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10715\" class=\"e-tab-content elementor-clearfix\" data-tab=\"15\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10715\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=mNkMB6vL6w8\" data-video-type=\"youtube\" data-video-title=\"2005-12-08 | VRT Terzake reportage over Wardriving\" data-video-duration=\"06:04\" hidden=\"hidden\">\n\t\t\t\t\t\t\t<div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"e-tabs-inner-tabs\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1071\" class=\"e-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1071\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=RTAIK3BJ7RE\" data-video-type=\"youtube\" data-video-title=\"2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen \" data-video-duration=\"1:25:01\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2025-03-19 | BeCyberSafe: Cyberaanval vermijden? Dit is wat scanning &amp; ethical hacking voor jou kunnen doen <\/strong><br \/>Wist je dat de kans dat jouw bedrijf te maken krijgt met een cyberaanval 1 op 5 is? Anno 2025 kan je er niet meer omheen: vroeg of laat krijg je te maken met \u00e9\u00e9n of andere vorm van hacking of cyberaanval. Als ondernemer is het belangrijk dat je zo goed mogelijk bent voorbereid en je activiteit weerbaar maakt zodat een aanval zo weinig mogelijk impact heeft op je werking, data, klanten, netwerk, website en financi\u00eble middelen. Je systemen testen en scannen is cruciaal, want zo identificeer je kwetsbaarheden voordat hackers deze kunnen misbruiken. Je kan zo gevoelige informatie zoals klantgegevens en bedrijfsdata beschermen. En dat zorgt dan weer dat je financi\u00eble verliezen en boetes vermijdt. In dit webinar duikt Jan Guldentops, CEO van BA, erkend security &amp; IT bedrijf en docent cybersecurity aan de AP Hogeschool, in de problematiek, en vooral in de oplossingen die scanning- en testsystemen bieden om je te helpen je bedrijf te beschermen tegen cyberaanvallen. En hij doet dat in mensentaal, zodat je als KMO, webshops of zelfstandige ondernemer \u00e9cht beter begrijpt hoe je je digitale omgeving veiliger kan maken.       <\/p>\n<p>Je mag een antwoord verwachten op volgende vragen:<\/p>\n<ul>\n<li>Waarom is scannen en testen zo belangrijk?<\/li>\n<li>Welke soorten scansystemen bestaan er en wat doen ze juist?<\/li>\n<li>Wat is ethical hacking en hoe kunnen hackers jouw bedrijf juist helpen?<\/li>\n<li>Wat is de impact van beveiligen en hoe begin je er concreet aan?<\/li>\n<\/ul>\n<p>Of je nu een webshop runt, zelfstandig ondernemer bent of een KMO leidt: dit webinar is op maat van niet-IT&rsquo;ers die hun bedrijf willen beschermen tegen de groeiende cyberrisico&rsquo;s.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1072\" class=\"e-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1072\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=bFozA9E1iH4\" data-video-type=\"youtube\" data-video-title=\"2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie\" data-video-duration=\"1:26:42\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2025-03-18 | BeCyberSafe: Beveilig je data en klanten met encryptie<\/strong><br \/>Wist je dat gevoelige klantgegevens en bedrijfsdata zonder de juiste bescherming gemakkelijk in verkeerde handen kunnen vallen? Of dat encryptie, een krachtige beveiligingstechniek, eenvoudig en betaalbaar kan worden toegepast, zelfs zonder technische voorkennis? <\/p>\n<p>Jan Guldentops, cybersecurity-expert met meer dan 20 jaar ervaring, neemt je op een toegankelijke manier mee in de wereld van encryptie en online veiligheid. In een uurtje tijd ontdek je alles over encryptie: <\/p>\n<ul>\n<li>Wat is encryptie precies? In eenvoudige, begrijpelijke taal uitgelegd. <\/li>\n<li>Waarom is het onmisbaar? Bescherm jezelf \u00e9n je klanten tegen datalekken en cyberdreigingen. <\/li>\n<li>Hoe pas je het toe? Praktische tips en stappen die je meteen kunt gebruiken. <\/li>\n<\/ul>\n<p>Of je nu een webshop runt, zelfstandig ondernemer bent of een KMO leidt: dit webinar is op maat van niet-IT&rsquo;ers die hun bedrijf willen beschermen tegen de groeiende cyberrisico&rsquo;s.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1073\" class=\"e-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1073\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=SUtu0i04vZQ\" data-video-type=\"youtube\" data-video-title=\"2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen\" data-video-duration=\"1:19:16\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2025-01-31 | BeCyberSafe: Quick wins om je online zaak veilig te stellen<\/strong><br \/>Hoe maak je dat je bedrijf best tegen een cyberstootje kan zonder dure technologische wizards in te schakelen? Al moet je waarschijnlijk wel de hulp van gespecialiseerde leveranciers inroepen, toch is het belangrijk dat je zelf het overzicht \u00e9n de controle in handen houdt. En dat is precies wat je in deze sessie leert.<br \/>Op een uurtje tijd geeft Jan Guldentops, CEO van BA, erkend security &amp; IT bedrijf je tekst en uitleg in mensentaal. Je kan je vragen stellen en kan daarna meteen aan de slag met eenvoudige middelen om de cyberveiligheid en weerbaarheid van je online zaak te verbeteren.   <\/p>\n<p>Wat krijg je ?<\/p>\n<ul>\n<li>Duidelijke uitleg van de cyber-crime problematiek en terminologie in mensentaal<\/li>\n<li>Zicht op wat een passieve scan van je systeem is en hoe je eventuele gerapporteerde problemen kan oplossen<\/li>\n<li>Een checklist van wat je allemaal moet controleren\/afspreken met je leveranciers<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1074\" class=\"e-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1074\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=WEd-W8Ugq2k\" data-video-type=\"youtube\" data-video-title=\"2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?\" data-video-duration=\"1:41:56\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2025-01-31 | BeCyberSafe: Hoe hou je hackers en onbevoegden uit je systemen?<\/strong><br \/>Het is voor \u2018white hat hackers\u2019 ( en minder ethische collega\u2019s) vaak heel eenvoudig om bij je webshop binnen te raken door middel van fishing, social engineering of gewoon door een wachtwoord te raden. Hoe zorg je dan dat je gegevens goed beveiligd zijn? <br \/>Op een uurtje tijd geeft Jan Guldentops, CEO van BA, erkend security &amp; IT bedrijf je tekst en uitleg over:<\/p>\n<ul>\n<li>Hoe je je wachtwoorden en andere credentials best bewaart<\/li>\n<li>Hoe multifactorauthenticatie werkt en waarom je dat best inzet<\/li>\n<li>Hoe je omgaat met verschillende gebruikers en waarom je best niet dezelfde credentials voor de hele groep gebruikt<\/li>\n<li>Hoe je de toegang beperkt tot het minimum noodzakelijke<\/li>\n<li>Wat je allemaal best voorziet en wat je vooral niet moet doen<\/li>\n<\/ul>\n<p>Wat krijg je ?<\/p>\n<ul>\n<li>Een duidelijk overzicht van waar je moet op letten.<\/li>\n<li>Een geautomatiseerde controle van gelekte credentials voor jouw e-mailadres of organisatie.<\/li>\n<li>Een checklist van wat je allemaal moet nakijken en afspreken met je leveranciers.<br \/>In mensentaal.<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1075\" class=\"e-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1075\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=RyuSjcIvdB4\" data-video-type=\"youtube\" data-video-title=\"2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving \" data-video-duration=\"02:41\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2024-01-26 | Het V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving <\/strong><br \/>Collega Kevin De Backer en expert Jan Guldentops vertellen over de opstart van het nieuwe V-ICT-OR security consortium. Samenwerken aan een veilige digitale omgeving voor \/ door de lokale besturen. <\/p>\n<p>Het consortium is een los samenwerkingsverband:<\/p>\n<ul>\n<li>Dat streeft naar gezamelijke, geco\u00f6rdineerde inspanningen cre\u00ebren die de cyberweerbaarheid verbeteren.<\/li>\n<li>Complementair en versterkend wil zijn met lopende initiatieven van bovenlokale instanties.<\/li>\n<\/ul>\n<p>met 4 doelstellingen:<\/p>\n<ul>\n<li>Kennisdeling en samenwerking op het gebied van collectief in te zetten Experts (mensen)<\/li>\n<li>Samenwerking op het gebied van collectief in te zetten Instrumenten (tools)<\/li>\n<li>Samenwerking op het gebied van samen aanbesteden en kosten delend werken (financieel)<\/li>\n<li>Samenwerking op het gebied van interbestuurlijk werken (disseminatie)<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1076\" class=\"e-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1076\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=W_Hm-EQmzXc\" data-video-type=\"youtube\" data-video-title=\"2023-06-01 | V-ICT-OR op de sofa ... een interview met Jan Guldentops\" data-video-duration=\"35:30\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div><strong>2023-06-01 | V-ICT-OR op de sofa &#8230; een interview met Jan Guldentops<\/strong><\/div>\n<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">De belangrijkste community voor technologie, data en innovatie op het lokale overheidsniveau. Met V-ICT-OR op de sofa interviewen we om de 2 weken een bijzondere gast uit het brede ecosysteem van de Vlaamse lokale besturen.<br \/>Interview met Jan Guldentops, lector, researcher en consultant met expertise in security, privacy en open source tech. Vele vragen worden beantwoord in deze 35 minuten.   <\/span><\/span><\/p>\n<ul class=\"yt-core-attributed-string__list-group\" dir=\"ltr\">\n<li><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">Wat zijn in de cursussen (cloud &amp; Security) op AP Hogeschool de belangrijkste lessen die je meegeeft aan de studenten &#8211; de toekomstige cyberexperten? <\/span><\/li>\n<\/ul>\n<ul class=\"yt-core-attributed-string__list-group\" dir=\"ltr\">\n<li><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">Iedereen is op zoek naar de juiste instanties en bronnen om hen cyberveiliger te maken. Welke rol neemt de Vlaamse Toezichtscommissie (VTC) momenteel op in de strijd tegen cybercriminelen?  <\/span><\/li>\n<\/ul>\n<ul class=\"yt-core-attributed-string__list-group\" dir=\"ltr\">\n<li><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\">Na recente cyberaanvallen ben je ook enkele keren, naar &lsquo;het slagveld&rsquo; geweest om de schade op te meten en hulp te bieden. Kan je beschrijven hoe het er in een lokaal bestuur op zo\u2019n momenten aan toe gaat?  <\/span><\/li>\n<\/ul>\n<p><span class=\"yt-core-attributed-string yt-core-attributed-string--white-space-pre-wrap\" dir=\"auto\"><span class=\"yt-core-attributed-string--link-inherit-color\" dir=\"auto\"> Dit en vele andere vraagstukken komen aan bod in dit interview.<\/span><\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1077\" class=\"e-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1077\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=XNcJd3YR-ME\" data-video-type=\"youtube\" data-video-title=\"2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022\" data-video-duration=\"26:30\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2022-03-11 | Develop, deploy and innovate faster | Mike Guthrie &amp; Jan Guldentops | The DEVOPS Conference 2022<\/strong><br \/>Develop, deploy and innovate faster without having a massive attack surface? This video will show you how to put the Sec into DevSecOps. <\/p>\n<p>A little over a year ago, Cerm had a problem. They were modernizing their MIS product stack and knew handcrafted security was no longer compatible with their DevOps and Infra-as-code approach and desire to stop their customer being subject to the current cyber-security pandemic. They wanted to move towards zero trust networking and needed a solution that would scale from code and accelerate solution deployments. They decided to integrate NetFoundry into their technology stack. The learnings they had, as well as those from NetFoundry\u2019s Head of DevOps, Mike Guthrie, will give you insights on how to put the Sec into DevSecOps to develop faster, deploy faster, innovate faster without having a massive attack surface.    <\/p>\n<p>Mike Guthrie is an engineering team leader at NetFoundry in charge of reliability, automation, and visibility. Mike has been doing a mix of software and systems engineering for over 10 years, and enjoys solving any problems related to scale, automation, data, and reliability. In his free time, Mike enjoys spending time with his kids and finding new adventures out in nature.  <\/p>\n<p>Jan Guldentops has more than 25 years of experience in designing, building, securing, and troubleshooting today and tomorrow&rsquo;s ICT infrastructures on the building blocks of networking, storage, servers, virtualization, mobile, middleware, and clouds great and small.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1078\" class=\"e-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1078\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=hfwtpA85osk\" data-video-type=\"youtube\" data-video-title=\"2021-08-02 | Who to trust with the keys to your house?\" data-video-duration=\"09:02\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2021-08-02 | Who to trust with the keys to your house?<\/strong><br \/>Because that is what we do! We surround us with all sorts of data security solutions and than we give the key away to companies that promise to help and protect us! The IoT Radar interview with Jan Guldentops about ransomware, greed and back-up procedures. And, for the first time, HI &amp; AI will close off this episode! I hope you enjoy watching The IoT Radar!    <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-1079\" class=\"e-tab-content elementor-clearfix\" data-tab=\"9\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-1079\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=bFozA9E1iH4\" data-video-type=\"youtube\" data-video-title=\"2020-02-20 | The dark web: Fight back to protect your networks and data\" data-video-duration=\"20:14\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2020-02-20 | The dark web: Fight back to protect your networks and data<\/strong><br \/>Host Vikram Phatak, Founder &amp; Board Members at NSS Labs and guests:<\/p>\n<ul>\n<li>Thomas Edwards, Special Agent in Charge at U.S Secret Service San Francisco Field Office, The Department of Homeland Security<\/li>\n<li>Ted Ross, Chief Executive Officer &amp; Co-Founder, Spy Cloud<\/li>\n<li>Jan Guldentops, &lsquo;White Hat&rsquo; Hacker<\/li>\n<li style=\"list-style-type: none;\"> <\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10710\" class=\"e-tab-content elementor-clearfix\" data-tab=\"10\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10710\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=FXpeS30HmRU\" data-video-type=\"youtube\" data-video-title=\"2019-03-11 | Awingu as a Security Tool (Jan Guldentops - CEO, B.A.)\" data-video-duration=\"07:11\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2019-03-11 | Awingu as a Security Tool (Jan Guldentops &#8211; CEO, B.A.)<\/strong><br \/>Awingu enables users to work from anywhere, on any device. Aside from being easy to use and optimizing efficiency, IT Security Experts such as Jan Guldentops also praise Awingu for its security measures. With Awingu, you only have one front door &#8211; and you hold the key.  <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10711\" class=\"e-tab-content elementor-clearfix\" data-tab=\"11\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10711\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=VD4HJdFF3AI\" data-video-type=\"youtube\" data-video-title=\"2018-12-12 | The Security Professional\u2019s Best Friend: Artificial Intelligence\" data-video-duration=\"11:55\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2018-12-12 | The Security Professional\u2019s Best Friend: Artificial Intelligence<\/strong><br \/>Host Manek Dubash en guests:<\/p>\n<ul>\n<li>Simon Crumplin, Founder &amp; CEO, Secrutiny<\/li>\n<li>Jan Guldentops, Director, BA Test Labs<\/li>\n<li>Rik Turner, Principal Analyst, Infrastructure Solutions, Ovum<\/li>\n<li>Roark Pollock, SVP of Marketing, Ziften Technologies<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10712\" class=\"e-tab-content elementor-clearfix\" data-tab=\"12\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10712\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=mfN8-0eSIdU\" data-video-type=\"youtube\" data-video-title=\"2018-04-19 | GDPR - May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access \" data-video-duration=\"09:00\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2018-04-19 | GDPR &#8211; May 25th, are you ready? | eeNews interview with Jan Guldentops, Better Access <\/strong><br \/>GDPR &#8211; are you ready?<br \/>The EU is getting serious on personal data protection. On may 25th, 2018, the new General Data Protection Regulation will become effective. All companies, in- or outside the EU region that keep personal data of EU citizens will face new regulations. Fines up to EU 20 million are in place for being not compliant. Companies and government organisations are rushing to get their act together.<br \/>eeNews talks with Jan Guldentops from Better Access in Belgium, to hear the latest on these new regulations.<br \/>GDPR, May 25th, are you ready?    <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10713\" class=\"e-tab-content elementor-clearfix\" data-tab=\"13\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10713\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=Z5w2NE5d2AM\" data-video-type=\"youtube\" data-video-title=\"2018-01-26 | The &#039;Big Bugs&#039; Spectre and Meltdown are alive and kicking | Can we trust Intel?\" data-video-duration=\"08:29\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2018-01-26 | The &lsquo;Big Bugs&rsquo; Spectre and Meltdown are alive and kicking | Can we trust Intel?<\/strong><br \/>Three weeks after the \u2018big bugs\u2019 Spectre and Meltdown were in the news, there is a lot of confusion bout how to solve the problems. \u2018This all is a learning phase\u2019, says Jan Guldentops, infrastructure and security consultant from Better Access Belgium. <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10714\" class=\"e-tab-content elementor-clearfix\" data-tab=\"14\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10714\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=7VWAAIqK-bQ\" data-video-type=\"youtube\" data-video-title=\"2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug\" data-video-duration=\"06:46\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2018-01-04 | Cloud applications and performance of systems will be affected by Intel bug<\/strong><br \/>Intel is facing a difficult start of the year with all the publicity of the processor bug. It seems not only Intel processors but also processors of ARM and AMD face this bug. All processors that use a shared memory model can be exploited and will face security issues. A eeNews Report with Jan Guldentops, Infrastructure &amp; Security Consultant for BA N.V.   <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"e-tab-content-10715\" class=\"e-tab-content elementor-clearfix\" data-tab=\"15\" role=\"tabpanel\" aria-labelledby=\"e-tab-title-10715\" tabindex=\"0\" data-video-url=\"https:\/\/www.youtube.com\/watch?v=mNkMB6vL6w8\" data-video-type=\"youtube\" data-video-title=\"2005-12-08 | VRT Terzake reportage over Wardriving\" data-video-duration=\"06:04\" hidden=\"hidden\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"e-inner-tab-title-text\" tabindex=\"0\">contenu<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"e-inner-tabs-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-title e-tab-mobile-title e-inner-tab-active\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tcontenu\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div  class=\"e-inner-tab-content e-inner-tab-active \">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><strong>2005-12-08 | VRT Terzake reportage over Wardriving<\/strong><br \/>In 2001 brachten we met BA Testlabs het eerste grote wardriving verhaal waarin we probeerden een inventaris op te maken van wat er allemaal aan draadloze netwerken te vinden was in ons land en hoe het met de beveiliging van die dingen gesteld is.<\/p>\n<p>Sinds dat verhaal brengt de Belgische media in elke pruimentijd een verhaal over wardriving en draadloze beveiliging.<br \/>In 2005 warmde de VRT voor de zoveelste keer het wardriving en draadloze security verhaal weer op. We hebben dit verhaal sinds 1998 gebracht. <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"e-inner-tab-buttons\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<button class=\"show-button\"><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<button><\/button>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2191\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2191\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> podcast <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2191\" class=\"elementor-element elementor-element-0d30d4e e-con-full e-flex e-con e-child\" data-id=\"0d30d4e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2191\" class=\"elementor-element elementor-element-33641e1 e-flex e-con-boxed e-con e-child\" data-id=\"33641e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a19a197 elementor-widget elementor-widget-text-editor\" data-id=\"a19a197\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<iframe data-testid=\"embed-iframe\" style=\"border-radius:none\" src=\"https:\/\/open.spotify.com\/embed\/playlist\/0ayTK9SffEZICDK36mbv8h?utm_source=generator&amp;theme=0\" width=\"100%\" height=\"352\" frameborder=\"0\" allowfullscreen=\"\" allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2192\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2192\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> publications <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2192\" class=\"elementor-element elementor-element-80013c8 e-flex e-con-boxed e-con e-child\" data-id=\"80013c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-953bcfc elementor-widget elementor-widget-text-editor\" data-id=\"953bcfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Benelux<\/h2>\n<ul>\n \t<li>Visterin, W. (2025, 3 juni), Computable, <a href=\"https:\/\/www.computable.be\/2025\/06\/03\/microsoft-verhoogt-drempel-voor-inkomende-e-mail\/\" target=\"_blank\" rel=\"noopener\">Microsoft verhoogt drempel voor inkomende e-mail.<\/a><\/li>\n \t<li>De Preter, W. (2025, 14 april ), De Tijd, <a href=\"https:\/\/www.tijd.be\/dossiers\/de-verdieping\/kan-europa-nog-zonder-amerikaanse-techreuzen-hele-it-sector-zit-in-een-drugsdealermodel\/10602063.html\" target=\"_blank\" rel=\"noopener\">Kan Europa nog zonder Amerikaanse techreuzen? \u2018Hele IT-sector zit in een drugsdealermodel. <\/a><\/li>\n \t<li>Redactie Computable ( 2025, 20 februari ), <a href=\"https:\/\/www.computable.be\/2025\/02\/20\/cybersec-europe-krijgt-nieuwe-tech-stage\/\" target=\"_blank\" rel=\"noopener\">Cybersec Europe krijgt nieuwe Tech Stage<\/a><\/li>\n \t<li>Data News (2022, 12 december ), <a href=\"https:\/\/datanews.knack.be\/nieuws\/de-22-best-gelezen-opinies-van-2022\/\" target=\"_blank\" rel=\"noopener\">De 22 best gelezen opinies van 2022.<\/a><\/li>\n \t<li>Hulsman, S. , (2022, 12 mei), Computable, <a href=\"https:\/\/www.computable.be\/2022\/05\/12\/ciso-zet-ai-en-ml-sporadisch-in-voor-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Cisco zet ai en ml sporadisch in voor cybersecurity.<\/a><\/li>\n \t<li>Guldentops, J. (2022, 6 januari ), DataNews, <a href=\"https:\/\/datanews.knack.be\/nieuws\/de-toestand-is-ernstig-maar-niet-hopeloos\/\" target=\"_blank\" rel=\"noopener\">De toestand is ernstig maar niet hopeloos&#8230;<\/a><\/li>\n \t<li>Visterin, W.( 2021, 01 februari), Computable, <a href=\"https:\/\/www.computable.be\/2021\/02\/01\/overheidswebsites-slechtst-beveiligd\/\" target=\"_blank\" rel=\"noopener\">Overheidswebsites slecht beveiligd.<\/a><\/li>\n \t<li>Petitjean, F. (2020, 28 april), De Tijd, <a href=\"https:\/\/www.tijd.be\/netto\/loopbaan\/wie-gluurt-mee-met-de-videovergadering\/10223430.html\" target=\"_blank\" rel=\"noopener\">Wie gluurt mee met de videovergadering?<\/a><\/li>\n \t<li>Deman, K. ( 2019, 16 september ), Datanews, <a href=\"https:\/\/datanews.knack.be\/nieuws\/security-in-de-cloud-blijft-gedeelde-verantwoordelijkheid\/\" target=\"_blank\" rel=\"noopener\">Security in de cloud blijft gedeelde verantwoordelijkheid.<\/a><\/li>\n \t<li>Guldentops, J. (2012, 28 maart), Data News, <a href=\"https:\/\/datanews.knack.be\/nieuws\/cloud-frisse-wind-of-gebakken-lucht\/\" target=\"_blank\" rel=\"noopener\">Cloud: frisse wind of gebakken lucht?<\/a><\/li>\n \t<li>Guldentops, J. (2004, 28 oktober), Computable, <a href=\"https:\/\/www.computable.nl\/2004\/10\/28\/enorme-risicos-aan-onbeveiligd-draadloos-netwerken\/\" target=\"_blank\" rel=\"noopener\">Enorme risico\u2019s aan onbeveiligd draadloos netwerken.<\/a><\/li>\n<\/ul>\n<h2>Internationaal<\/h2>\n<ul>\n \t<li>Snell L. (2019, 5 augustus), Diarioti, <a href=\"https:\/\/diarioti.com\/quien-es-responsable-de-la-seguridad-en-la-nube\/110423\" target=\"_blank\" rel=\"noopener\">Opini\u00f3n |\u00bfQui\u00e9n es responsable de la seguridad en la nube?<\/a><\/li>\n<li>Snell L. (2019, 3 juli), SecurityBrief, <a href=\"https:\/\/securitybrief.co.nz\/story\/who-is-really-responsible-for-cloud-security\" target=\"_blank\" rel=\"noopener\">Who is really responsible for cloud security?<\/a><\/li>\t\n<li>Snell L. (2019, 21 juni), Informatique news, <a href=\"https:\/\/www.informatiquenews.fr\/qui-est-responsable-de-la-securite-du-cloud-en-anglais-62466\" target=\"_blank\" rel=\"noopener\">Qui est responsable de la s\u00e9curit\u00e9 du cloud ? (en anglais) <\/a><\/li>\n<li>Alcides L. (2019, 19 juni), IT Candino, <a href=\"https:\/\/www.itcandino.com\/2019\/06\/19\/gestion-de-la-explosion-de-la-iot-y-la-iiot\/\" target=\"_blank\" rel=\"noopener\">Gesti\u00f3n de la explosi\u00f3n de la IoT y la IIoT<\/a><\/li>\n<li>Snell L. (2019, 12 juni), Upgrade Magazine, <a href=\"http:\/\/www.upgrademag.com\/web\/2019\/06\/12\/who-is-responsible-for-cloud-security\/\" target=\"_blank\" rel=\"noopener\">Who is responsible for cloud security?<\/a><\/li>\n<li>Schonschek O., Security Insider, <a href=\"https:\/\/www.security-insider.de\/neue-modelle-fuer-wans-und-endpoint-security-gal-767875\/?p=2\" target=\"_blank\" rel=\"noopener\">Neue Modelle f\u00fcr WANs und Endpoint Security<\/a><\/li>\n<li>Turner R. (2019, 9 mei), IT News, <a href=\"https:\/\/itnews.lat\/qui-n-es-el-responsable-de-la-seguridad-en-la-nube.html\" target=\"_blank\" rel=\"noopener\">\u00bfQui\u00e9n es el responsable de la seguridad en la nube?<\/a><\/li>\n<li>Kaczmarek S. (2018, 17 december), <a href=\"https:\/\/it-filolog.pl\/sztuczna-inteligencja-najlepszym-przyjacielem-cso-w-2019-r\/\" target=\"_blank\" rel=\"noopener\">Sztuczna inteligencja najlepszym przyjacielem CSO w 2019 r.<\/a><\/li>\n<li>Fabbri, P. (2018, 20 november), ZeroUno, <a href=\"%22https:\/\/www.zerounoweb.it\/techtarget\/searchsecurity\/cybersecurity\/lintelligenza-artificiale-al-servizio-della-cybersecurity-realta-o-miraggio\/\"> L\u2019Intelligenza artificiale al servizio della cybersecurity: realt\u00e0 o miraggio?<\/a><\/li>\n<li>Kaczmarek S. (2018, 2 oktober), IT Filolog, <a href=\"https:\/\/it-filolog.pl\/sztuczna-inteligencja-wszczepiana-w-cyberbezpieczenstwo\/\" target=\"_blank\" rel=\"noopener\">Sztuczna inteligencja wszczepiana w cyberbezpiecze\u0144stwo<\/a><\/li>\n<li>Tibau F. (2011, 10 maart), Data News, <a href=\"https:\/\/datanews.levif.be\/actualite\/la-plupart-des-routeurs-domestiques-pas-prets-pour-lipv6\/\" target=\"_blank\" rel=\"noopener\">La plupart des routeurs \u2018domestiques\u2019 pas pr\u00eats pour l\u2019IPv6<\/a><\/li>\n<li>Comms Business redactie (2006, 2 oktober), <a href=\"https:\/\/www.commsbusiness.co.uk\/content\/news\/netevents-2006-cisco-crumbs-are-tasty-filling\/\" target=\"_blank\" rel=\"noopener\">NetEvents 2006: Cisco Crumbs are Tasty &amp; Filling!<\/a><\/li>\n<li>Schriften des Forschungszentrums J\u00fclich Reihe Bibliothek (2005, juli) <a href=\"https:\/\/epub.uni-regensburg.de\/4921\/1\/Bibliothek_13_Buch.pdf\" target=\"_blank\" rel=\"noopener\">Virus \u2013 Sicher im Netz?<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2193\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2193\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> suivez BA <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2193\" class=\"elementor-element elementor-element-423186c e-flex e-con-boxed e-con e-child\" data-id=\"423186c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29cd82c elementor-widget elementor-widget-heading\" data-id=\"29cd82c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Suivez BA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea07df elementor-shape-circle e-grid-align-left elementor-grid-0 elementor-widget elementor-widget-social-icons\" data-id=\"eea07df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-b3ed7e5\" href=\"https:\/\/www.linkedin.com\/company\/b-a-\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-x-twitter elementor-repeater-item-51f8910\" href=\"https:\/\/x.com\/batweets\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">X-twitter<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-x-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b2b6ec elementor-widget elementor-widget-heading\" data-id=\"2b2b6ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Volg Jan Guldentops (CEO BA)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-366c1df elementor-shape-circle e-grid-align-left elementor-grid-0 elementor-widget elementor-widget-social-icons\" data-id=\"366c1df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-b3ed7e5\" href=\"https:\/\/www.linkedin.com\/in\/janguldentops\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-x-twitter elementor-repeater-item-51f8910\" href=\"https:\/\/x.com\/JanGuldentops\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">X-twitter<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-x-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>L&rsquo;expertise n&rsquo;acquiert de la valeur que lorsqu&rsquo;elle est partag\u00e9e. Au fil des ans, nous avons eu l&rsquo;occasion de partager nos connaissances et notre vision dans de nombreuses publications, podcasts et [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4375","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/pages\/4375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/comments?post=4375"}],"version-history":[{"count":1,"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/pages\/4375\/revisions"}],"predecessor-version":[{"id":4376,"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/pages\/4375\/revisions\/4376"}],"wp:attachment":[{"href":"https:\/\/ba.be\/fr\/wp-json\/wp\/v2\/media?parent=4375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}