HOE WERKT CYBERCRIME EN WAT KAN JE ER TEGEN DOEN? Dave Maasland Managing Director ESET Nederland

Size: px
Start display at page:

Download "HOE WERKT CYBERCRIME EN WAT KAN JE ER TEGEN DOEN? Dave Maasland Managing Director ESET Nederland"

Transcription

1 HOE WERKT CYBERCRIME EN WAT KAN JE ER TEGEN DOEN? Dave Maasland Managing Director ESET Nederland

2 Een datalek melden bij een beveiligingsincident Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

3 Een inbreuk op de beveiling Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

4 Inbraak door een hacker Malware besmetting Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

5 Waarom zou iemand dat doen? Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

6 Wanneer een virus cybercrime is geworden. Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

7 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

8 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

9 Wanneer is een nerd een cybercrimineel geworden? Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

10 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

11 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

12 Geen enkel platform of stuk software is 100% veilig. Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

13 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

14 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

15 Copyright ESET, spol. s r. o. ESET, ESET logo, ESET android figure, NOD32, ESET Smart Security, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid, LiveGrid logo

16 DE VERSCHILLEN: ANONIEM GLOBAL MEER

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets proven. trusted. Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive

More information

Keeping your VPN protected

Keeping your VPN protected Keeping your VPN protected Overview The increasing use of remote access is driving businesses to look for an easy to manage, secure solution for providing access to sensitive company assets. There are

More information

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.

More information

Ultra-strong authentication to protect network access and assets

Ultra-strong authentication to protect network access and assets Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and sensitive data safe, but hassle-free.

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

THE FIVE NEW PCI COMPLIANCE RULES YOU NEED TO KNOW

THE FIVE NEW PCI COMPLIANCE RULES YOU NEED TO KNOW THE FIVE NEW PCI COMPLIANCE RULES YOU NEED TO KNOW By Stephen Cobb, ESET senior security researcher. If your business accepts credit or debit cards, then you know that PCI DSS stands for Payment Card Industry

More information

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 9 ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection

More information

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com 7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information

More information

www.eset.com Protect your laptop with ESET Anti-Theft

www.eset.com Protect your laptop with ESET Anti-Theft www.eset.com Protect your laptop with ESET Anti-Theft What is Anti-Theft? Anti-Theft helps users find and retrieve their missing laptops. What do you get with ESET Anti-Theft? Location Tracking Find the

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

www.eset.com Proven. Trusted.

www.eset.com Proven. Trusted. www.eset.com Proven. Trusted. Ultra-strong authentication to protect network access and assets ESET Secure Authentication provides powerful authentication to make remote access to the company network and

More information

Backup fast, recover faster

Backup fast, recover faster Backup & Recovery Backup fast, recover faster Introducing the award-winning data-, applications- and systems-recovery solution for physical and virtual environments. StorageCraft offers a suite of software

More information

EEN HUIS BESTUREN ALS EEN FABRIEK,

EEN HUIS BESTUREN ALS EEN FABRIEK, EEN HUIS BESTUREN ALS EEN FABRIEK, HOE DOE JE DAT? Henk Akkermans World Class Maintenance & Tilburg University Lezing HomeLab 2050, KIVI, 6 oktober, 2015 The opportunity: an industrial revolution is happening

More information

ESET SMART SECURITY PREMIUM 10. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista

ESET SMART SECURITY PREMIUM 10. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista ESET SMART SECURITY PREMIUM 10 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista ESET Smart Security Premium is all-in-one Internet security software. It keeps you safe online and offline - and includes Anti-Theft

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

SOCIAL ENGINEERING AND WHY IT HAPPENED TO YOU

SOCIAL ENGINEERING AND WHY IT HAPPENED TO YOU SOCIAL ENGINEERING AND WHY IT HAPPENED TO YOU Social engineering and why it happened to you By Michael Aguilar, Technical Lead at ESET North America In June 2015, nearly 22 million records of prospective

More information

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against

More information

IT-waardeketen management op basis van eeuwenoude supply chain kennis

IT-waardeketen management op basis van eeuwenoude supply chain kennis IT-waardeketen management op basis van eeuwenoude supply chain kennis Hans van Aken / November 28, 2012 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Examen Software Engineering 2010-2011 05/09/2011

Examen Software Engineering 2010-2011 05/09/2011 Belangrijk: Schrijf je antwoorden kort en bondig in de daartoe voorziene velden. Elke theorie-vraag staat op 2 punten (totaal op 24). De oefening staan in totaal op 16 punten. Het geheel staat op 40 punten.

More information

Microsoft Windows 7 / Vista / XP / 2000 / Home Server / NT4 (SP6) Quick Start Guide

Microsoft Windows 7 / Vista / XP / 2000 / Home Server / NT4 (SP6) Quick Start Guide Microsoft Windows 7 / Vista / XP / 2000 / Home Server / NT4 (SP6) Quick Start Guide ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

ESET Endpoint Protection Advanced

ESET Endpoint Protection Advanced ESET Endpoint Protection Advanced Whether your business is just starting or established, there are a few things you expect from software you use daily. At ESET, we feel that running software in the business

More information

Load Balancing Lync 2013. Jaap Wesselius

Load Balancing Lync 2013. Jaap Wesselius Load Balancing Lync 2013 Jaap Wesselius Agenda Introductie Interne Load Balancing Externe Load Balancing Reverse Proxy Samenvatting & Best Practices Introductie Load Balancing Lync 2013 Waarom Load Balancing?

More information

Welkom in de wereld van EDI en de zakelijke kansen op langer termijn

Welkom in de wereld van EDI en de zakelijke kansen op langer termijn Welkom in de wereld van EDI en de zakelijke kansen op langer termijn Sectorsessie mode 23 maart 2016 ISRID VAN GEUNS IS WORKS IS BOUTIQUES Let s get connected! Triumph Without EDI Triumph Let s get connected

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

ESET NOD32 ANTIVIRUS 7

ESET NOD32 ANTIVIRUS 7 ESET NOD32 ANTIVIRUS 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

Hoe werkt het SMTP Protocol?..

Hoe werkt het SMTP Protocol?.. Hoe werkt het SMTP Protocol?.. Wanneer je gebruik wil maken van een email adres van een ander dan kan je dat via het smtp protocol doen. Waarom via SMTP?. Je wilt dit via SMTP doen omdat SMTP voor Simple

More information

ESET NOD32 ANTIVIRUS 6

ESET NOD32 ANTIVIRUS 6 ESET NOD32 ANTIVIRUS 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art

More information

Daily billing, monthly invoicing

Daily billing, monthly invoicing Daily billing, monthly invoicing Why ESET? We are focused solely on IT security We have a long track record. ESET s founders were among the first in the world to develop antivirus software, in 1987. More

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Setup procedure of Firewall

Setup procedure of Firewall Setup procedure of Firewall ESET Smart Security Contents Common procedure- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3 Connecting the projector to Windows XP using

More information

Informatiebeveiliging volgens ISO/IEC 27001:2013

Informatiebeveiliging volgens ISO/IEC 27001:2013 Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland Copyright 2012 BSI. All rights reserved. Inhoud Wie zijn wij? Waarom informatiebeveiliging? Wat is de relevantie

More information

ESET SMART SECURITY 7

ESET SMART SECURITY 7 ESET SMART SECURITY 7 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET Smart Security

More information

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 Quick Start Guide Microsoft Windows Vista / XP / 2000 / 2003 ESET NOD32 Antivirus provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on

More information

ESET SMART SECURITY 8

ESET SMART SECURITY 8 ESET SMART SECURITY 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET Smart Security

More information

Copyright 2013 wolfssl Inc. All rights reserved. 2

Copyright 2013 wolfssl Inc. All rights reserved. 2 - - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.

More information

:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP

:: Free but Fake: Rogue Anti-malware. Cristian Borghello, CISSP :: Free but Fake: Rogue Anti-malware Cristian Borghello, CISSP Table of Contents Introduction 2 Analysis of a Well-known Case 3 Conclusion 7 Further Information 8 1 Introduction Most antivirus products

More information

Virtualisatie. voor desktop en beginners. Gert Schepens Slides & Notities op gertschepens.be

Virtualisatie. voor desktop en beginners. Gert Schepens Slides & Notities op gertschepens.be Virtualisatie voor desktop en beginners Gert Schepens Slides & Notities op gertschepens.be Op deze teksten is de Creative Commons Naamsvermelding- Niet-commercieel-Gelijk delen 2.0 van toepassing. Wat

More information

ESET Security Solutions for Your Business

ESET Security Solutions for Your Business ESET Security Solutions for Your Business It Is Our Business Protecting Yours For over 20 years, companies large and small have relied on ESET to safeguard their mission-critical infrastructure and keep

More information

Risk-Based Monitoring

Risk-Based Monitoring Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1 wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan?

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

MASTERCLASS INNOVATIEVE BENADERINGEN VAN LEERPROCESSEN EN LEERPRAKTIJKEN

MASTERCLASS INNOVATIEVE BENADERINGEN VAN LEERPROCESSEN EN LEERPRAKTIJKEN MASTERCLASS INNOVATIEVE BENADERINGEN VAN LEERPROCESSEN EN LEERPRAKTIJKEN PROF. DR. MARCUS SPECHT WELTEN INSTITUTE RESEARCH CENTRE FOR LEARNING, TEACHING AND TECHNOLOGY OPEN UNIVERSITEIT NEDERLAND MARCUS.SPECHT@OU.NL

More information

COOLS COOLS. Cools is nominated for the Brains Award! www.brainseindhoven.nl/nl/top_10/&id=507. www.cools-tools.nl. Coen Danckmer Voordouw

COOLS COOLS. Cools is nominated for the Brains Award! www.brainseindhoven.nl/nl/top_10/&id=507. www.cools-tools.nl. Coen Danckmer Voordouw Name Nationality Department Email Address Website Coen Danckmer Voordouw Dutch / Nederlands Man and Activity info@danckmer.nl www.danckmer.nl Project: Image: Photographer: Other images: COOLS CoenDVoordouw

More information

~ We are all goddesses, the only problem is that we forget that when we grow up ~

~ We are all goddesses, the only problem is that we forget that when we grow up ~ ~ We are all goddesses, the only problem is that we forget that when we grow up ~ This brochure is Deze brochure is in in English and Dutch het Engels en Nederlands Come and re-discover your divine self

More information

MAYORGAME (BURGEMEESTERGAME)

MAYORGAME (BURGEMEESTERGAME) GATE Pilot Safety MAYORGAME (BURGEMEESTERGAME) Twan Boerenkamp Who is it about? Local council Beleidsteam = GBT or Regional Beleidsteam = RBT Mayor = Chairman Advisors now = Voorlichting? Official context

More information

Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten?

Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten? Hoe beheer ik veilig, effectief en efficiënt de ontsluiting van patiënt- en cliënt- gegevens op mobiele apparaten? 22 Maart Aarle-Rixtel Hans van Oorschot hans.van.oorschot@caldoo.nl +31 6 2124 7424 Charles

More information

101 Inspirerende Quotes - Eelco de boer - winst.nl/ebooks/ Inleiding

101 Inspirerende Quotes - Eelco de boer - winst.nl/ebooks/ Inleiding Inleiding Elke keer dat ik een uitspraak of een inspirerende quote hoor of zie dan noteer ik deze (iets wat ik iedereen aanraad om te doen). Ik ben hier even doorheen gegaan en het leek me een leuk idee

More information

Client side. DESlock + Data Encryption

Client side. DESlock + Data Encryption Data Encryption DESlock + is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side

More information

UvA college Governance and Portfolio Management

UvA college Governance and Portfolio Management UvA college Han Verniers Principal Consultant Han.Verniers@LogicaCMG.com Programma Governance IT Governance, wat is dat? Governance: structuren, processen, instrumenten Portfolio Management Portfolio Management,

More information

Masterclass Maintenance & Management

Masterclass Maintenance & Management Wat gaan we doen? Waar kan je tegen aan lopen? Waarom is monitoren een noodzaak? Voorbeeld situaties Hoe krijg je grip op die situaties? Hands on! Tips voor een robuuste installatie 2 PROFIBUS and PROFINET

More information

Hoe kies je de juiste Microsoft Hosted Exchange Service Provider?

Hoe kies je de juiste Microsoft Hosted Exchange Service Provider? White Paper Cloud diensten zijn populairder dan ooit. Veel bedrijven zien nu dan ook de voordelen van het uitbesteden van bepaalde ICT onderdelen. Voordelen als: Beschikbaarheid van data, Snelle Implementatietijd

More information

The information in this report is confidential. So keep this report in a safe place!

The information in this report is confidential. So keep this report in a safe place! Bram Voorbeeld About this Bridge 360 report 2 CONTENT About this Bridge 360 report... 2 Introduction to the Bridge 360... 3 About the Bridge 360 Profile...4 Bridge Behaviour Profile-Directing...6 Bridge

More information

Market Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011

Market Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011 Market Intelligence & Research Services CRM Trends Overview MarketCap International BV Januari 2011 Index 1. CRM Trends generiek 2. CRM & IT 3. CRM in Nederland 2011 2 Index 1. CRM Trends generiek 2. CRM

More information

Specification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst

Specification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst Specification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst Terminologie Specification by Example (SBE) Acceptance Test Driven Development (ATDD) Behaviour

More information

ESET File Security for Microsoft Windows Server

ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Version 4.5 Product Bulletin Version 1.2 Michal Jankech Product Manager, Server Security ESET, spol. s r.o. we protect your digital worlds phone: +421 (2)

More information

Platform voor Informatiebeveiliging IB Governance en management dashboards

Platform voor Informatiebeveiliging IB Governance en management dashboards Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor

More information

Is het nodig risico s te beheersen op basis van een aanname..

Is het nodig risico s te beheersen op basis van een aanname.. Is het nodig risico s te beheersen op basis van een aanname.. De mens en IT in de Zorg Ngi 19 april 2011 René van Koppen Agenda Er zijn geen feiten, slechts interpretaties. Nietzsche Geen enkele interpretatie

More information

Jachtbouwsymposium Niet praten maar poetsen 23 mei 2013. Jacques Hoffmans

Jachtbouwsymposium Niet praten maar poetsen 23 mei 2013. Jacques Hoffmans Jachtbouwsymposium Niet praten maar poetsen 23 mei 2013 Jacques Hoffmans INHOUD: MasterShip Hiswa IPC Project modulair engineering Ervaringen Kosten vergelijk Assemblage film Implementatie adviezen 1 Core

More information

ESET NOD32 Antivirus. for Kerio. Installation manual

ESET NOD32 Antivirus. for Kerio. Installation manual ESET NOD32 Antivirus for Kerio Installation manual Content 1. Introduction...3 2. Supported versions...3 ESET NOD32 Antivirus for Kerio Copyright 2012 by ESET, spol. s r. o. ESET NOD32 Antivirus was developed

More information

Use of trademarks with a reputation as Adwords by competitors: Permissible comparative advertising or impermissible coat-tail riding / dilution?

Use of trademarks with a reputation as Adwords by competitors: Permissible comparative advertising or impermissible coat-tail riding / dilution? Use of trademarks with a reputation as Adwords by competitors: Permissible comparative advertising or impermissible coat-tail riding / dilution? On Thursday March 24, 2011 The Trademark Law Institute (TLI)

More information

Ons privacybier. Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 21/01/16

Ons privacybier. Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 21/01/16 21/01/16 Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 1 Privacycafé copyright 2016 Data Protec7on Ins7tute BVBA Ons privacybier 2 Privacycafé copyright 2016 Data Protec7on

More information

Thomas van Manen Researcher & Digital Strategist @VINTlabs MA. New Media & Digital Culture

Thomas van Manen Researcher & Digital Strategist @VINTlabs MA. New Media & Digital Culture V I N T Vision Inspiration Navigation Trends Thomas van Manen Researcher & Digital Strategist @VINTlabs MA. New Media & Digital Culture V I N T Vision Inspiration Navigation Trends Gamifica'on /? /! /

More information

Innoveren met Data. Created with open data : https://joinup.ec.europa.eu/community/ods/document/online-training-material. Dr.ir.

Innoveren met Data. Created with open data : https://joinup.ec.europa.eu/community/ods/document/online-training-material. Dr.ir. Innoveren met Data Created with open data : https://joinup.ec.europa.eu/community/ods/document/online-training-material Dr.ir. Erwin Folmer BIG DATA (GARTNER, JULY 2013) Erwin Folmer Pressure Cooker

More information

TaalCompleet: e-learning

TaalCompleet: e-learning TaalCompleet: e-learning Hoe werkt het? Engels How does it work? English TaalCompleet: hoe werkt het? 1 How does it work? What kinds of assignments are there in TaalCompleet? listening assignment on the

More information

Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters

Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters Welk deel van het platform hebben we nu behandeld? Agenda Recap: Storage Account Nieuw! Premium Storage Nieuw! Native backup voor

More information

Get Insant Help 1.8OO~ 570 ~1233 Eset Nod32 Antivirus Tech nical Supp ort Customer Phone Number

Get Insant Help 1.8OO~ 570 ~1233 Eset Nod32 Antivirus Tech nical Supp ort Customer Phone Number Get Insant Help 1.8OO~ 570 ~1233 Eset Nod32 Antivirus Tech nical Supp ort Customer Phone Number Virus Scanning Notworking Helpline +1(800)- 570-1233 Web Tech Support and Help for ESET NOD32 call us at

More information

OGH: : 11g in de praktijk

OGH: : 11g in de praktijk OGH: : 11g in de praktijk Real Application Testing SPREKER : E-MAIL : PATRICK MUNNE PMUNNE@TRANSFER-SOLUTIONS.COM DATUM : 14-09-2010 WWW.TRANSFER-SOLUTIONS.COM Real Application Testing Uitleg Real Application

More information

INVITATION. The Trademark Law Institute (TLI) in co operation with Prof. mr. Tobias Cohen Jehoram from the

INVITATION. The Trademark Law Institute (TLI) in co operation with Prof. mr. Tobias Cohen Jehoram from the INVITATION The Trademark Law Institute (TLI) in co operation with Prof. mr. Tobias Cohen Jehoram from the cordially invites you to attend the guest lecture KEYWORD A DVERTISING that will be provided by

More information

Customer Value Enhancement, Endpoint Security Products Global, 2011

Customer Value Enhancement, Endpoint Security Products Global, 2011 Customer Value Enhancement, Endpoint Security Products Global, 2011 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year in business with a global research organization of 1,800

More information

Free Public Wi-Fi: Hoe dit veilig en legaal implementeren? Manage IT - 13/11/2014

Free Public Wi-Fi: Hoe dit veilig en legaal implementeren? Manage IT - 13/11/2014 Free Public Wi-Fi: Hoe dit veilig en legaal implementeren? Manage IT - 13/11/2014 Waarover gaat deze presentatie? Drie onderwerpen (I) Wat? (II) Hoe? (III) Voorbeeld? Thank You (I) Wat? ZapFi International

More information

Martine de Bruijne, Cordula Wagner Safety 4 Patients www.onderzoekpatientveiligheid.nl

Martine de Bruijne, Cordula Wagner Safety 4 Patients www.onderzoekpatientveiligheid.nl Patient safety and patient outcomes Martine de Bruijne, Cordula Wagner Safety 4 Patients www.onderzoekpatientveiligheid.nl TRIP symposium, 19 maart 2013 Safety 4 patients www.onderzoekpatientveiligheid.nl

More information

Research Report. Ingelien Poutsma Marnienke van der Maal Sabina Idler

Research Report. Ingelien Poutsma Marnienke van der Maal Sabina Idler Research Report Ingelien Poutsma Marnienke van der Maal Sabina Idler Research report ABSTRACT This research investigates what the ideal bank for adolescents (10 16 years) looks like. The research was initiated

More information

iemand begroeten tellen van één tot en met twintig Who s that?

iemand begroeten tellen van één tot en met twintig Who s that? two Na deze unit kun je jezelf en andere mensen voorstellen praten over waar je vandaan komt iemand begroeten tellen van één tot en met twintig zeggen hoe oud je bent Who s that? 0 Listen and look Watch

More information

How to manage Business Apps - Case for a Mobile Access Strategy -

How to manage Business Apps - Case for a Mobile Access Strategy - How to manage Business Apps - Case for a Mobile Access Strategy - Hans Heising, Product Manager Gábor Vida, Manager Software Development RAM Mobile Data 2011 Content Introduction 2 Bring your own device

More information

Welcome! What do teachers learn from research about assessment? Round table session EAPRIL Luxembourg November 26, 2015

Welcome! What do teachers learn from research about assessment? Round table session EAPRIL Luxembourg November 26, 2015 Welcome! What do teachers learn from research about assessment? Round table session EAPRIL Luxembourg November 26, 2015 About us a brief look at the different teachers and schools Lead teacher Greta de

More information

Exchanging new ideas

Exchanging new ideas Exchanging new ideas New Ideas: Sharing and cooperating within NRENs Maurice.vandenAkker@surfnet.nl 15 december 2006 1 High quality internet for higher Education and Research Today s to-do list Background

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Secure Enterprise Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET

More information

Memorandum. Zie bijlage. Behavioural and Societal Sciences Kampweg 5 3769 DE Soesterberg Postbus 23 3769 ZG Soesterberg. Van Dr. J.B.F.

Memorandum. Zie bijlage. Behavioural and Societal Sciences Kampweg 5 3769 DE Soesterberg Postbus 23 3769 ZG Soesterberg. Van Dr. J.B.F. Memorandum Van Dr. J.B.F. van Erp Onderwerp epartner architecture workshops 'The Results' Behavioural and Societal Sciences Kampweg 5 3769 DE Soesterberg Postbus 23 3769 ZG Soesterberg www.tno.nl T +31

More information

Kansen in KP7 NMP. Aansluitend op de HTSM Roadmap Nanotechnologie. 11 juni 2012. Melvin A. Kasanrokijat

Kansen in KP7 NMP. Aansluitend op de HTSM Roadmap Nanotechnologie. 11 juni 2012. Melvin A. Kasanrokijat Kansen in KP7 NMP Aansluitend op de HTSM Roadmap Nanotechnologie 11 juni 2012 Melvin A. Kasanrokijat Mogelijkheden in KP7 - Cooperation Groot programma met 10 verschillende thema s NMP, ICT, Health, Energy,

More information

What can Office 365 do for your organization? Cor Kroon

What can Office 365 do for your organization? Cor Kroon What can Office 365 do for your organization? Cor Kroon Ciber Knowledge Carrousel 2013 What can Office 365 do for your Organization? Cor Kroon Business Analyst / Senior Microsoft Professional cor.kroon@ciber.nl

More information

tablet technologie in het onderwijs

tablet technologie in het onderwijs tablet technologie in het onderwijs prof. dr. marcus specht Centre for Learning Sciences and Technologies Open Universiteit Nederland marcus.specht@ou.nl twitter, flickr, facebook: marcuspecht 1 OUNL and

More information

PlantPAx op weg naar Connected Enterprise.

PlantPAx op weg naar Connected Enterprise. AUP 46 PlantPAx op weg naar Connected Enterprise. Wim van der Heide Solution Architect Copyright 2015 Rockwell Automation, Inc. All rights reserved. 2 Agenda 1. Waarom zou u moeten migreren? 1. Connected

More information

Corporate Universities Aanjagers van de lerende organisatie

Corporate Universities Aanjagers van de lerende organisatie CORPORATE UNIVERSITY EVENT Corporate Universities Aanjagers van de lerende organisatie Rotterdam School of Management Erasmus University Rotterdam 5 juni 2012 Dagvoorzitter Josette de Goede RSM Oogst Open

More information

Met wie moet je als erasmusstudent het eerst contact opnemen als je aankomt?

Met wie moet je als erasmusstudent het eerst contact opnemen als je aankomt? Erasmusbestemming: University of Edinburgh, Edinburgh, UK Academiejaar: 2011-2012 Één/twee semester(s) Universiteit Waar is de universiteit ergens gelegen (in het centrum/ ver uit het centrum)? For law

More information

Software VOC netwerkbijeenkomst De kansen van OEM. Hans Schut OEM Partner Manager Nederland 9 juli 2014

Software VOC netwerkbijeenkomst De kansen van OEM. Hans Schut OEM Partner Manager Nederland 9 juli 2014 Software VOC netwerkbijeenkomst De kansen van OEM Hans Schut OEM Partner Manager Nederland 9 juli 2014 Wat is OEM? Het principe Wanneer een bedrijf zijn producten verkoopt aan andere bedrijven, en dat

More information

SharePoint. Microsoft Dynamics. SharePoint

SharePoint. Microsoft Dynamics. SharePoint What is? SHARE Er was eens een bedrijf waar documenten een belangrijke rol spelen. Elke dag werden er vele documenten tussen klanten en leveranciers over en weer gestuurd en ergens opgeslagen. Op een

More information

Inloop introductie LINKED DATA VOOR DE LIEFHEBBER

Inloop introductie LINKED DATA VOOR DE LIEFHEBBER Inloop introductie LINKED DATA VOOR DE LIEFHEBBER Erwin Folmer Pressure Cooker Aanpak Gartner: Big Data Makes Firms Smarter; Open Data Makes Them Richer 6 Erwin Folmer Linked Open Data & PiLOD 7 Erwin

More information

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 9 ESET NOD32 ANTIVIRUS 9 User Guide (intended for product version 9.0 and higher) Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Click here to download the most recent version of this document ESET NOD32

More information

WELKOM BIJ DEPARTMENT MS 3 MECHANICS OF SOLIDS, SURFACES AND SYSTEMS WWW.UTWENTE.NL/CTW/MS3

WELKOM BIJ DEPARTMENT MS 3 MECHANICS OF SOLIDS, SURFACES AND SYSTEMS WWW.UTWENTE.NL/CTW/MS3 WELKOM BIJ DEPARTMENT MS 3 MECHANICS OF SOLIDS, SURFACES AND SYSTEMS WWW.UTWENTE.NL/CTW/MS3 Department MS 3 Organisatie: Voorzitter Prof.dr.ir. D.J. Schipper Onderzoekscoordinator Dr.ir. G.R.B.E. Römer

More information

#BusinessMeetsIT. Welcome. Seminar BI& Datacenters

#BusinessMeetsIT. Welcome. Seminar BI& Datacenters #BusinessMeetsIT Welcome Seminar BI& Datacenters Nice to meet you. I m William ( @wvisterin ) Nice to meet you. I m William ( @wvisterin ) Editor in Chief Smart Business Strategies B2B Manager at Minoc

More information

Citrix Access Gateway: Implementing Enterprise Edition Feature 9.0

Citrix Access Gateway: Implementing Enterprise Edition Feature 9.0 coursemonstercom/uk Citrix Access Gateway: Implementing Enterprise Edition Feature 90 View training dates» Overview Nederlands Deze cursus behandelt informatie die beheerders en andere IT-professionals

More information

Het Secure Datacenter

Het Secure Datacenter Het Secure Datacenter If trust and reliability matters Michiel Steltman CTO Siennax Drivers voor IT Security Financiële aansprakelijkheid Sox, Basel II Persoonlijke aansprakelijkheid van managers Operationele

More information

Back up fast, recover faster

Back up fast, recover faster Backup & Recovery Back up fast, recover faster Introducing the awardwinning data, applications and systemsrecovery solution for physical and virtual environments. StorageCraft offers a suite of software

More information

Digital Transformation. 23 Juni - Progress Summer Summit - Rotterdam. Stephan Leferink Progress Benelux

Digital Transformation. 23 Juni - Progress Summer Summit - Rotterdam. Stephan Leferink Progress Benelux Digital Transformation 23 Juni - Progress Summer Summit - Rotterdam Stephan Leferink Progress Benelux Programma 14.00u 14.30u Digital Transformation & Experience Introductie en Plenaire Sessie 14.45u 18.00u

More information

NAAR NEDERLAND HANDLEIDING

NAAR NEDERLAND HANDLEIDING NAAR NEDERLAND HANDLEIDING www.naarnederland.nl 1. Introduction As of 15 March 2006, certain foreign nationals wishing to settle in the Netherlands for a prolonged period who require a provisional residence

More information

STREET CIRCUS

STREET CIRCUS CAN-DO STATEMENTS Text 1 Can find and understand specific information in lists, overviews and forms Can understand simple adverts with few abbreviations Can understand specific information in simple texts

More information

Welkom bij Axle-IT au Château! Welkom op kasteel Hooge Vuursche!

Welkom bij Axle-IT au Château! Welkom op kasteel Hooge Vuursche! Welkom bij Axle-IT au Château! Welkom op kasteel Hooge Vuursche! Programma Welkom (Marius Albracht) IT ontwikkelingen en Axle-IT MSP Services (Marius Albracht & Frank Wils) Shavlik (Barry Kew) Nexthink

More information