Volg ICTI

Blog Security

Supplier management in ISO 27001

Since suppliers often have access to information assets that are critical to business operations, the ISO 27001 standard dedicates a full set of organizational controls (5.19–5.23) to managing information security risks in supplier relationships. In this article, we explain these controls and provide a supplier register template.

Pavlo Burda
success 3 cover

Call for companies: research projects for VU Business track 2026

For the upcoming 2026 edition of the VU’s Computer Science Bachelor Research projects, ICT Institute is again organising the Computer Science Business Track where we supervise a new cohort of student teams working on real-world, data-driven challenges. We are looking for innovative companies in the Netherlands (from scale-ups to public organisations) with substantial data, AI,…

Pavlo Burda
Supplier register in Notion and AI

Exploring Notion AI features for ISO 27001 and GDPR

The rise of AI-powered workspaces is changing how InfoSec teams manage their security programs. In Notion, ISO 27001 documentation can evolve from static registers into intelligent dashboards for your Information Security Management System (ISMS).

Pavlo Burda

ISO 27001 auditor training

ICT Institute offers a dedicated “ISO 27001 auditor” training. The training is accessible for anyone who is already familiar with ISO 27001 and wants to become an ISMS auditor, for instance to do ISMS internal audits.

Sieuwert van Otterloo
Photo by Jeswin Thomas on Unsplash

Computer Science research results

In 2025 more than 20 computer science students completed their thesis project with support from ICT institute. In this article you can find the titles and topics of the completed research projects as well as some main results. The projects ranged from data science e-health AI applications to software prototypes for cybersecurity analytics. Research approach…

Pavlo Burda