Pieter Van der HulstVennoot - Computer Forensics & Incident Response

- Computer Forensics Auditor
- Certified Information Systems Auditor
- All kinds of fraud detection and investigations
- Analysing and data mining ERP and bookkeeping software
- Incident Response
- Information Security Management advisory
- Intellectual property & royalties
- Software Asset Management based on ITIL guides
Before joining i-Force in 2005, Pieter held a management position at Deloitte, where he specialized on Third Party Compliance and Revenue Assurance. Here he obtained a large experience in capturing and analysing electronic data, on different ERP-software packages at third parties (no direct client relation with the auditee). As a manager within the European hub, he became responsible for the coordination of a team of specialists in these matters and executed compliance and revenue assurance jobs for major clients like Microsoft, Adobe, Symantec, IBM, Unilin, … Within these revenue assurance jobs he gathered expert knowledge to analyse and verify company processes and to formulate recommendations.
Pieter has investigated and managed many fraud cases through which he gained a vast experience in the opportunities for fraud, as well as for its detection and deterrence.
He is also regularly appointed by court as a judicial IT expert, both in civil and (fiscal) penal cases.
Pieter regularly conducts formal incident investigations and handles advanced incident handling scenarios, including internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers, and complex digital forensic cases. Pieter is a seasoned cybersecurity professional.
Pieter has in-depth knowledge on authorization and authentication mechanisms, especially in online banking environments and as such has been investigating many security breaches in this area.
He enjoys combining his in-depth technical security skills with the ability to zoom out to higher-level people/process/technology risks.
i-Force comes up with results that are actually implementable. That is their strength compared to other consulting companies.
publications
-
Nieuwe oplichtingsmethode omzeilt technische beveiliging
23 september 2022 -
Cyber Risks and the Origins of the Vulnerability Flood
According to CVE Details, the number of vulnerabilities reported to date in 2022 (11.242) is on track to yet again bypass the total number of vulnerabilities reported in all of 2021 (20.168). If nothing dramatic changes, the list seems on track to at least match last year’s record of over 20K reported vulnerabilities, if not
15 juni 2022 -
Log4J kwetsbaarheid – patch ASAP !
Er zijn momenteel wereldwijd massaal scans op kwetsbare Log4j 2-implementaties door kwaadwillenden . Ook zijn er reeds succesvolle aanvallen gemeld! De BSI (Het Bundesamts für Sicherheit in der Informationstechnik, onderdeel van het Duitse ministerie van Binnenlandse Zaken) heeft code rood, oftewel de hoogste van vier alarmfasen, afgekondigd om de ernst van de situatie aan te
13 december 2021 -
Is your (cloud) mail infrastructure protected ?
9 april 2021 -
FRAUD ALERT – ONLINE-TRADINGPLATFORMEN & BITCOIN
De voorbije weken ontving de FSMA klachten van consumenten over nieuwe frauduleuze online-tradingplatformen die actief zijn op de Belgische markt. Deze tradingplatformen proberen potentiële slachtoffers nieuwsgierig te maken via nepadvertenties op sociale media. In deze nepadvertenties heeft een bekende persoon het vaak over een methode of project om snel rijk te worden. Vaak kaderen deze
17 februari 2021
contact details
feedback form
If you’d like a free consultation, please start by completing the form: