Benelux Slide deck Community Meeting Benelux in Antwerp

attached to this post are the slide decks of yesterday's meeting in Antwerp.
There was also a presentation in canva which you can check out at this link.
If you missed the meeting, like I did due to strikes at the airports in Germany, I am sure these will give you a good idea of the content that was covered. :)
Also: if you were at the event and did not give feedback yet - please do so here where you can take a very short survey. Thank you!

We will also be adding the photos of the event in the next few days.

Thanks and have a lovely weekend ahead.


  • 8FebruaryAntwerp Community Benelux.pdf
    28.5 MB · Views: 17

How Counter-Drone Solutions Utilize Visual and Thermal Imaging

I recently read an interesting article discussing the increasing use of drones and the corresponding rise in unauthorized drone activity, which poses a threat to security and safety. The counter-drone industry is responding to this challenge by utilizing visual and thermal technologies, which form the foundation of visual detection systems like Sentrycs Integrated Counter Drone Solutions.

Drone detection through imaging leverages camera technology, both visible and thermal, to identify and track unmanned aerial vehicles (UAVs) in our airspace. This method is crucial in the counter-drone industry, offering visual confirmation for practical threat assessment and mitigation.

Visible cameras provide high-resolution imagery, useful for daytime operations, capturing precise details like the drone’s size, shape, and markings. However, their effectiveness diminishes in low-light conditions or when obscured by fog, smoke, or camouflage. This is where thermal imaging steps in, detecting heat signatures emitted by objects, making it effective at night, in inclement weather, and even when drones attempt to hide.

Despite its advantages, drone detection through imaging alone is not foolproof. Advanced drones can employ countermeasures like cloaking devices or altering thermal signatures. Additionally, image analysis can be computationally intensive, requiring powerful processing capabilities. Nonetheless, it remains a fundamental tool in the counter-drone arsenal, offering valuable visual data for situational awareness and initial threat identification.

This brings us to some key discussion points:
  1. How can we leverage imaging technology in our operations to enhance security and safety?
  2. What are the potential challenges we might face in implementing such technology, and how can we overcome them?
  3. How can we ensure the data collected by these technologies is used effectively and securely?
  4. What are the implications of drone detection technology for the future of security and safety in our industry?
I encourage everyone to share their thoughts, insights, and ideas on this topic.

Read the article:

DEI: Shaping The Future Of Vibrant Workforces

I recently read an insightful article that highlighted the significant role of diversity, equity, and inclusion (DEI) in achieving enhanced business outcomes. The article emphasized that engaged employees are the backbone of any successful DEI initiative and explored how technology can be leveraged to spark that engagement.

Companies are now actively creating safe and inclusive workplaces to intensify their focus on DEI initiatives. The IT sector, HR, and consulting or business services are leading the way, with significant percentages planning to implement or already having established DEI recruitment strategies. This collective effort across industries aims to foster diverse and inclusive work environments for sustained success.

DEI is seen as the guiding constellation, steering an environment where each employee's unique facets are not just acknowledged but also celebrated. In this context, technology takes center stage. Companies can use tools to shatter barriers and create a workplace where everyone shines. The DEI tech market, valued at $5.3 billion, propels forward-thinking organizations toward transformation, unlocking not just diversity but also financial success.

This brings us to some key discussion points:
  1. How can we leverage technology to enhance our DEI initiatives and create a more inclusive workplace?
  2. What strategies can we implement to ensure that all employees feel engaged and valued?
  3. How can we measure the success of our DEI initiatives and continuously improve them?
  4. What are the potential challenges we might face in implementing DEI tech, and how can we overcome them?
I encourage everyone to share their thoughts, experiences, and suggestions on this topic.

Read the article:

Blockchain Influencers: Navigating The Creator Economy Within Web3

Web3 is a digital environment of blockchain networks and decentralized protocols that empower users, giving them control over their digital identities, data, and interactions.

A fascinating trend within this rapidly growing space is the emergence of the Web3 creator economy. This movement is being led by crypto influencers on Web3-native applications, traditional social media, and hybrid platforms. These influencers, followed by millions daily, are reshaping the way audiences engage and interact with the blockchain.

The numbers associated with the Web3 creator economy are impressive. For instance,, a recent entrant, accumulated almost $50 million in fees in just three months and reached a peak of 75,000 daily active users. This decentralized social network leveraged the existing social media infrastructure of Twitter, building a membership platform on top using Coinbase’s new layer-2 network, Base.

This development raises several discussion points:
  1. How can we adapt to and leverage the opportunities presented by the Web3 creator economy?
  2. What are the potential challenges and risks associated with this new digital environment, and how can we mitigate them?
  3. How can we ensure that we stay ahead of the curve as the Web3 space continues to evolve rapidly?
  4. What are the implications of the Web3 creator economy for our current business model and strategies?
I encourage everyone to share their thoughts, insights, and ideas on this topic. Your input will be invaluable as we navigate this new era of digital interaction.

Read the article:

Internet of Things (IoT) Cyber Security

As we know, IoT devices are becoming increasingly prevalent in our daily lives, from personal assistants and home automation devices to wearables and healthcare devices. In 2022 alone, the number of connected IoT devices was estimated to rise to a staggering 14.4 billion.

While these devices undoubtedly offer convenience and efficiency, they also pose significant cybersecurity risks. This is not just a concern for consumer products; commercial, industrial, and military IoT devices are also at risk. Even devices used to make cities "smart" are not immune.

The key question is, how mindful are we of the impact that IoT devices have on our cybersecurity? How can we ensure that the devices connected to our home or enterprise networks take cybersecurity seriously? How can we protect the data we entrust to these devices?

The primary focus of this discussion is to raise cybersecurity awareness and discuss the potential security impact these devices can have on our networks and infrastructure if left unattended. We need to consider steps we can take to ensure that these IoT devices, which we use so regularly, are set up securely, remain secure, and protect our data to the best of their ability.

Here are some points to consider:
  1. How can we ensure that IoT devices are set up securely from the outset?
  2. What measures can we take to keep these devices secure over time?
  3. How can we ensure that the data handled by these devices is protected?
  4. What strategies can we implement to prevent IoT devices from becoming cybersecurity risks when they are left unattended for extended periods?
I encourage everyone to share their thoughts, experiences, and suggestions on this topic. Your input will be invaluable in helping us understand and address this growing concern.

Read the article:

AI may revolutionize security, but not without human intuition

I recently came across an insightful article discussing the role of artificial intelligence (AI) in cybersecurity. The article delves into AI's advantages, challenges, and limitations in this field, and I thought it would be beneficial to share some key points with you all.

AI-based cybersecurity isn't a new concept. Machine learning algorithms, deep learning techniques, and other AI technologies are used to identify malicious patterns, detect anomalies, predict threats, and respond to attacks. However, the question arises: Can AI replace human intuition? Can it substitute for security expertise?

To answer this question, we must understand the advantages of AI, its challenges, and its limitations.

Advantages of AI in Cybersecurity

  1. Speed: AI can analyze vast amounts of data well beyond human capacity, respond to threats, and report them in real-time. Achieving this level of capacity would require an enormous amount of human effort.
  2. Accuracy: AI is data-driven and, provided it's trained on bias-free data, its decision-making will generally be more accurate than a human's. AI also learns from new data much faster than a person can, continuously adapting its ability to detect and respond to evolving threats.
  3. Automation: AI systems can autonomously correlate and analyze system and network logs, indicators of compromise (IOCs), and anomalies, detecting and responding to zero-day attacks immediately. This can be a game-changer for security teams, especially at a time when cybersecurity is undergoing a talent shortage.
While AI brings significant advantages to cybersecurity, it's important to remember that it doesn't replace the need for human intuition and expertise. Instead, it should be seen as a tool that can augment our capabilities, allowing us to work more efficiently and effectively.

I encourage everyone to consider these points and consider how we can best leverage AI in our cybersecurity efforts. I look forward to hearing your thoughts and ideas on this topic.

Read the article:

Ethical challenges and best practices you should know for 2024

Personal information, deep fakes, AI and more can present ethical challenges for businesses. Here's a list of ethical challenges and best practices you should know for 2024. #CompTIACommunity #EthicsinTech

What ethical issues keep you up at night?


  • 5-ethical-issues-in-tech-to-watch-for-in-2024.png
    328.3 KB · Views: 0

Introduce yourself here!

Hello everyone, I am Ashutosh Pande but I go by my truncated first name, Ashu. I am based in Sunnyvale, California, USA and run my own advisory company, DAY Advisors, where I help companies find their product market fit, identify their target market, and position their product for success.

As a serial techno-entrepreneur, I have initiated or been involved with 9 startups; 2 are in their growth phase, 3 were acquired, 1 pivoted, and 1 closed and 2 that went public in Nasdaq. I am a keen thinker and visionary in the technology space, specializing in market creation for new technology, story telling and evangelizing new products. I bring rich global perspective in Blockchain, IoT, Mobile Telephony, location technology, MedTech and FinTech sectors.

I singularly or jointly hold over 70 issued or applied patents in area of mobile telephony, location and payments. One patent is a fundamental patent on integrating GPS into mobile phones and is referenced in many citations. It has been cross licensed by every leading mobile chipest and handset makers.

With over 3 decades in the industry, I have been fortunate to have worked in many global firsts. From the first cellular modem that went inside an IBM laptop developed for Sears field service team in the early 1990's, to the first handheld computer from Compaq (iPAQ) in 1994, the first GPS enabled mobile phone from Benafone in 2001, all the way to the world's first stable coin (PaySe) with approval from the regulatory authority in 2016.

I'm here to share my learings with members, learn from the community, and build meaningful connections.
Sam Ross
Sam Ross
Welcome @Ashu Pande ! When I was in high school, I sooooo wanted an iPAQ! I eventually got a 2210 and then a 4700. Wish I had kept a hold of them!

Introduce yourself here!

Hello Everyone,

Myself Nilesh Kulkarni and I am new to the CompTIA, although I have heard about this community and in fact I was invited to speak about the LCAP and Hyper Automation in 2023, unfortunately I was travelling back then and was not able to be a speaker. I have been actively involved in the Technology industry for 23+ years, gaining comprehensive experience and a deep understanding of the latest developments and trends. My passion for Innovation, Emerging technology, Automation, Artificial Intelligence and Design Thinking has driven me to actively participate in several events, conferences, and projects, enabling me to stay at the forefront of advancements in the field. I have many review and research papers to my credit since 2019.

Throughout my career, I have developed a keen eye for detail, strong analytical skills, and the ability to assess projects objectively and fairly. I have had the privilege of serving on internal Fortune Brand’s panels before, where my evaluations have been appreciated for their thoroughness and insightful feedback.

Recognized for leadership skills and technical acumen, I have received numerous accolades, including prestigious leadership awards and commendations for innovative solutions. My proactive involvement in integrating advanced technologies and leading cross-functional teams has been instrumental in shaping the future of the organizations I have worked with.

Outside of work, I engage in mentoring students, helping technology enthusiasts, contribute on various journals and most importantly researching for improving business with technical advancement. As a mentor leading an Internship Program, I have guided many interns and junior developer and aspiring leaders empowering them to innovate in areas such as .NET development, business process analysis, and modern technology frameworks.

My objective of joining this community is to learn from my peers within the CompTIA, looking fwd to virtually meet and discuss impact of technology !

Nilesh Kulkarni
[email protected]/[email protected]
  • Like
Reactions: Sam Ross

Top 6 Different Types Of Blockchain Suitable For Significant And Different Business Needs

Blockchain should be seen by the enterprise as an enabler for improving their business process.

At a high level, enterprise engages with the rest of the world is in two ways:
1. Confidential/ Private under NDA, and
2. Public

Mapping blockchain onto this process means that an enterprise should ideally support a permissioned chain for their confidential engagement, and with public chain for their non NDA engagement.

Another approach could be to use permissioned chain for B2B engagement and public chain for B2C.

Would love to bear thoughts.

Introduce yourself here!

Hello everyone,
My name is Sielecas (Suh-lee-kiss) and I'm super excited to be here and to participate. I am from Orlando Florida, and what brings me here is wanting to participate and give back to my local community by helping to show disadvantaged kids future opportunities in the tech field. I currently hold Net+ Sec+ and in a few short days (CYSA+) will be next on my list of achievements! I have been working in the DoD industry for the last 8 or so years doing software / hardware Integration and Test and I am trying to land my very first cybersecurity role. I took a leap of faith and decided to not renew my contract this January in hopes of landing my first cybersecurity analyst position.

Lets interesting fact about me...In my spare time, I like to play the drums and I dabble in the realm of 3D printing (Bambu Lab X1-Carbon).

I'm happy to get involved in any way that I can as I am soaking up tons of information in this exciting new field for me.

Online DEI On Demand Webinar

The UK & Ireland CompTIA Diversity, Equity & Inclusion Interest Group is excited to share "A Fireside Conversation with Traci Sewell from Sewell's Consulting". Traci is joined by @Hannah Lloyd , the Chair of the DEI Interest Group and VP of In-SOC and @Leanne Johnson, Director of the CompTIA Community in the UK & Ireland.

Traci has been instrumental in bringing significant change to the SQL Bits conferences, including a creche, multi-faith prayer room and much more!

Why not watch and pick up some actionable tips for your DEI initiative? There is a link at the end of the recording to ask Hannah and Traci questions directly.

Click here for access!

Why not check out all of our On Demand Webinars?

Empowering Diversity: The Transformative Impact of DEI on Education, Workforce and Oklahoma’s Prosperity

DEI stands as a pillar of progress, fostering inclusive environments that empower students from all walks of life and shaping a competitive and adaptable workforce that views differences as assets.

The article features an interview with Oklahoma Senator Mary Boren, who provides valuable insights into the role of DEI in shaping the state’s students, workforce, and economy. She addresses misconceptions and criticisms of DEI, emphasizing that it is not about promising equal outcomes but ensuring equal access to opportunities and fostering an atmosphere of decency, empathy, and intelligence.

Contrary to prevalent misconceptions, DEI is not synonymous with affirmative action. Senator Boren states, “DEI allows everyone to attend school and work with their merit. DEI opens doors for diverse backgrounds, including single parents, caregivers for older individuals, people with disabilities, and those dealing with mental health issues.”

Adherence to DEI principles is essential for breaking down unnecessary barriers and allowing more individuals to utilize their full potential. As Senator Boren notes, critics that draw parallels between DEI and affirmative action constrict the circle of opportunities, limiting workforce prospects for those wishing to find employment in the state.

I encourage everyone to read the article and share your thoughts. How do you see DEI impacting our work and the broader industry? How can we further integrate DEI principles into our practices?

Read the article:

Who Are The Big 3 In US Drone Delivery?

I recently read an article discussing the ongoing evolution of drone delivery services. The race to fulfill the promise of drone delivery is heating up as regulators, customers, and service providers navigate the challenges and opportunities of this emerging field.

The Federal Aviation Administration (FAA) has made significant strides in enabling operations beyond visual line of sight (BVLOS), a crucial requirement for companies to deliver goods at scale. The industry has long called for clear guidance on extending operations beyond the sight of pilots, and it seems we are now seeing this come to fruition.

The article raises an interesting question: Who are the major players and gatekeepers responsible for success in this space? The answer lies in the trusted partners who traditionally deliver goods to people at scale - companies like Walmart, UPS, and Amazon.

In 2023, leading companies like Matternet, Wing, and Zipline received approvals to extend their operations, allowing major logistics partners like Walmart and UPS to plan for the integration and scaling of these efforts. More recently, companies like Flytrex and DroneUp have also made strides in BVLOS operations, vying for a competitive position in the industry.

With the question of feasibility seemingly answered, the next steps are expected to focus on partnerships and scaling.

I encourage everyone to read the article and share your thoughts. How do you see these developments impacting your work and the broader industry? What opportunities and challenges do you foresee with the growth of drone delivery services?

Read the article: