N° 06 · THE SHERPA · Portrait52°05′N · 04°17′E — The Hague
Prof. Dr.Yuri Bobbert.
Professor · Author · Global CSO · Executive coach to CISOs and digital leaders. Dual PhD in Applied Economics (University of Antwerp, 2018) and Information Systems Science (Radboud, 2018). Stanford graduate in Innovative Technology Leadership (2022). 26+ years of management experience across technology, education, financial services, government and professional services — 10 books, 100+ peer-reviewed papers, and more than 300 organisations advised.
Titles
Prof. · Dr.
Practice since
2004
Languages
EN · NL
Seat
The Hague · NL
Reach
Four continents
Fields
Cyber · AI · Governance
Chapter I · The Portrait
A career written at altitude —
by a professor who never left the field.
YB · 2026Antwerp · The Hague
§ 01 · The approach
Yuri Bobbert is a Dutch entrepreneur in technology, an
author, and a professor, known for his work in digital leadership and
information security. He has founded companies including
Meetingwizard (Group Support Systems SaaS,
co-founded 2009), SecuriMeter (RegTech, acquired by
DPA Group in 2014), and B-ABLE (Business Information
Security consulting, acquired by DPA Group in 2014). He has held
Global Group Chief Security Officer roles at NN Group and UWV, and
today serves as Global CSO of ON2IT, Academic Director at Antwerp
Management School and Professor at the University of Antwerp.
Over the years he has coached hundreds of professionals — from
emerging leaders to senior executives — bridging academic rigour
with real-world execution. Ysherpa is the private
executive practice through which he now gathers 26+ years of that
work into a single pursuit: guiding newly-appointed executives
through the terrain they have been asked to lead.
A teacher who never stopped doing.
Across more than two hundred moderated board-level
sessions, three hundred keynote engagements,
one hundred-plus Master's theses supervised, and
advisory relationships with over three hundred organisations,
a single habit has held: to arrive in the room already briefed, to
listen for longer than is comfortable, and to leave the client better
oriented than they were when the conversation began.
§
On method. Ysherpa is not a training programme, a
coaching franchise, or a retainer for advice-on-tap. It is a bespoke
engagement — short where that is enough, long where the mountain
demands it.
Full name
Prof. Dr. Yuri Bobbert
Born
Netherlands, 1973
Based in
The Hague · NL
Works globally
EU · US · MEA · APAC
Working languages
English · Nederlands
Availability
Selective · By introduction
My motto: AI = Appreciative Inquiry. A strengths-based, positive approach to organisational change — focused on discovering what already works, amplifying success, and building an energising path forward.
— Y. Bobbert · Opening Minds to Impact the World
Today's cyber security leaders can't limit themselves to the role of enforcer. First and foremost, they need to focus on building a resilient organisational structure and culture.
— Y. Bobbert · Cyber Security Coalition interview
Chapter II · Roles & seats
A path written in positions held —
not titles pursued.
Present
Founder & Principal · Ysherpa executive practice
Ysherpa
The Hague · NL
Oct 2019 — present
Global Chief Security Officer · Zero Trust as a Service · US financial industry · ME & APAC (2025)
ON2IT Cybersecurity
Plano · TX · US
Feb 2013 — present
Academic Director & Professor · Business IT Management · Executive Master in Cybersecurity & Risk Management · Executive Master in Audit & Assurance
Antwerp Management School
Antwerp · BE
Mar 2014 — present
Professor · Faculty of Business and Economics
University of Antwerp
Antwerp · BE
Visiting
Lecturer · Cyber Security Academy
Leiden University · TU Delft
Leiden / Delft · NL
Nov 2009 — present
Co-founder · Owner · Group Support Systems SaaS · Eduwizard for schools
Meetingwizard
Capelle aan den IJssel · NL
Feb 2010 — present
Book author · ten research & management books across four publishers
Several publishers
—
Jan 2012 — present
Volunteer · ISACA Journal contributor · Researcher of the Year finalist (2023, 2024)
ISACA
United States
Mar 2016 — Sep 2019
Global Head of Information Security, Risk & Compliance · Delta Lloyd integration · LockChain platform
NN Group · AEX-listed
The Hague · NL
Apr 2014 — Mar 2016
Head of Digital Security (ad-interim CISO) · Dutch government employment agency
UWV
Amsterdam · NL
2013 — present
Associate Professor
NOVI University of Applied Sciences
Utrecht · NL
2012 — present
Chair · Bachelor IT supervisory board
LOI University of Applied Sciences
NL
2011
Visiting PhD researcher · ITAG Research Institute
Antwerp Management School
Antwerp · BE
Nov 2010 — Oct 2014
CTO · Founder · SecuriMeter compliance dashboard for CxO · acquired by DPA Group, Oct 2014
SecuriMeter Technology (RegTech)
Utrecht · NL
Apr 2004 — Mar 2014
CEO · Founder · Business Information Security, Risk & Compliance consulting · acquired by DPA Group, Jun 2014
B-ABLE
Utrecht · NL
Apr 2001 — Apr 2004
Global Business Development
2source4
Utrecht · NL
Jul 1996 — Apr 2001
Team manager · Sales & business development
Technology Delivery Services
Utrecht · NL
Chapter III · Education
Read, researched, and returned to teach.
2011 — 2018 · PhD
Applied Economics
Maturing Business Information Security — performance management & enterprise engineering
University of Antwerp · BE
2015 — 2018 · PhD
Information Systems Science
Digital Security Institute · joint doctorate with Antwerp
Radboud University · Nijmegen · NL
Jul 2022
Innovative Technology Leader
Graduate School of Business — executive programme
Stanford University · California · US
2011 — 2013 · MSc
Business Research Methods
Master's degree
Maastricht University · NL
2013 — 2014 · Post-Master
Case Study Research
Rijksuniversiteit Groningen
University of Groningen · NL
Studies
Computer Science
Utrecht University · NL
Chapter III.b · Professional certifications
Formal credentials — verifiable, renewed, and in current use.
AAIA™
Advanced in AI Audit
Specialist credential for auditing enterprise AI systems — risk, governance, controls.
ISACA®
CISA
Certified Information Systems Auditor
Long-standing global standard for IT audit, control and assurance professionals.
ISACA
CISM
Certified Information Security Manager
Enterprise-grade credential for information-security governance and management.
ISACA
SABSA F.
SABSA Certified Foundation
Business-driven security architecture — the SABSA method for risk-aligned security design.
SABSA Institute
Chapter IV · Teaching
Executive programmes designed, built, and still taught.
2018 · Designed
Executive Master in Cybersecurity & Risk Management
A graduate programme for senior executives navigating enterprise security, governance and digital risk — architected from first principles by Yuri and still delivered at Antwerp Management School.
Antwerp Management School · Ongoing
2025 · Designed
Executive Master in Audit & Assurance
Designed for the next generation of audit & assurance leaders — combining IT audit, governance, and regulatory craft with the executive posture required to sign for it.
Antwerp Management School · Ongoing
Since 2016
100+ Master's theses supervised
Graduate research directed at the intersection of information security, governance, digital transformation and AI — producing the next generation of practitioner-academics.
Antwerp Management School · NOVI · LOI
Ongoing
Zero Trust as a Service — ZTAAS
Co-developed at ON2IT: a model to measure and monitor Zero Trust implementations at enterprise scale. Serving US community banking, FinTech, M&A and regulated industries — expanding through the Middle East and Asia in 2025.
ON2IT · US · ME · APAC
Chapter V · In print
The work, in hardback.
2025Implementing DORA in FinTech — From regulatory requirements to technologyeBook · Digital Operational Resilience Act
2024Digital Security LeadershipAuthor · Follow-up to Leading in Digital Security
2023Exploring Skills and Capabilities for Digital Value CreationAuthor · Preface by Amir Arooni & Ron Meyer
202225 Years of Group Support Systems — From Fata Morgana to Silver BulletMeetingwizard · Contributor · Retrospective
2021Strategic Approaches to Digital Platform Security AssuranceIGI Global · Contributed volume
2020Leading in Digital Security — Twelve Ways to Combat the Silent EnemyAuthor · CISO leadership · second ed. 2023 · ISBN 9789090335131
—CISO HandbookAuthor · Reference
2018Improving the Maturity of Business Information SecurityRadboud University Press · PhD dissertation
2018Critical Success Factors for effective Business Information SecurityDialoog Publishers · Author
2018Cybersecurity in 60 MinutenHaystack Publishing · ISBN 9789461263032 · Nederlands
2014Hoe veilig is mijn "aandeel"? — Het borgen van vertrouwen, reputatie & continuïteit met MBIS272 pp · ISBN 978-90-9028711-9 · Nederlands
2010Maturing Business Information SecurityManagementboek · Foundational MBIS framework · 256 pp
Chapter V.b · Selected publications
Peer-reviewed papers & articles.
More than 100 publications across Springer, IEEE, ISACA Journal, AMS,
FAIR Institute, AG Connect, Platform van Informatiebeveiliging,
Financieel Dagblad and other peer-reviewed venues, from 2008 to 2026.
The full bibliography lives on Yuri's
Academia.edu profile.
Selected highlights below.
2026
Apr 2026The Value of the Cyberrisk Agent in M&AISACA Journal
Apr 2026Decisions on Cybersecurity Investments — A Pyramid Approach to Return on Security Investments (ROSI)ISACA Journal
Jan 2026Zero Trust in Agile Development — Results of an Agile Software Assurance Benchmark Related to Zero TrustSpringer
Jan 2026From Gut Feel to Gains — The Cybersecurity ROI PyramidFAIR Institute
2026Zero Trust That Works — Measured, Assured, and Governed for 2026Research paper
2026What Boards Are Asking — The CIO, CFO & CISO Response for 2026: The 7 Shifts That Will Define the Future of Leadership in Tech & FinanceBoard-level briefing
2025
Dec 2025The Future of Cyber Insurance — From Reactive Reimbursement to Risk-Based ResilienceISACA Journal
Oct 2025From Gut Feel to Gains — The Cybersecurity ROI PyramidAntwerp Management School
Sep 2025On Improving the Adoption of Cyber Risk QuantificationAntwerp Management School
Jul 2025BOOK — Implementing DORA in FinTech: From regulatory requirements to technologyeBook · Digital Operational Resilience Act
May 2025The Knowing-Doing Gap in Digital Security — Three Takeaways to Close the GapISACA · with Barry Derksen
Feb 2025Flipping the Classroom — How Group Support Systems Revolutionize Teaching and LearningMeetingwizard
Jan 2025Hoofdstuk 10 in boek: Digitale Transformatie bij een zorginstelling — Aan de slag met kennis en leiderschapBSL Media · Nederlands
2025The Value of Diversity and Inclusion in CybersecurityISACA Journal · with Bas van Gils
2025How Zero Trust Reduces Cyber Risks and Lowers Cyber Insurance PremiumsResearch paper · with Tim Timmermans (ON2IT)
2025Performance Management in Information SecurityAntwerp Management School
2025Data-driven learning and evaluation — a new approach to education and researchAG Connect · with Hans Mulder
2024
Sep 2024How Companies Can Deal with the Increase of EU Tech RegulationsISACA
Sep 2024NIS2 — Wat moet ik ermee?AG Connect · Nederlands
Jul 2024Overcoming the Fear of Missing Out on Data — On Exploring Practices to Become and Remain Data-Fit through Empirical ResearchSpringer
Jul 2024Tech Regulations — How to Relieve the Burden of Supervisory Bodies and Reduce Risk for InvestorsISACA Journal Global
Jul 2024De toekomst van Governance, Risk en ComplianceRisk en Compliance Platform · Nederlands
Jul 2024BOOK — Digital Security LeadershipRon Meyer preface · follow-up to Leading in Digital Security
Feb 2024How to Gain More "Bang for the Buck" — Quantifying Risk with Random SimulationsISACA
Jan 2024The Nuts and Bolts of Achieving Security Compliance in Financial ServicesISACA
2024On a Zero Trust Architecture Approach, Repository & Management Model for Compliance with Industry Frameworks and RegulationsSpringer · with Tim Timmermans
2024How the Concept of "Test Once Comply Many" Helps Organisations ComplyRegulatory compliance
2023
Dec 2023An Exploration of AI Risk & Collaborative Assessment MethodologyISACA Journal
Dec 2023How to Deal with "Digital Assurance"Online essay
Dec 2023The Compensation Trap — Why Less Cybersecurity Staff is MoreISACA Journal
Dec 2023Tech Regulations — How to Relieve the Burden of Supervisory Bodies and Reduce Risk for InvestorsOnline essay
Nov 2023How Zero Trust as a Service (ZTaaS) Reduces the Cost of a Breach — A Conceptual ApproachProceedings of the Future Technologies Conference (FTC) 2023, Vol. 4
Feb 2023BOOK — Exploring Skills and Capabilities for Digital Value CreationPreface by Amir Arooni and Ron Meyer
2023Collaboration Engineering with Group Support SystemsBook chapter
2022
Dec 2022Five Things Digital Security Leaders Can Learn from Elon Musk's Twitter Takeover12Ways
Dec 2022Influential Trends for Emerging Roles in Digital Security — 2023 and BeyondLinkedIn article
Aug 2022Conference Paper — Zero Trust Validation: from Practical Approaches to Theory29th Annual IEEE Software Technology Conference (STC 2022)
May 2022Conference Paper — Perspectives from 50+ Years' Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry PromisesComputing Conference 2022 · Springer LNNS
Mar 2022BOOK — 25 Years of Group Support Systems: From Fata Morgana to Silver BulletMeetingwizard.nl
Jan 2022Conference Paper — Leveraging Zero Trust Security Strategy to Facilitate Compliance to Data Protection RegulationsComputing Conference 2022 · Springer LNNS
Jan 2022Conference Paper — On the Empirical Validation of a Zero Trust Security Framework via Group Support System ResearchSpringerLink · IEEE Computer Conference London
Jan 2022Conference Paper — How Zero Trust as a Service (ZTaaS) Reduces the Cost of a BreachSpringer
Jan 2022Article — Digital Security Requires a Complete LeaderAGConnect
2022Cut Compliance Bureaucracy with "Test Once, Comply Many" & "Tech Assurance Statements"Policy / practice paper
2021
Apr 2021BOOK — Strategic Approaches to Digital Platform Security AssuranceIGI Global
Mar 2021Conference Paper — On the Design and Engineering of a Zero Trust Security ArtefactFuture of Information and Communications Conference (FICC) · with Jeroen Scheerder
Mar 2021Article — 25 Years of Meetings, From Fata Morgana to "Silver Bullet"Meetingwizard
2021Problems of CI/CD and DevOps on Security ComplianceIGI Global · Advances in Information Security, Privacy & Ethics
2021Findings and Core Practices in the Domain of CI/CD and DevOps on Security ComplianceIGI Global
2020
Aug 2020BOOK — Leading in Digital Security: Twelve Ways to Combat the Silent EnemyManagementboek · ISBN 9789090335131
Mar 2020Conference Paper — LockChain Technology as One Source of Truth for Cyber, Information Security & PrivacySAI Conference
Mar 2020Journal Paper — Zero Trust Validation: From Practical Approaches to TheoryScientific Journal of Research and Reviews · DOI 10.33552/SJRR.2019.02.000536
2020Organizing Viable Information Security Governance and ManagementZenodo
2019
Dec 2019Journal Paper — Cybersecurity Readiness: An Empirical Study of Effective Cybersecurity Practices for Industrial Control SystemsScientific Journal of Review and Research · Iris Publishers · 200 practitioners across Europe, Asia, Americas
Nov 2019Biggest Bang for the Security Buck — What Kind of Conversations Do Cybersecurity Vendors Need to Have with the CISOs of Large Organizations?ZeroTrust Magazine
Nov 2018Security als vaccinatieICT Magazine · Nederlands
Nov 2018Vergadersoftware kan beveiliging verbeterenAGConnect · Nederlands
Aug 2018BOOK — Cybersecurity in 60 MinutesHaystack Publishing · ISBN 9789461263032
Aug 2018BOOK — Critical Success Factors for Effective Business Information SecurityDialoog Publishers
Jul 2018BOOK — Improving the Maturity of Business Information Security: On the Design and Engineering of a Business Information Security ArtefactRadboud University Press · PhD dissertation
Apr 2018Enterprise Engineering in Business Information Security — "A Case Study in Security, Risk and Compliance Artefact Engineering"Enterprise Engineering Working Conference 2018 Luxembourg · IEEE Springer
2017
Dec 2017Cyber Security Insurance — A Study on Establishing an Artefact to Discover, Identify, Mitigate Cyberrisks and to Examine the Economic Evaluation of Underwriting PremiumsPending publication · ISACA Journal
Jul 2017On Exploring Research Methods for Business Information Security Alignment and Artefact EngineeringInternational Journal of IT/Business Alignment and Governance (IJITBAG)
Jun 2017The State of the Art of Business Information Security Artefact Engineering — Using Design Science Research for Artefact EngineeringHawaii International Conference on System Sciences
Apr 2017Exploring Research Methods for the Design and Engineering of a Business Information Security ArtefactEnterprise Engineering Working Conference (EEWC) Forum 2017 · Antwerp
Mar 2017Jonge Jongens (interview)ViaGroup · book chapter by Theo Mulder
May 2017Never Waste a Good Incident — An Explorative Study into Critical Success Factors for the Improvement of Business Information SecurityISACA Journal
2017Cyber Security: Fact and FictionAntwerp Management School
2016
Nov 2016Boardroom Dynamics — Group Support for the Board's Involvement in a Smart Security Decision-Making ProcessISACA Journal Vol. 5 2016
Oct 2016Why Do IT Governance and Information Security Governance Practices Fail?ISACA Journal 2016
Oct 2016Cybersecurity within NN Group — The Role of the CISONN Group
May 2016The "Seven Habits of Highly Effective CISOs"IB Magazine #5
May 2016CISO SpecialIB Magazine #5 · Guest chief editor
May 2016Vergaderen om te besluiten — Het gebruik van een Group Support System in InformatiebeveiligingInformatiebeveiliging magazine · Nederlands
May 2016Competentie management op basis van learning analyticsOB Magazine #5 · Nederlands
2015
Dec 2015Governance Practices and Critical Success Factors Suitable for Business Information Security2015 IEEE International Conference on Computational Intelligence and Communication Networks · Jabarpul, India · IEEE Xplore
Aug 2015Cybersecurity in de bestuurskamerPlatform voor Informatiebeveiliging #5 · Nederlands
May 2015De CISO van de toekomstPvIB Magazine #3 · Nederlands
May 2015Book review — Hoe veilig is mijn "aandeel"?Platform for Information Security Magazine · Nederlands
Mar 2015Cybersecurity in de boardroom — Wat beweegt bestuur en commissarissen?De IT Auditor / NOREA · Nederlands
Mar 2015De Chief Information Security Officer van morgen — op zoek naar een duizendpootInfoSecurity Magazine · Nederlands
Feb 2015Porters' Elements for a Business Information Security StrategyISACA Journal, Volume 1, 2015 · USA
Feb 2015Governance Practices and Critical Success Factors Suitable for Business Information Security — A Literature and Security Expert Validation2015 ICCSCSA Conference · South Korea
2014
Nov 2014It's Time to Get Our Hand Out of the SandISACA Journal Q1 2015
Nov 2014BOOK — Hoe veilig is mijn "aandeel"?272 pp · ISBN 978-90-9028711-9 · Nederlands
Nov 2014Van straffen naar belonenBOOK: Hoe veilig is mijn aandeel? · Nederlands
Apr 2014Schoenmaker blijf bij je leestPlatform voor Informatiebeveiliging Magazine · Nederlands
Mar 2014De discutabele rol van de accountantDNU · Nederlands
2013
Sep 2013Veiligheid als concurrentievoordeelFinancieel Dagblad · Nederlands
Jan 2013Group Support Systems Research in the Field of Business Information Security — A Practitioner's View2013 46th Hawaii International Conference on System Sciences (HICSS) · IEEE Computer Science USA
2012
Dec 2012Kroonjuwelen slecht beveiligdICT Magazine · De Nederlandse Uitgeefgroep · Nederlands
Sep 2012Goed huisvaderschap in strijd tegen cybercrimePlatform van Informatiebeveiliging Magazine · Nederlands
Aug 2012Sterke concurrentiekracht met gedegen IT risk managementFinance & ICT Magazine · Nederlands
Jun 2012Business Strategy and Applications in Enterprise IT Governance (chapter 14) — A Research Journey into Maturing the Business Information Security of Mid-Market OrganizationsIGI Global · USA
Mar 2012Preventieve aanpak tegen cybercriminaliteitFinancieel Dagblad · Nederlands
2012Er is niets zo praktisch als een goede theoriePlatform van Informatie Beveiliging magazine · Nederlands
2008 — 2010 · Foundational work
Oct 2010A Research Journey into Maturing Business Information SecurityInternational Journal of Business and IT Alignment and Governance 1(4)
Jul 2010BOOK — Maturing Business Information Security: A framework to establish the desired state of security maturityManagementboek · 256 pp
Oct 2009Use of Demo as a Methodology for Business and Security AlignmentPvIB Magazine
Jul 2008Verantwoordelijkheid voor virtualisatie en beveiligingPvIB Magazine · Nederlands
Chapter VI · Recognition
A shelf of laurels — carried lightly.
2025
ISACA Inspirational Leadership Award
For sustained contribution to digital-security leadership.
2023 · 2024
Belgium Cybersecurity Awards — finalist
Nominated two consecutive years in the category Researcher of the Year.