Security Through Trust Not Control: Europe’s Battle Plan
Europe is at war with its own digital legacy. Having pioneered data protection in 1995 and redefined global privacy standards with GDPR in 2016, the EU now risks undermining its achievements through increasingly absolutist regulatory proposals. The 2025 ProtectEU strategy aims to mandate encryption backdoors, France is pushing mandatory 72-hour data decryption for narcotrafficking investigations, […]
You’re not secure by design, if you’re not memory safe!
What if 70% of all vulnerabilities in the critical infrastructure of tomorrow could be prevented with one simple decision? Memory safety is not just an implementation detail that only engineers should talk about; it is a crucial requirement for building software that is safer and more secure by design. In this talk, we’ll explore what […]
Why do we underestimate ourselves in a digital world?
The human factor in cybersecurity is often portrayed as a flaw to be corrected. But in reality, the uniquely human abilities of emotional and informational intelligence—our capacity to read intent, detect manipulation, apply intuition, and judge nuance—are the very strengths we need most. In the rush for AI, automation, and scalable defenses, we risk neglecting […]
Why Compliancy Won’t Protect Reputation – and What Will.
For executives and senior professionals navigating the complexities of digital responsibility, this workshop offers a pragmatic roadmap to establishing effective cyber governance. Because in the end, it’s not just about compliance — your reputation is on the line. We go beyond checklists and delve into how to structure cyber governance strategically: goal-oriented, aligned with your […]
We need to talk about…patching
Most organizations have a formal patching policy. This is also a requirement under both DORA and NIS2. Research shows that most patching policy contain deadlines within which the different categories of vulnerabilities must be patched. But only some of these organizations can actually measure whether they comply with their own policy. Paradoxically, it is therefore […]
Transparency as a Security Control: Rebuilding Trust in Technology
As governments increasingly deploy powerful digital tools—biometrics, surveillance AI, predictive analytics—the public trust in those same institutions is eroding. Transparency is often framed as a communications exercise or regulatory compliance task. But what if we treated it as a core cybersecurity control? This session explores real-world models of proactive transparency, where government agencies have used […]
The governance of the PQC transition in the EU
This intervention will analyse the aspects of the governance of the PQC transition in the EU. It will explore the relevant provisions in the EU legal acts containing general implicit requirements to adopt PQC (e.g. NIS2, CRA, GDPR, DORA, eIDAS2 and other) and how they are complimented by the various policy documents making specific references […]
ReArming Europe: Cyber Sovereignty Starts Now
Europe faces a decisive moment in cybersecurity. As digital threats escalate and alliances shift, the question is whether Europe will lead in cybersecurity or stay dependent. The EU’s ReArm Europe / Readiness 2030 shows intent, but funding alone won’t deliver sovereignty. Drawing on experience from U.S. Cyber Command, NSA, and the Defense Intelligence Agency, and […]
It only takes a beer coaster to measure cyber resilience
It only takes a beer coaster to measure your cyber resilience. By comparing your organization with four levels of maturity characteristics in three different themes (people, processes and technology), printed on the back side of a beer coaster, you can get a general idea of your maturity and corresponding cyber resilience.
It’s One Kingdom. Let’s Start Defending Like It.
Aruba is part of the Kingdom of the Netherlands — but when it comes to cybersecurity, we don’t always act like one Kingdom. We all face similar challenges, especially when it comes to limited capacity and resources. Instead of trying to solve everything on our own, why not lean on each other more? Meanwhile, cybercriminals […]