National roles and responsibilities in cybersecurity
Cybersecurity is a shared responsibility. A clear and maintained overview of roles and responsibilities of the many involved stakeholders is therefore fundamental to an effective national cybersecurity strategy. During the presentation, an approach for clearly defining the distinct domains of Cyber Security, Cyber Law Enforcement, Cyber Defense, and Cyber Diplomacy will be explained. Where do […]
NCSCs and Scientific Research
Incident Response is a highly advanced technological field that draws, ideally, from state-of-the-art scientific research in cyber security. Historically, incident response emerged from this scientific research field and for long there was a close bond between (national) cybersecurity and research in many countries across the world. However, due to the growth of the field in […]
Operation PowerOFF: the power lies in the data
Operation PowerOFF is an ongoing operation focusing on the criminal DDoS-for-hire market. The objective? A sustaining impact on the global criminal ddos-for-hire marketplace by targeting the infrastructure, administrators and users through a maintained international law enforcement collaboration. By focusing on enforce, data collection and prevent measures, the whole DDoS ecosystem is included in the approach.
Outlook One Financial Threat Landscape
The FI-ISAC is pleased to present the One Financial Threat Landscape. FI-ISAC. Through collaboration, we create the One Financial Threat Landscape. The One Financial Threat Landscape provides insight into the 10 biggest threats facing our industry. It is a product created by the financial sector, used by the financial sector, but delivering value across the […]
PQC Migration Survival Panel (Now with 90% Less Anxiety)
The Quantum Computer is on its way, and it is here to stay! The technical development in the field of Quantum Computing is growing quickly and experts expect to see a Cryptographic Relevant Quantum Computer (CRQC) within 10 to 15 years. The CRQC can weaken, and in some specific cases, break widely used algorithms, rendering […]
Stop hiring unicorns: match leadership and organisation
The cybersecurity world talks endlessly about the skills gap, but what if the real issue is a fit gap? In an industry obsessed with job titles and hard skills, we forget a basic truth: there is no single, ideal CISO profile. Every organisation is different; its business goals, risk appetite, digital maturity, culture and their […]
The Attribution Minefield in Ransomware Investigations
Ransomware attacks pose a growing threat to both digital and physical infrastructures. When a ransomware incident occurs, victim organizations often face pressure to restore operations quickly—even if that means paying the ransom. However, payment introduces serious legal and financial risks: if the attacker is a sanctioned entity, making a payment could result in violation of […]
Hack the mind: the power of storytelling in cyber
In cybersecurity, data informs — but stories transform. You can speak in numbers, but no one remembers the spreadsheet. For CISOs and security leaders, turning complex risk into clear, human action is what actually moves the needle. Long reports? Ignored. Controls? Misunderstood. People? Tuned out. This session goes where most don’t: storytelling as a leadership […]
Hyperconnected Supply Chains: Attacking Cyber Resilience
Cyber resilience is under attack. As global supply chains become increasingly hyperconnected, the convergence of Operational Technology (OT), IT, AI, and Industrial IoT (IIoT) is exposing new vulnerabilities. The Netherlands, a key hub for maritime logistics, energy, and critical infrastructure, is at the centre of these risks, facing a growing wave of cyber threats—from state-sponsored […]
How can we inspire Gen Z to become ethical hackers?
With $23.8 trillion forecasted to be lost to Cybercrime in 2027 and 80% of NYC teenagers having hacked by age of 16, we are facing a generational crisis. The Hacking Games will inspire, educate and equip this generation to be defenders and not attackers. During our panel, we will discuss the challenges faced with a […]