Cyber Diplomacy Through the WiC Fellowship
How can we build a safer, more inclusive cyberspace? This 20-minute session will explore the transformative impact of the Women in International Security and Cyberspace (WiC) Fellowship – a pioneering programme jointly supported by seven governments and facilitated by the Global Forum on Cyber Expertise (GFCE). With over 110 women from 55 underrepresented, small, and […]
Cyber Security Assessment Netherlands 2025
The Cyber Security Assessment Netherlands (CSAN) provides insight into threats, interests and resilience in relation to cyber security and the effect these factors have on national security. The CSAN is published annually by the National Coordinator for Counterterrorism and Security and is written in cooperation with public and private partners. The CSAN2025 will be published […]
Defending Europe against DDoS in a multi-polar world
This presentation examines the evolving nature of Distributed Denial of Service (DDoS) attacks as tools of hybrid warfare and proposes a collaborative European defense strategy. We provide analysis of how DDoS attacks have transformed from mere technical nuisances, to potentially disturbing tools which can cause major disruption illustrated by the attacks in 2018, to strategic […]
Defending Olympus – On the sidelines of cyberwarfare
You are taking the role of the CISO of NeuroNexis, founded in 2037, Your company has developed a breakthrough product that allows users to upload and download information from human to device. This product, the Zeus Microchip, has just passed government approval and has both tremendous civilian and military applications. NeuroNexis has received a windfall […]
Discussion: teaching ethics to (future) IT professionals
As society is digitalizing and we depend more on technology, securing IT systems and preventing the abuse thereof is increasingly becoming more important. To protect these systems, there is a need for cybersecurity professionals and ethical hackers that build in security and test the safety of systems. However, learning how systems can be protected oftentimes […]
Does your future cyber workforce have what it takes?
Does your future cyber workforce have what it takes? How to attract multidisciplinary cyber talents in a fast changing digital world. In light of the current developments, the demand for cybersecurity talents and profiles is becoming increasingly diverse, which requires a completely different approach in attracting those talents. A recently published report in 2024 commissioned […]
“Face Value: A Deepfake Crisis”
“Face Value: A Deepfake Crisis” is an interactive crisis simulation designed to immerse cybersecurity professionals in a high-stakes scenario triggered by a deepfake attack. As artificial intelligence continues to evolve, deepfakes are becoming increasingly sophisticated, posing a serious threat to organizational security and reputation. In this 50-minute session, participants will take on critical C-level roles—such […]
Bridging the CRA Gap: Lifecycles vs. Expectations
The upcoming Cyber Resilience Act (CRA) requires manufacturers of smart products to produce cyber-resilient products and uphold cyber resiliency during their lifecycle by supporting them for their expected use time. But what do consumers actually consider a “reasonable” use time – and which cyber risks arise when societal expectations outlast manufacturer support? In this talk, […]
AP vs 32000 data breaches: Supervision & Lessons learned
How would you deal with 32.000 data breaches per year? Two inspectors of the Dutch Data Protection Authority (AP) will provide a unique insight into the inner workings of the AP as an actor within the cyber security field. First we give insights into the AP as an organization and discuss how the AP handles […]