Call for Participation
Call for Participation
The Dutch Government and the Municipality of The Hague cordially invite you to submit your proposal to contribute to the ONE Conference 2025 programme.
As the Netherlands’ prime international cybersecurity conference, the ONE Conference covers a wide spectrum of topics, from technical cybersecurity to policy issues and economic opportunities offered by the cyber domain. Experts from business, academia, industry, and government will come together to share insights and explore the latest developments in cybersecurity.
Our mission is to foster knowledge exchange and collaboration within the international cybersecurity community. Participants include professionals from the CERT community, academia, public and private sector security experts, and key partners from law enforcement and intelligence agencies.
This year, we are introducing additional smaller session rooms to provide a platform for niche topics, deep dives, and interactive discussions.
We encourage you to think differently and bring fresh ideas to the stage. Submit your proposal and be part of this leading cybersecurity event!
A separate call is open for participation in the Expo. If you are a start-up looking to showcase your work at ONE Conference, submit your details here.

Themes
There are diverse themes that could be addressed at the ONE Conference 2025. Below you will find our suggested themes for this year:
- Future of cybersecurity: Explore the cutting-edge advancements in cyberscience, research, AI, and cloud technologies. Delve into the latest innovations and developments that are shaping the future of cybersecurity and understand how these technologies are being leveraged to create more a secure digital world.
- Tags: Innovation; Emerging technology; Research; AI; Cloud
- Power of partnerships: Discover the impact of public-private partnerships (PPP) and joint initiatives in enhancing cybersecurity. Learn about successful collaborations between governments, businesses and other organizations and how these partnerships are driving collective efforts to combat cyber threats.
- Tags: Partnerships; Public-Private; Joint initiatives; Collaboration
- Law & Policy: Navigate the complex landscape of cybersecurity regulations and laws (such as NIS2, DORA, NETCode, CBW, GDPR, CSA, CRA, AI act). Subjects are, for example, law enforcement , standards, the challenge/mismatch between the development of cybersecurity and (pending) regulation.
- Tags: Regulations; Compliance; Laws; Law Enforcement; Standards; Ethics
- Crisis management: Gain insights into effective incident response and crisis management strategies. Learn from past cyber incidents, understand the impact and responsibilities during a crisis and explore best practices for communication, recovery and resilience.
- Tags: Incident Response; Crisis management; Recovery; Resilience; Communication
- Securing the chain: Examine the critical role of cybersecurity in the supply chain and third-party relationships. Focus on securing operational technology (OT), conducting risk assessments and implementing risk management strategies. Learn about designing secure products with security by design/default principles.
- Tags: Supply Chain; Third Parties; Risk Management; Security by Design; Operational Technology
- Geopolitics: Investigate the intersection of cybersecurity and geopolitics, covering issues such as (digital) sovereignty, offensive cyber capabilities, hybrid warfare and defense. Explore the role of big tech in combating disinformation and the protection of critical infrastructure against espionage and advanced persistent threats.
- Tags: Geopolitics; Sovereignty; Offensive Cyber; Hybrid War; Critical Infrastructure; Disinformation
- Human factor: Address the human element in cybersecurity, focusing on talent, neurodiversity, education and the various roles within the field. Discuss the challenges of staff shortages, the talent gap and explore the impact of human behavior on cybersecurity in a digital society.
- Tags: Talent; Education; Neurodiversity; Human Factor; Skills Gap, Diversity and inclusion; Career development
- Core of Tech: Take a deep dive into advanced cybersecurity topics, including advanced threats, attack techniques and investigation methods. Learn about encryption and decryption techniques and the latest detection methods to stay ahead of cyber threats.
- Tags: Advanced Threats; Attack Techniques; Encryption; Detection; Law Enforcement
Guidelines
The ONE Conference always receives many high-quality proposals, and we can unfortunately not always accommodate as many entries as we would like. You can increase your chances of success by using the guidelines below to make your entry stand out.