Programme outline
There will be a plenary programme as well as optional breakout sessions dealing with various topics. ONE Conference 2022 promises a full programme of in-depth sessions, workshops, panels, and lightning sessions. The programme outline will be updated continuously and will be subject to changes. For more information about the sessions and speakers, click on the sessions.
Programme PDF Downloads:
18 October
19 October
Willem-Alexander
10:00
Opening address
Technical level
Track:
Main Stage
10:10
For innovation in cybersecurity, collaboration across the value chain is necessary, but not always that obvious. To develop new solutions at high speed, more synergy is needed between all the actors in the field. During […]
Technical level
Track:
Main Stage
11:00
The cyber issue of the year is clearly Russia’s destructive cyber attacks against Ukraine, and its intelligence-gathering efforts against Ukrainian allies. In the session we will talk about our Microsoft Digital Defense Report, looking at […]
Technical level
Track:
Main Stage

All sessions 

11.40

11:40
The VNG, Common Ground movement and the Municipality of The Hague together developed innovation in the field of access management. This brings opportunities for interoperability between municipalities, citizens, businesses and chain partners and evolved from […]
Technical level
Track:
Innovation
11:40
The vulnerability searching process requires a lot of time. If you want to cover all the perimeter in an appropriate amount of time and get valuables, automation of routines is one of the cornerstones, that […]
Technical level
Track:
Technical
11:40
Bitcoin mixing is one of the preferred methods criminals use to cash-out dirty crypto’s. As many criminal entrepreneurs leverage crypto currencies in transacting with ‘customers’ – from online drug trade to bullet-proof hosting and ransomware […]
Technical level
Track:
Law enforcement
11:40
One of the pillars of NCSC is sharing knowledge with its target groups and cooperation partners. The research team contributes to the NCSC mission of "understanding, connecting and preventing" by interpreting scientific developments in the […]
Technical level
Track:
Research
11:40
"Don't click links". "Never use public Wifi". Many of us in infosec have yearly awareness campaigns in which we try to teach our collegues security awareness. However, one could argue that the way we go […]
Technical level
Track:
Main Stage
11:40
As new laws and regulations around the world address the role (and accountability) of cybersecurity in the boardroom, understanding how to maximise threat intelligence beyond the SIEM is essential for all types of businesses. While […]
Technical level
Track:
Governance
12:10
Technical level
Track:
Innovation Expo
12:10
Short talks (5 min) about relevent and recent developments in Cybersecurity.The sessions will be made in rapid succession. Afterwards, there will be an opportunity to meet the speakers and to discuss the subject further.
Technical level
Track:
n.a.

All sessions 

13.00

13:00
Automation has been highly used as a mean to enhance the capabilities of security engineers, either to preserve them from routine tasks or to expand their scope of action. It has so far mostly revolved […]
Technical level
Track:
Main stage
13:00
This presentation outlines a long-neglected aspect in the fight against cybercrime; the human factor. We will detail the findings from unique and insightful interviews with technically skilled high profile cyber offenders and outline how a […]
Technical level
Track:
Law Enforcement
13:00
The amount of data is growing by the day, processing this data requires more and more time and labor. IT forensics departments also starting to notice this. Manually processing data to find answers requires a […]
Technical level
Track:
Technical
13:00
The Digital Trust Center has been assigned the task to inform Business in The Netherlands on security risks in their network and informationsystems. One of the most challenging parts of this task is to actually […]
Technical level
Track:
Governance
13:00
Security is broken. Traditional monitoring systems are limited in efficiency and performance, digital identities are exposed by fraudulent links, and our existing solutions are vulnerable to the anticipated rise in commercial quantum computing. In Smart […]
Technical level
Track:
Innovation
13:00
Security monitoring systems detect potentially malicious activities in IT infrastructures, by either looking for known signatures or for anomalous behaviors. Security operators investigate automatically generated events to determine whether they pose a threat to their […]
Technical level
Track:
Research

All sessions 

13.40

13:40
Proof-of-concept (PoC) exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and they facilitate red teaming tasks. In the recent years, PoCs have been […]
Technical level
Track:
Technical
13:40
This presentation will discuss the vulnerability prioritization process of organizations for Industrial Control Systems. We looked into the vulnerability management processes of multiple organizations and analyzed which factors are relevant to determine the risk of […]
Technical level
Track:
Research
13:40
On the 2nd July 2021 REvil launched a worldwide ransomware attack through a zero-day in the Managed Service Provider software KaseyaVSA. What only few people knew then, was that the Dutch Institute for Vulnerability Disclosure […]
Technical level
Track:
Main Stage
13:40
During the protest on Maidan in Kiev (2013) the world has seen a huge surge in propaganda campaigns done by Russian troll farms. In the US we witnessed huge MAGA troll farms. In the last […]
Technical level
Track:
Innovation
13:40
A ransomware group extorts victims by threatening to publish their personal data and by blocking access to it. In February 2022, during the conflict between Russia and Ukraine, a Ukrainian security researcher under the alias […]
Technical level
Track:
Law enforcement

All sessions 

14.00

14:00
OT Security has become a topic of interest for many organizations in various segments, like manufacturing, chemicals, utilities and oil and gas industry. Everyone knows this encompasses legacy systems, lack of patching and to some […]
Technical level
Track:
Governance

All sessions 

14.20

14:20
What is the impact of a ransomware incident? We hear stories of having no IT for 23 days on average, of loss amounts per day, of ransom demands in the millions. This is all part […]
Technical level
Track:
Law enforcement
14:20
Feeling secure after having switched to multifactor authentication? Well, we may have bad news for you. Phishing attacks are becoming more sophisticated, and common multifactor techniques such as TOTP may not be sufficient anymore. But […]
Technical level
Track:
Main Stage
14:20
Today's cyber security products rely heavily on shared Indicators of Compromise, IoCs. These pieces of Cyber Threat Intelligence (CTI) are typically malicious IP addresses, file hashes or URLs that are fed into firewalls or other […]
Technical level
Track:
Research
14:20
This year we won the world renowned Pwn2Own Miami contest by demonstrating five zero-day attacks against commonly used software in the ICS world. Due to the war in Ukraine ICS security is a hot topic. […]
Technical level
Track:
Technical
14:20
The presentation will guide audience through a complete ICS attack vector aimed at compromising critical infrastructure operator organization. It will leverage a thorough case study of attack on smart meters and advanced metering infrastructure. It […]
Technical level
Track:
Innovation

All sessions 

14.40

14:40
The European Cybersecurity Certification Framework is a Framework of cybersecurity certification schemes that aims to encourage cybersecurity and enhance the level of cybersecurity for ICT products, ICT services and ICT processes in the Union for […]
Technical level
Track:
Governance

All sessions 

15.00

15:00
Secure communications are the key to digitalization, ensuring trust in the systems we use every day and the integrity of the data they rely upon. Cryptography is one of the means to ensure secure data […]
Technical level
Track:
Innovation
15:00
The ransomware landscape has been changing over the past few years. In our study, we analyzed 453 ransomware attacks reported to the Dutch police from 2019 to 2022. Our aim was to understand what determines […]
Technical level
Track:
Law enforcement
15:00
WICCA is a circle of women in cybersecurity based in The Netherlands with a vision to spread the infosec word to everyone. We want to bring female cybersecurity professionals and security enthusiasts together and create […]
Technical level
Track:
Main Stage
15:00
We tracked the largest volunteer security information sharing community known to date: the COVID-19 Cyber Threat Coalition, with over 4,000 members. This enabled us to address long-standing questions on threat information sharing. First, does collaboration […]
Technical level
Track:
Research
15:00
GDPR compliance is often seen as a legal exercise. In this session I will share technical know-how from the analysis in high profile DPIAs. I will explain how similar investigations can be performed in a […]
Technical level
Track:
Technical
Amazon Foyer
15:30
Short talks (5 min) about relevent and recent developments in Cybersecurity.The sessions will be made in rapid succession. Afterwards, there will be an opportunity to meet the speakers and to discuss the subject further.
Technical level
Track:
n.a.
Willem-Alexander
16:00
Inadequate security controls monitoring traditional technology, unknown vulnerabilities in sophisticated digitalization, overwhelming amounts of additional data, as well as numerous psychological and cultural factors – just to name some challenges… What to do, what to […]
Technical level
Track:
Main Stage
Willem-Alexander
16:30
Closing remarks.
Technical level
Track:
Main Stage
17:00
Both days will end with Network Drinks
Technical level
Track:
n.a.
downloadmagnifier