A1 Cyber Attack 2020 – Lessons Learned
A1 is the biggest telecommunications provider and incumbent operator in Austria. I will briefly explain the major cyberattack against A1 in Austria and our response. The defense was very complex and took a lot of planning and preparation. On the one hand, we had to regain complete control of our office infrastructure, on the other […]
It only takes a beer coaster to measure cyber resilience
It only takes a beer coaster to measure your cyber resilience. By comparing your organization with four levels of maturity characteristics in three different themes (people, processes and technology), printed on the back side of a beer coaster, you can get a general idea of your maturity and corresponding cyber resilience.
Cognitive Readiness for Cyber Disruptions
Cyber disruptions are rarely clear-cut. Impact is often uncertain, timelines unclear, and threats evolve quickly. Teams must make decisions under pressure, ambiguity, and while suffering from fatigue. Yet, cybersecurity as a domain continues to underestimate the role of human performance capabilities and limitations in detection, response, and recovery. This talk introduces a cognitive readiness framework […]
Defending Olympus – On the sidelines of cyberwarfare
You are taking the role of the CISO of NeuroNexis, founded in 2037, Your company has developed a breakthrough product that allows users to upload and download information from human to device. This product, the Zeus Microchip, has just passed government approval and has both tremendous civilian and military applications. NeuroNexis has received a windfall […]
“Face Value: A Deepfake Crisis”
“Face Value: A Deepfake Crisis” is an interactive crisis simulation designed to immerse cybersecurity professionals in a high-stakes scenario triggered by a deepfake attack. As artificial intelligence continues to evolve, deepfakes are becoming increasingly sophisticated, posing a serious threat to organizational security and reputation. In this 50-minute session, participants will take on critical C-level roles—such […]
Bits, Breach & Besluiten: The night of the TU/e Hack
In this joint presentation by Eindhoven University of Technology (TU/e) and Fox-IT, we will provide a detailed account of the cyberattack that impacted TU/e, covering the technical, operational, and organizational dimensions of the incident.
Bits, Breach & Besluiten: The night of the TU/e Hack
In this joint presentation by Eindhoven University of Technology (TU/e) and Fox-IT, we will provide a detailed account of the cyberattack that impacted TU/e, covering the technical, operational, and organizational dimensions of the incident.