Clinical diagnostics and the Digitale Dolle Mina’s
We founded the Digitale Dolle Mina’s because the digital world must not be left out when it comes to women’s rights. But perhaps even more importantly, during the hack of Clinical Diagnostics, sensitive data of nearly a million women was stolen, and the response was underwhelming at best. Our talk will focus on what went […]
“Sharing is caring”. Cross-border notification and incident management
Why and how do we share information in the international cybersecurity landscape?Learn about open standards, methodology and processes for information sharing by playing the Dutch classic card game Quartets.
A1 Cyber Attack 2020 – Lessons Learned
A1 is the biggest telecommunications provider and incumbent operator in Austria. I will briefly explain the major cyberattack against A1 in Austria and our response. The defense was very complex and took a lot of planning and preparation. On the one hand, we had to regain complete control of our office infrastructure, on the other […]
Defending the Alliance: cyber insights from the NATO summit
Insights from NCSC-NL’s journey climbing ‘The Summit’. A journey together with partners such as AIVD, MIVD, Dutch National Police, Ministry of Infrastructure and Water Management, Ministry of Defense, Ministry of Foreign Affairs, NCTV, MSSPs, and the Municipality of The Hague. We talk about the unexpected weather, pitfalls and successes during the climb and descent of […]
It only takes a beer coaster to measure cyber resilience
It only takes a beer coaster to measure your cyber resilience. By comparing your organization with four levels of maturity characteristics in three different themes (people, processes and technology), printed on the back side of a beer coaster, you can get a general idea of your maturity and corresponding cyber resilience.
Cognitive Readiness for Cyber Disruptions
Cyber disruptions are rarely clear-cut. Impact is often uncertain, timelines unclear, and threats evolve quickly. Teams must make decisions under pressure, ambiguity, and while suffering from fatigue. Yet, cybersecurity as a domain continues to underestimate the role of human performance capabilities and limitations in detection, response, and recovery. This talk introduces a cognitive readiness framework […]
Defending Olympus – On the sidelines of cyberwarfare
You are taking the role of the CISO of NeuroNexis, founded in 2037, Your company has developed a breakthrough product that allows users to upload and download information from human to device. This product, the Zeus Microchip, has just passed government approval and has both tremendous civilian and military applications. NeuroNexis has received a windfall […]
“Face Value: A Deepfake Crisis”
“Face Value: A Deepfake Crisis” is an interactive crisis simulation designed to immerse cybersecurity professionals in a high-stakes scenario triggered by a deepfake attack. As artificial intelligence continues to evolve, deepfakes are becoming increasingly sophisticated, posing a serious threat to organizational security and reputation. In this 50-minute session, participants will take on critical C-level roles—such […]
Bits, Breach & Besluiten: The night of the TU/e Hack
In this joint presentation by Eindhoven University of Technology (TU/e) and Fox-IT, we will provide a detailed account of the cyberattack that impacted TU/e, covering the technical, operational, and organizational dimensions of the incident.
Bits, Breach & Besluiten: The night of the TU/e Hack
In this joint presentation by Eindhoven University of Technology (TU/e) and Fox-IT, we will provide a detailed account of the cyberattack that impacted TU/e, covering the technical, operational, and organizational dimensions of the incident.