SaaSified Crime: From AiTM to Banking Fraud

Adversary-in-the-Middle (AiTM) phishing attacks have evolved from niche exploits to scalable, SaaS-based crime tools. By bypassing MFA, these services enable attackers to gain access with minimal effort. Now, Dutch cybercriminals are mimicking this model: packaging banking fraud kits as subscription-based services. This talk highlights how the professionalization of phishing is lowering the barrier to entry […]

Outlook One Financial Threat Landscape

The FI-ISAC is pleased to present the One Financial Threat Landscape. FI-ISAC. Through collaboration, we create the One Financial Threat Landscape. The One Financial Threat Landscape provides insight into the 10 biggest threats facing our industry. It is a product created by the financial sector, used by the financial sector, but delivering value across the […]

OT Cybersecurity for Offshore Wind

DNV and Siemens Energy in 2024 invited stakeholders across the offshore wind industry to a Joint Industry Project to identify common practices for how to implement OT Cyber Security for Offshore Wind. By guiding all stakeholders with a common interpretation of standards and best practices, this broad partnership will ensure wind power remains a growing […]

National roles and responsibilities in cybersecurity

Cybersecurity is a shared responsibility. A clear and maintained overview of roles and responsibilities of the many involved stakeholders is therefore fundamental to an effective national cybersecurity strategy. During the presentation, an approach for clearly defining the distinct domains of Cyber Security, Cyber Law Enforcement, Cyber Defense, and Cyber Diplomacy will be explained. Where do […]

How can we inspire Gen Z to become ethical hackers?

With $23.8 trillion forecasted to be lost to Cybercrime in 2027 and 80% of NYC teenagers having hacked by age of 16, we are facing a generational crisis. The Hacking Games will inspire, educate and equip this generation to be defenders and not attackers. During our panel, we will discuss the challenges faced with a […]

Hack the Hospital – A Deep Dive of ON2IT and Haaglanden Medical Centre (HMC)

Hack the Hospital: When Cyber Threats Turn Physical ONE Conference 2025 | Presented by Luca Cipriano (ON2IT) and Edwin Mentink (Haaglanden Medical Centre) Hospitals are increasingly at risk—not just from data breaches, but from digital attacks that disrupt physical systems. In this live, on-stage demonstration, ON2IT and HMC reveal how attackers exploit overlooked infrastructure like […]

Enhancing Cyber Resilience in European Power Grids

This session delves into the Dutch segment of the eFORT project, an EU-funded initiative aimed at bolstering the resilience and security of Europe’s power grids against failures, cyberattacks, physical disturbances, and data privacy issues. The Dutch partners in this project are TU Delft, TenneT, TNO, ENCS, and DNV, and focus among others on the development […]

Click to Recruit: Youth & Online Crime

Criminal and extremist networks are increasingly using game-adjacent platforms to recruit and mobilize, particularly targeting vulnerable youth. This presentation explores how gamification principles are being exploited for illicit purposes, highlighting the urgent need for countermeasures and the potential of gamification as a tool for prevention and education.

Buy EU? Try Federated Self-hosted Digital Services

In the wake of continual and aggressive US trade actions, it has become increasingly common for European consumers to look for European options. Digital services are no exception. However, unlike most products, digital consumers can avoid companies altogether and self-host their own digital services. Self-hosting is nothing new, the blogs of the 1990s and early […]

Bridging the CRA Gap: Lifecycles vs. Expectations

The upcoming Cyber Resilience Act (CRA) requires manufacturers of smart products to produce cyber-resilient products and uphold cyber resiliency during their lifecycle by supporting them for their expected use time. But what do consumers actually consider a “reasonable” use time – and which cyber risks arise when societal expectations outlast manufacturer support? In this talk, […]