PQC Migration Survival Panel (Now with 90% Less Anxiety)

The Quantum Computer is on its way, and it is here to stay! The technical development in the field of Quantum Computing is growing quickly and experts expect to see a Cryptographic Relevant Quantum Computer (CRQC) within 10 to 15 years. The CRQC can weaken, and in some specific cases, break widely used algorithms, rendering […]

OT Cybersecurity for Offshore Wind

DNV and Siemens Energy in 2024 invited stakeholders across the offshore wind industry to a Joint Industry Project to identify common practices for how to implement OT Cyber Security for Offshore Wind. By guiding all stakeholders with a common interpretation of standards and best practices, this broad partnership will ensure wind power remains a growing […]

National roles and responsibilities in cybersecurity

Cybersecurity is a shared responsibility. A clear and maintained overview of roles and responsibilities of the many involved stakeholders is therefore fundamental to an effective national cybersecurity strategy. During the presentation, an approach for clearly defining the distinct domains of Cyber Security, Cyber Law Enforcement, Cyber Defense, and Cyber Diplomacy will be explained. Where do […]

How can we inspire Gen Z to become ethical hackers?

With $23.8 trillion forecasted to be lost to Cybercrime in 2027 and 80% of NYC teenagers having hacked by age of 16, we are facing a generational crisis. The Hacking Games will inspire, educate and equip this generation to be defenders and not attackers. During our panel, we will discuss the challenges faced with a […]

Hack the Hospital – A Deep Dive of ON2IT and Haaglanden Medical Centre (HMC)

Hack the Hospital: When Cyber Threats Turn Physical Hospitals are increasingly at risk—not just from data breaches, but from digital attacks that disrupt physical systems. In this live, on-stage demonstration, ON2IT and HMC reveal how attackers exploit overlooked infrastructure like HVAC and water systems to cause real-world impact, from postponed surgeries to compromised patient safety. […]

Enhancing Cyber Resilience in European Power Grids

This session delves into the Dutch segment of the eFORT project, an EU-funded initiative aimed at bolstering the resilience and security of Europe’s power grids against failures, cyberattacks, physical disturbances, and data privacy issues. The Dutch partners in this project are TU Delft, TenneT, TNO, ENCS, and DNV, and focus among others on the development […]

Click to Recruit: Youth & Online Crime

Criminal and extremist networks are increasingly using game-adjacent platforms to recruit and mobilize, particularly targeting vulnerable youth. This presentation explores how gamification principles are being exploited for illicit purposes, highlighting the urgent need for countermeasures and the potential of gamification as a tool for prevention and education.

Buy EU? Try Federated Self-hosted Digital Services

In the wake of continual and aggressive US trade actions, it has become increasingly common for European consumers to look for European options. Digital services are no exception. However, unlike most products, digital consumers can avoid companies altogether and self-host their own digital services. Self-hosting is nothing new, the blogs of the 1990s and early […]

Bridging the CRA Gap: Lifecycles vs. Expectations

The upcoming Cyber Resilience Act (CRA) requires manufacturers of smart products to produce cyber-resilient products and uphold cyber resiliency during their lifecycle by supporting them for their expected use time. But what do consumers actually consider a “reasonable” use time – and which cyber risks arise when societal expectations outlast manufacturer support? In this talk, […]

Applying Large Language Models to Cyber Threat Intel

Security professionals have  to deal with an ever larger volume of daily cyber threat intel that could contain crucial information for managing the next cyber outbreak. This volume is increasing faster than can be easily managed by just scaling up in terms of personnel. A more effective approach is therefore wanted. Because of the diversity […]