Late to the game? A View on Civil-Military Cooperation in the Cyber Domain

With NATO and its member states recognizing cyber as a warfighting domain, discussions are increasing about what this means for civil-military cyber collaboration, with a specific focus on improving the ways in which defence forces work with civilian partners to protect critical civilian infrastructure. As the cyber domain is almost completely run by civilian entities, […]

Security Through Trust Not Control: Europe’s Battle Plan

Europe is at war with its own digital legacy. Having pioneered data protection in 1995 and redefined global privacy standards with GDPR in 2016, the EU now risks undermining its achievements through increasingly absolutist regulatory proposals. The 2025 ProtectEU strategy aims to mandate encryption backdoors, France is pushing mandatory 72-hour data decryption for narcotrafficking investigations, […]

ReArming Europe: Cyber Sovereignty Starts Now

Europe faces a decisive moment in cybersecurity. As digital threats escalate and alliances shift, the question is whether Europe will lead in cybersecurity or stay dependent. The EU’s ReArm Europe / Readiness 2030 shows intent, but funding alone won’t deliver sovereignty. Drawing on experience from U.S. Cyber Command, NSA, and the Defense Intelligence Agency, and […]

Rush hour Rodeo and traffic cam selfies

After a journalists inquiry and some internal evaluation on the possibility of chinese state actors having access to camera footage, Muncipality the Hague decided to do a security test focused on an APT threat on their traffic camera infrastructure. During the session we will show how the team approached this project, how some of the […]

The Digital Edge in Modern Battlefield Conflict

This presentation explores the evolving role of cyber operations in modern conflict. It discusses cyber’s influence as the “5th domain,” leveraged by Russian aligned actors during the invasion of Ukraine. It delves into the nature of cyber operations, in alignment with kinetic actions. Additionally, highlighting their use in disrupting command and control, targeting critical infrastructure […]

Hackers don’t break in, they log in

In 2025, the biggest threat to your organization may already be inside — not through an elaborate breach, but through a legitimate login. Infostealer malware has surged across the cybercrime landscape, quietly harvesting credentials from unsuspecting victims and feeding a booming underground market. This trend poses a serious and often underestimated risk to all kinds […]

Defending Europe against DDoS in a multi-polar world

This presentation examines the evolving nature of Distributed Denial of Service (DDoS) attacks as tools of hybrid warfare and proposes a collaborative European defense strategy. We provide analysis of how DDoS attacks have transformed from mere technical nuisances, to potentially disturbing tools which can cause major disruption illustrated by the attacks in 2018, to strategic […]

ATHENA: interdisciplinary approaches to cybersecurity

“This interactive workshop discusses how we can address cybersecurity in operational technology (OT) in critical water infrastructures with a multidisciplinary focus on human factors, geopolitical threats, and tailored training. Defending critical infrastructures from cybersecurity threats is crucial for ensuring the continual availability of essential services. If attacked, it could have serious and potentially life-threatening consequences […]