Cyber Public-Private Partnerships – Lessons from Melissa
Over the last decades, ransomware incidents have surged all around the globe. To address this growing threat, a public-private partnership (PPP) called ‘Melissa’ was initiated in 2022 in the Netherlands, including Dutch public institutions and private cybersecurity organizations. Project Melissa offers interesting insights into what drives successful public-private partnerships in the field of cybersecurity. As […]
Cyber Security Assessment Netherlands 2025
The Cyber Security Assessment Netherlands (CSAN) provides insight into threats, interests and resilience in relation to cyber security and the effect these factors have on national security. The CSAN is published annually by the National Coordinator for Counterterrorism and Security and is written in cooperation with public and private partners. The CSAN2025 will be published […]
Cybersecurity Techniques to Solve Fraud Problems
For the last decade, tier 1 financial institutions have been using cybersecurity teams, data, and technology to address the growing challenge of digitally-enabled fraud and abuse. This session introduces some of these approaches, including how to use data, machine learning / AI, and modified cybersecurity techniques to address fraud earlier and more effectively. Specific real-world […]
CYRA: Building Resilience & Trust in Supply Chains
In this session we explain the method of cyber rating – CYRA in short. CYRA has started with an IT module (based on ISO-27001) and the OT module (based on IEC-62443) has been added recently. In this session, we present CYRA – a cyber rating methodology designed to significantly improve digital resilience across critical supply […]
Dead Man’s PLC: Ransoming the Physical World via OT
Cybercrime is currently the most pervasive threat to organisations who use operational technology (OT), but it isn’t the most significant threat to OT itself. That’s because cybercrime models like ransomware and double extortion are aimed at IT and simply don’t translate well to OT. However, as cybercriminals diversify and specifically target OT, the development of […]
Defending Europe against DDoS in a multi-polar world
This presentation examines the evolving nature of Distributed Denial of Service (DDoS) attacks as tools of hybrid warfare and proposes a collaborative European defense strategy. We provide analysis of how DDoS attacks have transformed from mere technical nuisances, to potentially disturbing tools which can cause major disruption illustrated by the attacks in 2018, to strategic […]
Defending Olympus – On the sidelines of cyberwarfare
You are taking the role of the CISO of NeuroNexis, founded in 2037, Your company has developed a breakthrough product that allows users to upload and download information from human to device. This product, the Zeus Microchip, has just passed government approval and has both tremendous civilian and military applications. NeuroNexis has received a windfall […]
Discussion: teaching ethics to (future) IT professionals
As society is digitalizing and we depend more on technology, securing IT systems and preventing the abuse thereof is increasingly becoming more important. To protect these systems, there is a need for cybersecurity professionals and ethical hackers that build in security and test the safety of systems. However, learning how systems can be protected oftentimes […]
Does your future cyber workforce have what it takes?
Does your future cyber workforce have what it takes? How to attract multidisciplinary cyber talents in a fast changing digital world. In light of the current developments, the demand for cybersecurity talents and profiles is becoming increasingly diverse, which requires a completely different approach in attracting those talents. A recently published report in 2024 commissioned […]
DORA TLPT: Strengthening financial cyber resilience
Abstract draft: The Digital Operational Resilience Act (DORA), which came into force on January 17, 2025, mandates financial institutions to conduct Threat Led Penetration Testing (TLPT) to enhance their cyber resilience within the European Union. TLPT simulates realistic cyber attacks based on the TIBER-EU framework, aiming to identify vulnerabilities and improve the institution’s detection and […]