Programme

ONE Conference offers a unique opportunity to share the latest insights and developments in cybersecurity and meet key cybersecurity stakeholders. Cybersecurity keeps us all connected.

Programme outline
There will be a plenary programme as well as optional breakout sessions dealing with various topics. ONE Conference 2022 promises a full programme of in-depth sessions, workshops, panels, and lightning sessions. The programme outline will be updated continuously and will be subject to changes. For more information about the sessions and speakers, click on the sessions.
Programme PDF Downloads:
18 October
19 October
Willem-Alexander
10:00
Opening address
Technical level
Track:
Main Stage
Willem-Alexander
10:10
Information coming soon.
Technical level
Track:
Main Stage
11:00
The cyber issue of the year is clearly Russia’s destructive cyber attacks against Ukraine, and its intelligence-gathering efforts against Ukrainian allies. In the session we will talk about our Microsoft Digital Defense Report, looking at […]
Technical level
Track:
Main Stage

All sessions 11.40

11:40
The VNG, Common Ground movement and the Municipality of The Hague together developed innovation in the field of access management. This brings opportunities for interoperability between municipalities, citizens, businesses and chain partners and evolved from […]
Technical level
Track:
Innovation
11:40
The vulnerability searching process requires a lot of time. If you want to cover all the perimeter in an appropriate amount of time and get valuables, automation of routines is one of the cornerstones, that […]
Technical level
Track:
Technical
11:40
Bitcoin mixing is one of the preferred methods criminals use to cash-out dirty crypto’s. As many criminal entrepreneurs leverage crypto currencies in transacting with ‘customers’ – from online drug trade to bullet-proof hosting and ransomware […]
Technical level
Track:
Law enforcement
11:40
Information coming soon.
Technical level
Track:
Research
11:40
"Don't click links". "Never use public Wifi". Many of us in infosec have yearly awareness campaigns in which we try to teach our collegues security awareness. However, one could argue that the way we go […]
Technical level
Track:
Main Stage
11:40
As new laws and regulations around the world address the role (and accountability) of cybersecurity in the boardroom, understanding how to maximise threat intelligence beyond the SIEM is essential for all types of businesses. While […]
Technical level
Track:
Governance

All sessions 12.50

12:50
The Digital Trust Center has been assigned the task to inform Business in The Netherlands on security risks in their network and informationsystems. One of the most challenging parts of this task is to actually […]
Technical level
Track:
Governance

All sessions 13.00

13:00
The amount of data is growing by the day, processing this data requires more and more time and labor. IT forensics departments also starting to notice this. Manually processing data to find answers requires a […]
Technical level
Track:
Technical
13:00
Security is broken. Traditional monitoring systems are limited in efficiency and performance, digital identities are exposed by fraudulent links, and our existing solutions are vulnerable to the anticipated rise in commercial quantum computing. In Smart […]
Technical level
Track:
Innovation
13:00
As software supply chain attacks and risks become more common, organizations are increasingly concerned about what is in their software. Visibility is a vital first step, and more organizations are both supplying and asking for […]
Technical level
Track:
Main Stage
13:00
Security monitoring systems detect potentially malicious activities in IT infrastructures, by either looking for known signatures or for anomalous behaviors. Security operators investigate automatically generated events to determine whether they pose a threat to their […]
Technical level
Track:
Research

All sessions 13.40

13:40
Proof-of-concept (PoC) exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and they facilitate red teaming tasks. In the recent years, PoCs have been […]
Technical level
Track:
Technical
13:40
Information coming soon.
Technical level
Track:
Research
13:40
On the 2nd July 2021 REvil launched a worldwide ransomware attack through a zero-day in the Managed Service Provider software KaseyaVSA. What only few people knew then, was that the Dutch Institute for Vulnerability Disclosure […]
Technical level
Track:
Main Stage
13:40
During the protest on Maidan in Kiev (2013) the world has seen a huge surge in propaganda campaigns done by Russian troll farms. In the US we witnessed huge MAGA troll farms. In the last […]
Technical level
Track:
Innovation
13:40
A ransomware group extorts victims by threatening to publish their personal data and by blocking access to it. In February 2022, during the conflict between Russia and Ukraine, a Ukrainian security researcher under the alias […]
Technical level
Track:
Law enforcement

All sessions 13.50

13:50
OT Security has become a topic of interest for many organizations in various segments, like manufacturing, chemicals, utilities and oil and gas industry. Everyone knows this encompasses legacy systems, lack of patching and to some […]
Technical level
Track:
Governance

All sessions 14.20

14:20
Ransomware volume increased 105% year over year and is up 232% since 2019 (2022 Cyber Threat Report, Sonicwall). However, relatively little is known about the psychological impact of ransomware attacks on people from affected organizations […]
Technical level
Track:
Law enforcement
14:20
Feeling secure after having switched to multifactor authentication? Well, we may have bad news for you. Phishing attacks are becoming more sophisticated, and common multifactor techniques such as TOTP may not be sufficient anymore. But […]
Technical level
Track:
Main Stage
14:20
Today's cyber security products rely heavily on shared Indicators of Compromise, IoCs. These pieces of Cyber Threat Intelligence (CTI) are typically malicious IP addresses, file hashes or URLs that are fed into firewalls or other […]
Technical level
Track:
Research
14:20
This year we won the world renowned Pwn2Own Miami contest by demonstrating five zero-day attacks against commonly used software in the ICS world. Due to the war in Ukraine ICS security is a hot topic. […]
Technical level
Track:
Technical
14:20
The presentation will guide audience through a complete ICS attack vector aimed at compromising critical infrastructure operator organization. It will leverage a thorough case study of attack on smart meters and advanced metering infrastructure. It […]
Technical level
Track:
Innovation

All sessions 14.30

14:30
There seems to be a trend in which an increasing amount of organizations are falling victim to targeted ransomware attacks. Dutch examples include the attack on Maastricht University in December 2019, and science financier NWO […]
Technical level
Track:
Governance

All sessions 15.00

15:00
Secure communications are the key to digitalization, ensuring trust in the systems we use every day and the integrity of the data they rely upon. Cryptography is one of the means to ensure secure data […]
Technical level
Track:
Innovation
15:00
The ransomware landscape has been changing over the passed few years. In our study, we analyzed 371 ransomware attacks reported to the Dutch police from 2019 to 2021. Our aim was to understand what determines […]
Technical level
Track:
Law enforcement
15:00
WICCA is a circle of women in cybersecurity based in The Netherlands with a vision to spread the infosec word to everyone. We want to bring female cybersecurity professionals and security enthusiasts together and create […]
Technical level
Track:
Main Stage
15:00
We tracked the largest volunteer security information sharing community known to date: the COVID-19 Cyber Threat Coalition, with over 4,000 members. This enabled us to address long-standing questions on threat information sharing. First, does collaboration […]
Technical level
Track:
Research
15:00
GDPR compliance is often seen as a legal exercise. In this session I will share technical know-how from the analysis in high profile DPIAs. I will explain how similar investigations can be performed in a […]
Technical level
Track:
Technical
Willem-Alexander
16:00
Information coming soon.
Technical level
Track:
Main Stage
Willem-Alexander
16:30
Closing remarks.
Technical level
Track:
Main Stage
downloadmagnifier