Programme

ONE Conference offers a unique opportunity to share the latest insights and developments in cybersecurity and meet key cybersecurity stakeholders. Cybersecurity keeps us all connected.

Programme outline
There will be a plenary programme as well as optional breakout sessions dealing with various topics. ONE Conference 2022 promises a full programme of in-depth sessions, workshops, panels, and lightning sessions. The programme outline will be updated continuously and will be subject to changes. For more information about the sessions and speakers, click on the sessions.
Programme PDF Downloads:
18 October
19 October
Willem-Alexander
09:15
Opening address
Technical level
Track:
Main Stage
Willem-Alexander
09:30
Information coming soon.
Technical level
Track:
Main Stage
Willem-Alexander
10:20
Information coming soon.
Technical level
Track:
Main Stage

All sessions 11.00

11:00
If you've been impacted by a large-scale cyber incident, you know the chaos that ensues. After the threat is contained and the responders go home, how do you rebuild & harden your org for the […]
Technical level
Track:
Technical
11:00
Information coming soon.
Technical level
Track:
Research
11:00
The rapid development of information- and communication technology caters to the innovative efforts of (international) criminal organizations. Criminals exploit newly introduced technological advancements at such exceptional speed that the criminal justice system is met with […]
Technical level
Track:
Law enforcement
11:00
Log4j showed the world how vulnerable we are to ICT supply chain attacks. Solarwinds and Kaseya exhibited how dangerous supply chain attacks can get - when one actor in the supply chain becomes compromised, the […]
Technical level
Track:
Other
11:00
This session will provide how a Chinese company addresses cybersecurity. This company is a manufacturer of IoT devices and is being accused of espionage, using backdoors and hiding vulnerabilities. But, what's the real story? Do […]
Technical level
Track:
Other
11:00
When a hack on an organisation occures it will become very stressful situation very quickly. Depending upon the size of the organisation the crisis team will be formed. Many multidisiplinairy teams will need to be […]
Technical level
Track:
Main Stage

All sessions 11.40

11:40
The new Dutch Code of Criminal Procedure should be implemented in 2026, exactly a century after the current code was introduced. The implementation must, among other things, ensure that the law becomes technology-independent, so that […]
Technical level
Track:
Law enforcement
11:40
Anyone can communicate. So why do you still need an expert on this matter? I'll tell you why. I provide examples of communications by companies who got breached gone wrong, and right. What is wrong […]
Technical level
Track:
Main Stage
11:40
Searchable Encryption (SE) is a type of secure tool that enables a client to outsource its encrypted data to an honest-but-curious server and further performs the dynamic update and keyword search over the ciphertexts. The […]
Technical level
Track:
Technical
11:40
The agriculture industry is globally valued at over $10 trillion and is growing at a rate of over 7% year on year basis. The industry has major share in GDP of several countries. When we […]
Technical level
Track:
Governance
11:40
A large part of the .nl domain names listed in abuse reports are registered with malicious intentions. In other words, the registrants always intended to use them for phishing, malware or the publication of other […]
Technical level
Track:
Innovation

All sessions 13.00

13:00
Unfortunately internet routing incidents happen on a regular basis, making Internet services unreachable for end-users. Recently there was an incident where Twitter's IP addresses were taken over by a Russian internet provider. In this case […]
Technical level
Track:
Governance
13:00
The Dutch police has been trying to collaborate with ‘private partners’, including the Dutch hacker community in the Netherlands, for years now (the great Public Private Partnership or PPP), with mild succes. So when they […]
Technical level
Track:
Technical
13:00
The Dutch government works to maintain a strong knowledge base for the development of emerging cybersecurity technologies through multiple policy instruments, from subsidizing fundamental research to supporting market entry for new spin-out companies. The long-term […]
Technical level
Track:
Innovation
13:00
The current cyber threat landscape shows continuous merging of traditional crime and cybercrime. Organized criminal organizations are running ransomware businesses, old fashioned fraudsters are using new online applications and even the drugs trade today has […]
Technical level
Track:
Law enforcement
13:00
Skills shortages in cybersecurity has been reported frequently, both in quantity and in quality. The actual size and type of shortages remain unclear because cybersecurity is defined differently every time, poorly measured and therefore unmanageable. […]
Technical level
Track:
Main Stage
13:00
The role of technical standards bodies have always been important in determining how markets operate, and the cybersecurity field is no exception to this. However, when the norms, rules, and standards determined by these non-state-based […]
Technical level
Track:
Research

All sessions 13.40

13:40
A couple of years ago, many thought the next war would bring cyber warfare too. At first glance, the Russia-Ukraine war seems to be at odd with this expectation. At a closer look however, cyber […]
Technical level
Track:
Main Stage
13:40
The world has experienced several autonomously operating threats with advanced lateral movement capabilities and a destructive purpose - be it via pretending to be ransomware (WannaCry) or by wiping devices directly (CaddyWiper). Given the impact […]
Technical level
Track:
Technical

All sessions 14.00

14:00
Within the H2020 EU project SOCCRATES [1] a security decision support platform has been developed for Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs). This, so called ‘SOCCRATES Platform’ is targeted at […]
Technical level
Track:
Innovation
14:00
Introduction of the new cybersecurity strategy of the Netherlands.
Technical level
Track:
Governance

All sessions 14.20

14:20
Cyber threat researchers regularly come to fresh understandings about the evolution of cyberattacks. This session will describe how the Russia-Ukraine conflict of 2022 revealed new approaches to cyber attacks. The speaker will describe three categories […]
Technical level
Track:
Main Stage
14:20
Organisations typically perform risk analysis in a qualitative way. There is however great untapped potential in the insights from the quantification of cyber risk, so why is not common yet? It has proven to be […]
Technical level
Track:
Research
14:20
As a security industry, we know for years that configuring the hostbased firewall correctly greatly reduces the attack surface. Still, configuring the host based firewall on an enterprise scale is hard, prone to errors and […]
Technical level
Track:
Technical

All sessions 15.00

15:00
The Human Cyber Attack Vector
Technical level
Track:
Technical
15:00
Information coming soon.
Technical level
Track:
Law enforcement
15:00
As a cybersecurity advisor I help organizations protecting their business, I have seen both the offensive and defensive sides and to my belief understanding of both is necessary to be effective in either one. The […]
Technical level
Track:
Main Stage
15:00
It is no longer the question IF your organization will be hit by a disruption or cyber attack, but WHEN. Is your organization prepared for efficient recovery of ICT and business processes when the inevitable […]
Technical level
Track:
Research
15:00
Dutch Governement is an archipelago of more or less independent organisations. This goes back way further than Thorbecke?s constitution in 1848. The risks posed by cyber threats are increasing much faster an organization can handle […]
Technical level
Track:
Governance
Willem-Alexander
16:00
The security industry is fighting ransomware, rolling out new features you can pay for and naming more vulnerabilities than ever. In other words, it's growing, booming and being a general force for good in the […]
Technical level
Track:
Main Stage
Willem-Alexander
16:30
Closing remarks.
Technical level
Track:
Main Stage
downloadmagnifier