The ever changing AI powered NextGen security industry

Back in 2022, in an unexpected turn of events, the security industry was confronted with its future self. What followed was an intense discussion with heated back and forths that culminated in an industry that – granted, reluctantly – took a look in the mirror. Better times were promised – rational minds prevailed. But now, […]

Transparency as a Security Control: Rebuilding Trust in Technology

As governments increasingly deploy powerful digital tools—biometrics, surveillance AI, predictive analytics—the public trust in those same institutions is eroding. Transparency is often framed as a communications exercise or regulatory compliance task. But what if we treated it as a core cybersecurity control? This session explores real-world models of proactive transparency, where government agencies have used […]

Succes & Failures in sharing data in pub-priv coalition

Share data in public – private collaboration, do analysis together and create and distribute the findings to all concerned organizations in the Netherlands. So we can make the Netherlands an unattractive target for digital attacks. Let’s change some organizational cultures, and develop, automate and secure the platform needed for this. Maybe we need some process […]

The Attribution Minefield in Ransomware Investigations

Ransomware attacks pose a growing threat to both digital and physical infrastructures. When a ransomware incident occurs, victim organizations often face pressure to restore operations quickly—even if that means paying the ransom. However, payment introduces serious legal and financial risks: if the attacker is a sanctioned entity, making a payment could result in violation of […]

Enhancing Cyber Resilience in European Power Grids

This session delves into the Dutch segment of the eFORT project, an EU-funded initiative aimed at bolstering the resilience and security of Europe’s power grids against failures, cyberattacks, physical disturbances, and data privacy issues. The Dutch partners in this project are TU Delft, TenneT, TNO, ENCS, and DNV, and focus among others on the development […]

Hack the mind: the power of storytelling in cyber

In cybersecurity, data informs — but stories transform. You can speak in numbers, but no one remembers the spreadsheet. For CISOs and security leaders, turning complex risk into clear, human action is what actually moves the needle. Long reports? Ignored. Controls? Misunderstood. People? Tuned out. This session goes where most don’t: storytelling as a leadership […]

Cyber competence shortages in Europe and solutions

There is more demand than availability of talent for cybersecurity. A recently published analysis of several European countries shows in detail what the current needs are and if we can bridge the gap with available training. Experts were also consulted on the future competence needs, what is for instance the impact of legislation and technological […]

Does your future cyber workforce have what it takes?

Does your future cyber workforce have what it takes? How to attract multidisciplinary cyber talents in a fast changing digital world. In light of the current developments, the demand for cybersecurity talents and profiles is becoming increasingly diverse, which requires a completely different approach in attracting those talents. A recently published report in 2024 commissioned […]

10 Years of Hardware Hacking: Secret Insights & Lessons

This session offers a rare opportunity to gain exclusive insights into hardware hacking, drawn from 10 years of practical experience. Designed for a diverse audience, including non-technical attendees, the presentation combines unconventional techniques, challenges, and lessons learned without disclosing sensitive details. Strict confidentiality applies (TLP: Amber). No recordings allowed.

Bits, Breach & Besluiten: The night of the TU/e Hack

In this joint presentation by Eindhoven University of Technology (TU/e) and Fox-IT, we will provide a detailed account of the cyberattack that impacted TU/e, covering the technical, operational, and organizational dimensions of the incident.