Defending the Alliance: cyber insights from the NATO summit

Insights from NCSC-NL’s journey climbing ‘The Summit’. A journey together with partners such as AIVD, MIVD, Dutch National Police, Ministry of Infrastructure and Water Management, Ministry of Defense, Ministry of Foreign Affairs, NCTV, MSSPs, and the Municipality of The Hague. We talk about the unexpected weather, pitfalls and successes during the climb and descent of […]

Cybercrime as a misfit: why traditional policing strategies fall short

Cybercrime is evolving rapidly, often faster than (government) organizations can adapt. In this session, Stan Duijf will guide you through the development of strategies by the Netherlands police and explain why these no longer align with the fast-changing nature of today’s cybercriminal landscape. Through three insightful examples presented by Sophie Warringa, Matthijs Jaspers and Lieske […]

We need to talk about…patching

Most organizations have a formal patching policy. This is also a requirement under both DORA and NIS2. Research shows that most patching policy contain deadlines within which the different categories of vulnerabilities must be patched. But only some of these organizations can actually measure whether they comply with their own policy. Paradoxically, it is therefore […]

Outlook One Financial Threat Landscape

The FI-ISAC is pleased to present the One Financial Threat Landscape. FI-ISAC. Through collaboration, we create the One Financial Threat Landscape. The One Financial Threat Landscape provides insight into the 10 biggest threats facing our industry. It is a product created by the financial sector, used by the financial sector, but delivering value across the […]

National roles and responsibilities in cybersecurity

Cybersecurity is a shared responsibility. A clear and maintained overview of roles and responsibilities of the many involved stakeholders is therefore fundamental to an effective national cybersecurity strategy. During the presentation, an approach for clearly defining the distinct domains of Cyber Security, Cyber Law Enforcement, Cyber Defense, and Cyber Diplomacy will be explained. Where do […]

From Assessment to Action: Coordinated Risk Strategy

In an era where supply chains are as interconnected as the technologies that power them, cybersecurity risks no longer respect sectoral or national boundaries. This panel explores the urgent need for an EU-wide, coordinated approach to supply chain security—one that bridges public and private sectors, aligns risk assessment methodologies, and drives the development of a […]

Cognitive Readiness for Cyber Disruptions

Cyber disruptions are rarely clear-cut. Impact is often uncertain, timelines unclear, and threats evolve quickly. Teams must make decisions under pressure, ambiguity, and while suffering from fatigue. Yet, cybersecurity as a domain continues to underestimate the role of human performance capabilities and limitations in detection, response, and recovery. This talk introduces a cognitive readiness framework […]