Hunting at scale, identifying Internet connected OT devices

Have you ever been on an Internet safari? Join us on an expedition into the world of internet-connected OT-devices! We’ll introduce you to our OT Big Five and share fascinating cases we have encountered. We’ll also explore the motivations behind our research, how the NCSC identifies OT-devices at scale using repeatable methods, and the legal […]

Late to the game? A View on Civil-Military Cooperation in the Cyber Domain

With NATO and its member states recognizing cyber as a warfighting domain, discussions are increasing about what this means for civil-military cyber collaboration, with a specific focus on improving the ways in which defence forces work with civilian partners to protect critical civilian infrastructure. As the cyber domain is almost completely run by civilian entities, […]

From due diligence to resilience: how to secure your most critical suppliers

In the session, NCSC and DTC will provide practical guidance on the important components of supplier risk management. Both organizations have published multiple publications and webpages on supply chain risk management the past year. Some questions that will be addressed are: What are the best practices of supplier risk management? How mature organizations can help […]

Operation Heart Blocker – Disrupting the market of a cybercrime syndicate

In Operation Heart Blocker, we dealt a major blow to one of the largest “Cybercrime As A Service” networks. The organization behind this network had dozens of webshops where cybercrime tools were offered and operated as a professional company. This presentation explains how we ultimately mapped out a complete worldwide network of malicious webshops and […]

ReArming Europe: Cyber Sovereignty Starts Now

Europe faces a decisive moment in cybersecurity. As digital threats escalate and alliances shift, the question is whether Europe will lead in cybersecurity or stay dependent. The EU’s ReArm Europe / Readiness 2030 shows intent, but funding alone won’t deliver sovereignty. Drawing on experience from U.S. Cyber Command, NSA, and the Defense Intelligence Agency, and […]

The Digital Edge in Modern Battlefield Conflict

This presentation explores the evolving role of cyber operations in modern conflict. It discusses cyber’s influence as the “5th domain,” leveraged by Russian aligned actors during the invasion of Ukraine. It delves into the nature of cyber operations, in alignment with kinetic actions. Additionally, highlighting their use in disrupting command and control, targeting critical infrastructure […]

Following modern attacks into the cloud and beyond

Over the last years adversaries have been developing their tradecraft and at CrowdStrike we are calling this the year of the enterprising adversary. They are moving away from pure end point exploitation to increased use of voice-based phishing techniques, compromising the cloud and penetrating SaaS services. Defenders need to learn from the adversary and adapt […]

Hack the Hospital – A Deep Dive of ON2IT and Haaglanden Medical Centre (HMC)

Hack the Hospital: When Cyber Threats Turn Physical ONE Conference 2025 | Presented by Luca Cipriano (ON2IT) and Edwin Mentink (Haaglanden Medical Centre) Hospitals are increasingly at risk—not just from data breaches, but from digital attacks that disrupt physical systems. In this live, on-stage demonstration, ON2IT and HMC reveal how attackers exploit overlooked infrastructure like […]

How to develop secure software

Secure software development frameworks and methodologies have been around for 20 years. Yet, despite many companies committing to them, we still have vulnerable software that enables devastating cyberattacks. Therefore, many organizations question the value of secure software development processes and do not know how to organize their software development to be secure-by-design. In this talk, […]

Cybersecurity Techniques to Solve Fraud Problems

For the last decade, tier 1 financial institutions have been using cybersecurity teams, data, and technology to address the growing challenge of digitally-enabled fraud and abuse. This session introduces some of these approaches, including how to use data, machine learning / AI, and modified cybersecurity techniques to address fraud earlier and more effectively. Specific real-world […]