Young Cyber Talents

Closing event of the French-Dutch project ‘Young Cyber Talents’ | pitching their final results for the challenge | Jury evaluation | Award ceremony | Presentations on French-Dutch Talent Programs and other French-Dutch collaborations.

Air Force ONE? No… Human Force ONE: the importance of a trusted network

NIS2 requires a change in how NCSC and the parties can find each other. Digital First and relationship management reinforce each other so that the parties continue to feel heard and (continue to) share information. PPS, ISACs, bilateral discussions, industry associations, switching organizations, KCC, conferences, etc.. We demonstrate the NCSC’s role in building confidential relationships […]

CTI pubquiz

Welcome to the murky waters of cyber threat intelligence, where every click could be your last, and doomsday is always technically considered a scenario (unlikely… but still). Over the next 50 minutes, your team will be subjected to four rounds of carefully curated chaos, each themed around the NCSC’s CTI-teams’ favorite flavors of digital doom: […]

The governance of the PQC transition in the EU

This intervention will analyse the aspects of the governance of the PQC transition in the EU. It will explore the relevant provisions in the EU legal acts containing general implicit requirements to adopt PQC (e.g. NIS2, CRA, GDPR, DORA, eIDAS2 and other) and how they are complimented by the various policy documents making specific references […]

Why Compliancy Won’t Protect Reputation – and What Will.

For executives and senior professionals navigating the complexities of digital responsibility, this workshop offers a pragmatic roadmap to establishing effective cyber governance. Because in the end, it’s not just about compliance — your reputation is on the line. We go beyond checklists and delve into how to structure cyber governance strategically: goal-oriented, aligned with your […]

Operation PowerOFF: the power lies in the data

Operation PowerOFF is an ongoing operation focusing on the criminal DDoS-for-hire market. The objective? A sustaining impact on the global criminal ddos-for-hire marketplace by targeting the infrastructure, administrators and users through a maintained international law enforcement collaboration. By focusing on enforce, data collection and prevent measures, the whole DDoS ecosystem is included in the approach.

Stop hiring unicorns: match leadership and organisation

The cybersecurity world talks endlessly about the skills gap, but what if the real issue is a fit gap? In an industry obsessed with job titles and hard skills, we forget a basic truth: there is no single, ideal CISO profile. Every organisation is different; its business goals, risk appetite, digital maturity, culture and their […]

Defending Olympus – On the sidelines of cyberwarfare

You are taking the role of the CISO of NeuroNexis, founded in 2037, Your company has developed a breakthrough product that allows users to upload and download information from human to device. This product, the Zeus Microchip, has just passed government approval and has both tremendous civilian and military applications. NeuroNexis has received a windfall […]

“Face Value: A Deepfake Crisis”

“Face Value: A Deepfake Crisis” is an interactive crisis simulation designed to immerse cybersecurity professionals in a high-stakes scenario triggered by a deepfake attack. As artificial intelligence continues to evolve, deepfakes are becoming increasingly sophisticated, posing a serious threat to organizational security and reputation. In this 50-minute session, participants will take on critical C-level roles—such […]