Threat Landscape on IACS for the Netherlands
What threat do asset owners of industrial control systems encounter? Rik van Dijk and Robin Staa present the findings from the first NCSC-NL threat landscape on IACS. This landscape examines relevant events and threats from the period 2023-2024. The session will delve into the primary trends, threats and incidents.
The Elephant in the Room: addressing insider threats. Lessons and good practices from Dutch organizations
When addressing security issues, external threats seem to be the sole point of focus. We often miss the fact that our own employees, colleagues or business partners – people whom we trust – could also pose a significant threat to organizations. This threat arises from their authorized access to information and systems, making it challenging […]
Governance Session Day 1 (TBA)
More information about this session will follow soon
ENSOC: Strengthening EU Cybersecurity Through Cross-Border Collaboration
The ENSOC project, a collaborative effort by seven EU member states (Austria, Luxembourg, Romania, Netherlands, Portugal, Italy, and Spain), aims to establish a cross-border Security Operation Centre (SOC) platform. This initiative is designed to enhance the detection and prevention of cyber threats, providing timely warnings to authorities and stakeholders, thereby reinforcing the European Cybershield. The […]
How do we communicate product security?
More information about this session will follow soon
A Bridge to Secure by Design for OT
The current state of critical infrastructure is a collection of legacy infrastructure integrated together over decades. This status quo makes the role of a defender disproportionally difficult. The alternative is Secure by Design, a Cybersecurity and Infrastructure Security Agency (CISA) intiative to push for manufacturers to eliminate classes of vulnerabilities from their products. Secure products, […]
Innovating Cybersecurity Education and Ethical Hacking
As cybersecurity threats escalate, the need for adept professionals grows. Experts from DIVD Academy, HackShield, and re_B00TCMP will discuss innovative approaches to cybersecurity education and ethical hacking. We’ll explore engaging educational strategies such as gamification and practical learning, emphasize the critical role of ethical hacking, and discuss ways to involve the community in cybersecurity efforts. […]
Back to Basics: Real Life Incident Stories Show Why
Many digital incidents are caused by not having basic security controls in order. That is a shame, because relatively simple steps can often make organisations a lot more cyber-resilient. At the same time, organizations are different, which means that there is no one-size-fits-all. This is why NCSC and DTC created the 5 basic principles of […]
Communication Styles & Adapting Them During Cyber Crises
In cybersecurity, effective and adaptive communication during crises is critical. Yet, while many cybersecurity professionals are naturally incentivized to strengthen their technical skills, there tends to be more friction in motivating them to work on communication skills. In other words, it is rarely something that individuals and teams invest time into proactively improving. This workshop […]
CISOs Building Defensible Business Cases using AI & CRQ
CISOs are at the forefront of safeguarding organizations against cyber threats and in pursuit of managing cyber risk effectively for the business. Three of the biggest challenges they encounter are: Organizations find it challenging to articulate funding requirements for their cyber program, based on a clearly articulated and well understood cyber risk posture in dollars […]