Inside NCSC’s CTI Team: Tracking Threat Actors Targeting the Netherlands

“From covert state-backed espionage to financially motivated cybercrime, from politically charged hacktivism to digital sabotage—threat actors targeting the Netherlands come in many forms, and their tactics are constantly evolving. In this talk, the Cyber Threat Intelligence (CTI) team of the Dutch National Cyber Security Centre (NCSC) offers a rare behind-the-scenes look at how they investigate […]

Hunting at scale, identifying Internet connected OT devices

Have you ever been on an Internet safari? Join us on an expedition into the world of internet-connected OT-devices! We’ll introduce you to our OT Big Five and share fascinating cases we have encountered. We’ll also explore the motivations behind our research, how the NCSC identifies OT-devices at scale using repeatable methods, and the legal […]

Cyber Security Risks Abroad

Traveling abroad can pose risks to the security of your laptop and other devices. Our presentation will discuss the threats of cyber attacks, device tampering and share tips on how to protect your devices and data from unauthorized access.

Safeguarding national security in government contracts – ABRO

Supply has been and increasingly will be a target for cybercrime and state actors. Our changing world also requires the Dutch government to change the way it protects its key interests across the vast network of suppliers. Many government suppliers provide essential products and services that intersect with the core processes and assets of government […]

You’re not secure by design, if you’re not memory safe!

What if 70% of all vulnerabilities in the critical infrastructure of tomorrow could be prevented with one simple decision? Memory safety is not just an implementation detail that only engineers should talk about; it is a crucial requirement for building software that is safer and more secure by design. In this talk, we’ll explore what […]

Vulnerability Disclosure in the Energy Sector

The European electricity network has become a ‘smart grid.’ This offers many opportunities for sustainability but also makes our energy system more vulnerable to digital attacks. In a time of increasing threat of hybrid warfare, the government and the energy sector realize that we as a society must prepare for possible disruption of the energy […]

Turning Malware Against Itself for Proactive Defense

What if the key to stopping malware was hidden inside the malware itself? In this talk, we will explore the concept of malware vaccines—leveraging the techniques malware uses for self-preservation to turn the tables on attackers. By analyzing how malware checks its execution environment—whether through sandbox evasion, mutex creation, process enumeration, or infection markers—we can […]

Transparency as a Security Control: Rebuilding Trust in Technology

As governments increasingly deploy powerful digital tools—biometrics, surveillance AI, predictive analytics—the public trust in those same institutions is eroding. Transparency is often framed as a communications exercise or regulatory compliance task. But what if we treated it as a core cybersecurity control? This session explores real-world models of proactive transparency, where government agencies have used […]