From Lab to Field: Hansken Dev Joins Cyber Team
Team Cybercrime Rotterdam (TCC Rotterdam) recently dismantled a facilitator network behind large scale helpdesk fraud. The operation offers a rare inside look at how modern digital evidence techniques reconstruct a criminal modus operandi—and how Digital Forensics as a Service (DFaaS) accelerates that process. Facilitators supplied everything the callers needed: phishing portals, victim lead lists, VOIP […]
From Comments With Love
At the request of the Dutch public broadcasting company NOS, two experts of DataExpert and Infoblox investigated a wave of spammy, sexualized GIF comments on Instagram. They uncovered a coordinated campaign tied to an affiliate of the cybercriminal network VexTrio. These seemingly harmless GIFs were designed to lure users towards malicious websites, with traffic routed […]
Enhancing Cyber Resilience in European Power Grids
This session delves into the Dutch segment of the eFORT project, an EU-funded initiative aimed at bolstering the resilience and security of Europe’s power grids against failures, cyberattacks, physical disturbances, and data privacy issues. The Dutch partners in this project are TU Delft, TenneT, TNO, ENCS, and DNV, and focus among others on the development […]
Defending Europe against DDoS in a multi-polar world
This presentation examines the evolving nature of Distributed Denial of Service (DDoS) attacks as tools of hybrid warfare and proposes a collaborative European defense strategy. We provide analysis of how DDoS attacks have transformed from mere technical nuisances, to potentially disturbing tools which can cause major disruption illustrated by the attacks in 2018, to strategic […]
Dead Man’s PLC: Ransoming the Physical World via OT
Cybercrime is currently the most pervasive threat to organisations who use operational technology (OT), but it isn’t the most significant threat to OT itself. That’s because cybercrime models like ransomware and double extortion are aimed at IT and simply don’t translate well to OT. However, as cybercriminals diversify and specifically target OT, the development of […]
Cybersecurity Techniques to Solve Fraud Problems
For the last decade, tier 1 financial institutions have been using cybersecurity teams, data, and technology to address the growing challenge of digitally-enabled fraud and abuse. This session introduces some of these approaches, including how to use data, machine learning / AI, and modified cybersecurity techniques to address fraud earlier and more effectively. Specific real-world […]
Cognitive Readiness for Cyber Disruptions
Cyber disruptions are rarely clear-cut. Impact is often uncertain, timelines unclear, and threats evolve quickly. Teams must make decisions under pressure, ambiguity, and while suffering from fatigue. Yet, cybersecurity as a domain continues to underestimate the role of human performance capabilities and limitations in detection, response, and recovery. This talk introduces a cognitive readiness framework […]
Buy EU? Try Federated Self-hosted Digital Services
In the wake of continual and aggressive US trade actions, it has become increasingly common for European consumers to look for European options. Digital services are no exception. However, unlike most products, digital consumers can avoid companies altogether and self-host their own digital services. Self-hosting is nothing new, the blogs of the 1990s and early […]
10 Years of Hardware Hacking: Secret Insights & Lessons
This session offers a rare opportunity to gain exclusive insights into hardware hacking, drawn from 10 years of practical experience. Designed for a diverse audience, including non-technical attendees, the presentation combines unconventional techniques, challenges, and lessons learned without disclosing sensitive details. Strict confidentiality applies (TLP: Amber). No recordings allowed.
AP vs 32000 data breaches: Supervision & Lessons learned
How would you deal with 32.000 data breaches per year? Two inspectors of the Dutch Data Protection Authority (AP) will provide a unique insight into the inner workings of the AP as an actor within the cyber security field. First we give insights into the AP as an organization and discuss how the AP handles […]