Red is the New Blue

“Purple teaming is rapidly becoming the best approach to validate controls, measure cybersecurity resilience, and improve Security Operations. It is stepping up as go-to tool for Threat Informed and “continuous” as-sessments. This talk will demystify Purple Teaming discussing how it should be—stripping away the commercial fluff that’s built up after years—and propose a model that […]

Building awareness: A structured approach to human risk

In this presentation we’ll introduce a structured approach to awareness and training. In 2025 Dutch R&E institutes worked together with SURF to develop a process for awareness. SURF is a National Research and Educational Network (NREN). This process orders the various subjects in a logical order and makes it easier to put emphasis on specific […]

Clinical diagnostics and the Digitale Dolle Mina’s

We founded the Digitale Dolle Mina’s because the digital world must not be left out when it comes to women’s rights. But perhaps even more importantly, during the hack of Clinical Diagnostics, sensitive data of nearly a million women was stolen, and the response was underwhelming at best. Our talk will focus on what went […]

Launching the NIS2/Cbw control framework: a practical evaluation tool.

By 2026, Dutch organizations must comply with the Cyberbeveiligingswet (Cbw) and Cyberbeveiligingsbesluit (Cbb) — the national implementation of the EU’s NIS2 directive. While the exact enforcement date is still pending, the impact on organizations will be substantial. At the same time, sector-specific requirements such as BIO2 (for the public sector) and DORA (for financial institutions) are being […]

Keynote: Securing Critical Infrastructure

Today’s Critical Infrastructure, power, water/wastewater, pharmaceuticals, all rely on a vast array of OT systems to support their operations and processes. As these environments take advantage of emerging technologies such as AI, smart manufacturing, and industry 4.0, the more vulnerable these processes become. An escalation in OT focused attacks has been observed over the past […]

Keynote: The Human Element: A Workforce Transformed, A Threat Reimagined

Cybersecurity is no longer just a technical challenge—it’s a human one. AI is accelerating change and increasing threat complexity, fundamentally reshaping career paths while creating new catalysts for sophisticated cybercrime. As automation reduces the burden of routine workloads, professionals are stepping into more strategic roles that emphasize skills in AI governance, critical thinking and risk […]

Edge Devices: Your network blindspot

Edge devices are often a black box: limited transparency, minimal monitoring, and when compromised, they offer a direct stepping stone into your internal network. Precisely because signs of an attack are barely noticeable, breaches are often detected too late. And every time a new zero-day vulnerability emerges, swift and targeted investigation is essential—but in practice, […]

Growing Pains: Cyber Situation Awareness In Expanding Ecosystems

Situation awareness (SA) is a term often used in the context of cybersecurity collaborations, where knowledge about risks and threats get shared in order to increase collective resilience against cyber threats. The term has increased in popularity ever since the evaluation of the first European Directive on Network and Information Security (NIS1) stated that there […]