From due diligence to resilience: how to secure your most critical suppliers

Many organizations rely heavily on their suppliers. In some cases, critical suppliers are even more important than an organization’s own business units. Despite the importance of certain suppliers, we often treat critical suppliers very differently compared to our own organization’s critical business units. In this talk we discuss why this gap can be problematic and […]

So Long, and Thanks for All the Phish: A Rare Look Behind the Scenes of a Global Phishing-as-a-Service Operation

This session unveils the inner workings of Darcula, the largest phishing-as-a-service (PhaaS) operations active globally. Through meticulous investigation, we trace Darcula’s infrastructure, from its impersonation of 236 brands to the 30.000+ active phishing domains and 884000+ stolen cards uncovered. This behind-the-scenes journey combines forensic analysis and opensource intelligence (OSINT). The audience will gain rare insights […]

Air Force ONE? No… Human Force ONE: the importance of a trusted network

NIS2 requires a change in how NCSC and the parties can find each other. Digital First and relationship management reinforce each other so that the parties continue to feel heard and (continue to) share information. PPS, ISACs, bilateral discussions, industry associations, switching organizations, KCC, conferences, etc.. We demonstrate the NCSC’s role in building confidential relationships […]

CERTain Expectations: An Empirical Study into the Challenges of Sector CSIRTs

Sectoral Computer Security Incident Response Teams (sector CSIRTs) play an increasingly vital role in managing cybersecurity incidents within specific sectors, such as local government or critical infrastructures. Despite their growing importance, there is a lack of industry guidance and academic research on the unique challenges faced by sector CSIRTs. This study aims to fill this […]

Modernizing Threat Detection: The Future of the Dutch National Detection Network in the NIS2 Era

As part of the NIS2 program, we are making major steps in modernizing the National Detection Network (NDN). Traditionally focused on network sensors within the central government, the NDN is now being expanded to support new technologies, including detection capabilities in cloud environments. We’re also making the NDN scalable, enabling all NIS2-covered organizations to share […]

Announcing a new NCSC-NL tool: Analysis tools for Cyberexperts

We often work under intense time pressure in complex and challenging situations when limited information is available. It’s easy to fall back on our gut feeling as opposed to our training. We overlook critical details or fill in the blanks ourselves. This is completely understandable. It’s human nature to rely on instinct and assumptions when […]

Operation Heart Blocker – Disrupting the market of a cybercrime syndicate

In Operation Heart Blocker, we dealt a major blow to one of the largest “Cybercrime As A Service” networks. The organization behind this network had dozens of webshops where cybercrime tools were offered and operated as a professional company. This presentation explains how we ultimately mapped out a complete worldwide network of malicious webshops and […]

Bucket Leaks: From Exposure to Cloud Takeover

With the growing reliance on cloud services for storage and deployment, securing cloud environments has become critically important. Cloud storage solutions like AWS S3, Google Cloud Storage, and Azure Blob Storage are widely used to store vast amounts of data, including sensitive configuration files used in software development. These files often contain secrets such as […]

Why do we underestimate ourselves in a digital world?

The human factor in cybersecurity is often portrayed as a flaw to be corrected. But in reality, the uniquely human abilities of emotional and informational intelligence—our capacity to read intent, detect manipulation, apply intuition, and judge nuance—are the very strengths we need most. In the rush for AI, automation, and scalable defenses, we risk neglecting […]