SBOM: beyond simply listing CVEs
Organizations need to manage cybersecurity risks in increasingly complex IT and OT infrastructures that are comprised of heterogeneous systems and services, both on-premise and in the cloud. Many of these components are produced or provided by third parties, exposing organizations to various risks that need to be carefully managed and mitigated (a.o. to prepare for […]
ReArming Europe: Cyber Sovereignty Starts Now
Europe faces a decisive moment in cybersecurity. As digital threats escalate and alliances shift, the question is whether Europe will lead in cybersecurity or stay dependent. The EU’s ReArm Europe / Readiness 2030 shows intent, but funding alone won’t deliver sovereignty. Drawing on experience from U.S. Cyber Command, NSA, and the Defense Intelligence Agency, and […]
Outlook One Financial Threat Landscape
The FI-ISAC is pleased to present the One Financial Threat Landscape. FI-ISAC. Through collaboration, we create the One Financial Threat Landscape. The One Financial Threat Landscape provides insight into the 10 biggest threats facing our industry. It is a product created by the financial sector, used by the financial sector, but delivering value across the […]
OT Cybersecurity for Offshore Wind
DNV and Siemens Energy in 2024 invited stakeholders across the offshore wind industry to a Joint Industry Project to identify common practices for how to implement OT Cyber Security for Offshore Wind. By guiding all stakeholders with a common interpretation of standards and best practices, this broad partnership will ensure wind power remains a growing […]
NCSCs and Scientific Research
Incident Response is a highly advanced technological field that draws, ideally, from state-of-the-art scientific research in cyber security. Historically, incident response emerged from this scientific research field and for long there was a close bond between (national) cybersecurity and research in many countries across the world. However, due to the growth of the field in […]
National roles and responsibilities in cybersecurity
Cybersecurity is a shared responsibility. A clear and maintained overview of roles and responsibilities of the many involved stakeholders is therefore fundamental to an effective national cybersecurity strategy. During the presentation, an approach for clearly defining the distinct domains of Cyber Security, Cyber Law Enforcement, Cyber Defense, and Cyber Diplomacy will be explained. Where do […]
It’s One Kingdom. Let’s Start Defending Like It.
Aruba is part of the Kingdom of the Netherlands — but when it comes to cybersecurity, we don’t always act like one Kingdom. We all face similar challenges, especially when it comes to limited capacity and resources. Instead of trying to solve everything on our own, why not lean on each other more? Meanwhile, cybercriminals […]
It only takes a beer coaster to measure cyber resilience
It only takes a beer coaster to measure your cyber resilience. By comparing your organization with four levels of maturity characteristics in three different themes (people, processes and technology), printed on the back side of a beer coaster, you can get a general idea of your maturity and corresponding cyber resilience.
Facilitating cyberincident response for small businesses
Cyberattacks are a substantial and growing risk for small and medium-sized enterprises (SMEs). There are currently many initiatives in the Netherlands to help SMEs prevent victimization, but there are few initiatives to help them with cyber incident response. In our talk, we will present our solution to organize cyber incident response for SMEs in a […]
Following modern attacks into the cloud and beyond
Over the last years adversaries have been developing their tradecraft and at CrowdStrike we are calling this the year of the enterprising adversary. They are moving away from pure end point exploitation to increased use of voice-based phishing techniques, compromising the cloud and penetrating SaaS services. Defenders need to learn from the adversary and adapt […]