OT Cybersecurity for Offshore Wind

DNV and Siemens Energy in 2024 invited stakeholders across the offshore wind industry to a Joint Industry Project to identify common practices for how to implement OT Cyber Security for Offshore Wind. By guiding all stakeholders with a common interpretation of standards and best practices, this broad partnership will ensure wind power remains a growing […]

NCSCs and Scientific Research

Incident Response is a highly advanced technological field that draws, ideally, from state-of-the-art scientific research in cyber security. Historically, incident response emerged from this scientific research field and for long there was a close bond between (national) cybersecurity and research in many countries across the world. However, due to the growth of the field in […]

National roles and responsibilities in cybersecurity

Cybersecurity is a shared responsibility. A clear and maintained overview of roles and responsibilities of the many involved stakeholders is therefore fundamental to an effective national cybersecurity strategy. During the presentation, an approach for clearly defining the distinct domains of Cyber Security, Cyber Law Enforcement, Cyber Defense, and Cyber Diplomacy will be explained. Where do […]

It’s One Kingdom. Let’s Start Defending Like It.

Aruba is part of the Kingdom of the Netherlands — but when it comes to cybersecurity, we don’t always act like one Kingdom. We all face similar challenges, especially when it comes to limited capacity and resources. Instead of trying to solve everything on our own, why not lean on each other more? Meanwhile, cybercriminals […]

It only takes a beer coaster to measure cyber resilience

It only takes a beer coaster to measure your cyber resilience. By comparing your organization with four levels of maturity characteristics in three different themes (people, processes and technology), printed on the back side of a beer coaster, you can get a general idea of your maturity and corresponding cyber resilience.

Following modern attacks into the cloud and beyond

Over the last years adversaries have been developing their tradecraft and at CrowdStrike we are calling this the year of the enterprising adversary. They are moving away from pure end point exploitation to increased use of voice-based phishing techniques, compromising the cloud and penetrating SaaS services. Defenders need to learn from the adversary and adapt […]

Facilitating cyberincident response for small businesses

Cyberattacks are a substantial and growing risk for small and medium-sized enterprises (SMEs). There are currently many initiatives in the Netherlands to help SMEs prevent victimization, but there are few initiatives to help them with cyber incident response. In our talk, we will present our solution to organize cyber incident response for SMEs in a […]

Hack the mind: the power of storytelling in cyber

In cybersecurity, data informs — but stories transform. You can speak in numbers, but no one remembers the spreadsheet. For CISOs and security leaders, turning complex risk into clear, human action is what actually moves the needle. Long reports? Ignored. Controls? Misunderstood. People? Tuned out. This session goes where most don’t: storytelling as a leadership […]

DORA TLPT: Strengthening financial cyber resilience

The Digital Operational Resilience Act (DORA), which came into force on January 17, 2025, mandates financial institutions to conduct Threat Led Penetration Testing (TLPT) to enhance their cyber resilience within the European Union. TLPT simulates realistic cyber attacks based on the TIBER-EU framework, aiming to identify vulnerabilities and improve the institution’s detection and response capabilities. […]

CYRA: Building Resilience & Trust in Supply Chains

In this session we explain the method of cyber rating – CYRA in short. CYRA has started with an IT module (based on ISO-27001) and the OT module (based on IEC-62443) has been added recently. In this session, we present CYRA – a cyber rating methodology designed to significantly improve digital resilience across critical supply […]