Why Compliancy Won’t Protect Reputation – and What Will.

For executives and senior professionals navigating the complexities of digital responsibility, this workshop offers a pragmatic roadmap to establishing effective cyber governance. Because in the end, it’s not just about compliance — your reputation is on the line. We go beyond checklists and delve into how to structure cyber governance strategically: goal-oriented, aligned with your […]

Elevate Your API Testing Game: WuppieFuzz in Action

With many businesses depending on communications between digital services, well-specified application programming interfaces (APIs) are used to facilitate this. However, as these APIs form a point of entry to critical applications, they are an attractive target for malicious actors. Therefore, thorough testing of these APIs is desired. With the growing number of APIs available for […]

Hyperconnected Supply Chains: Attacking Cyber Resilience

Cyber resilience is under attack. As global supply chains become increasingly hyperconnected, the convergence of Operational Technology (OT), IT, AI, and Industrial IoT (IIoT) is exposing new vulnerabilities. The Netherlands, a key hub for maritime logistics, energy, and critical infrastructure, is at the centre of these risks, facing a growing wave of cyber threats—from state-sponsored […]

Defending Olympus – On the sidelines of cyberwarfare

You are taking the role of the CISO of NeuroNexis, founded in 2037, Your company has developed a breakthrough product that allows users to upload and download information from human to device. This product, the Zeus Microchip, has just passed government approval and has both tremendous civilian and military applications. NeuroNexis has received a windfall […]

Does your future cyber workforce have what it takes?

Does your future cyber workforce have what it takes? How to attract multidisciplinary cyber talents in a fast changing digital world. In light of the current developments, the demand for cybersecurity talents and profiles is becoming increasingly diverse, which requires a completely different approach in attracting those talents. A recently published report in 2024 commissioned […]

“Face Value: A Deepfake Crisis”

“Face Value: A Deepfake Crisis” is an interactive crisis simulation designed to immerse cybersecurity professionals in a high-stakes scenario triggered by a deepfake attack. As artificial intelligence continues to evolve, deepfakes are becoming increasingly sophisticated, posing a serious threat to organizational security and reputation. In this 50-minute session, participants will take on critical C-level roles—such […]

ATHENA: interdisciplinary approaches to cybersecurity

“This interactive workshop discusses how we can address cybersecurity in operational technology (OT) in critical water infrastructures with a multidisciplinary focus on human factors, geopolitical threats, and tailored training. Defending critical infrastructures from cybersecurity threats is crucial for ensuring the continual availability of essential services. If attacked, it could have serious and potentially life-threatening consequences […]