-
Spooky Action
- Jaya Baloo
-
Tales From The Trenches:
Implementing An Appsec Program
- Tess Sluijter-Stek
-
Tackling The Hidden Impact
Of Ransomware Attacks
- Inge Van Der Beijl and Gerine Lodder
-
Cybersecurity In The Automotive
Industry: Compliance And Beyond
- Anna Prudnikova
-
Anti Surveillance Knitting
- Ottilia Westerlund
-
Revolutionizing Cybersecurity:
Unleashing The Power Of AI
- Catherine De Weever
-
Tools Vs Rules: Why Technical Based Measures Work
Better Than Behavior Based Approaches In Infosec
- Fleur Van Leusden
-
What If Hacking Were A Sport?
- Maja Reissner
-
Threat Modeling Your
Personal Digital Footprint
- Daniƫlle Wagemakers
-
Cyber-Attack Detection In
Water Distribution Networks
- Rosanne Aartman
-
Creating A Cyber Strategy
Based On The Threat Landscape
- Dorrit Sliepen
-
We May Have Been Hacked,
And All We Got Was This Lousy Actor
- Sanne Maasakkers
-
Adversaries Of The Future:
The Dynamic Red Teaming Landscape
- Eva Tanaskoska
-
Closing Note
- Valentine Mairet & Chantal Stekelenburg