-
Opening
- Jaimy Thepass
-
Hacking The Vote: Why The
Paper Trail Matters In Elections
- Fleur Van Leusden
-
Melting The Ice:
Heating Up The IcedID Infrastructure
- Ilse Ruesink
-
Inside Job:
Tackling Insider Risk From All Angles
- Diana Makienko and Lucile Renhas
-
Turning Neurodiversity
Into A Strength
- Tirza Dijkstra
-
AirDrop Forensics
- Kinga Kieczkowska
-
Metrics Matter In
Effective Human Risk Management
- Gerine Lodder
-
How To Navigate The
Cyber Resilience Act
- Raluca Viziteu
-
From Galactic Hacker Party 1989 To WHY2025:
The History, Future And Importance Of Dutch Hacker Camps
- Boekenwuurm
-
Are We Quiet Quitting In Cyber?
- Jaya Baloo
-
Mission: Impossible - Chatcontrol
- Helma De Boer
-
A Crash-Course In Container Security: What Is A
Container And What Does It Have To Do With Security?
- Irina Chiscop
-
Running Forward: Year 1 Of Building A
CTI Capability For A Sportswear Brand
- Jennifer Wennekers
-
When Artificial Becomes Authentic,
How Do I Prove I Am Me?
- Nicole Van Der Meulen
-
Build Your Own Role-playing Game:
The Business Continuity Drill
- Janna Brummel
-
Charting The Course:
Navigating Maritime Cybersecurity
- Anna Prudnikova
-
Abacus: Software For Secure
And Transparent Voting Results
- Marjolein Tamis and Ellen Van Leeuwen
-
Building An Appsec
Program From Scratch
- Mireia Cano
-
IR To CTI - The Other Side Of The Coin
- Daniela
-
A Glimpse Into The World Of ICS Monitoring
- Dominika Rusek Jonkers
-
Who Watches The Watchmen? Stealing Credentials
From Policy-as-Code Engines (And Beyond)
- Shelly Raban
-
Closing
- Chantal Stekelenburg and VM