-
Opening
- Chantal Stekelenburg,VM,Daniëlle Wagemakers,Jaimy Thepass and Faith Opiyo
-
Hacking The Vote: Why The
Paper Trail Matters In Elections
- Fleur Van Leusden
-
Serious Gaming For Behavioural Change
- Nancy Beers and Karen Sikkema
-
Melting The Ice:
Heating Up The IcedID Infrastructure
- Ilse Ruesink
-
Hackshield
- Emily Jacometti
-
Inside Job:
Tackling Insider Risk From All Angles
- Diana Makienko and Lucile Renhas
-
Turning Neurodiversity
Into A Strength
- Tirza
-
Defender Chronicles:
The Defeat Of The Ransomware Curse
- Maresa Vermulst and Martine Koch
-
AirDrop Forensics
- Kinga Kieczkowska
-
Metrics Matter In
Effective Human Risk Management
- Gerine Lodder
-
How To Navigate The
Cyber Resilience Act
- Raluca Viziteu
-
100 Ways To Die At Work
- Tamara Onos
-
From Galactic Hacker Party 1989 To WHY2025:
The History, Future And Importance Of Dutch Hacker Camps
- Boekenwuurm
-
Are We Quiet Quitting In Cyber?
- Jaya Baloo
-
Mission: Impossible - Chatcontrol
- Helma De Boer
-
Introduction To Industrial
Control Systems: Hands-On Hacking
- Marc Visser
-
A Crash-Course In Container Security: What Is A
Container And What Does It Have To Do With Security?
- Irina Chiscop
-
Running Forward: Year 1 Of Building A
CTI Capability For A Sportswear Brand
- Jennifer Wennekers
-
When Artificial Becomes Authentic,
How Do I Prove I Am Me?
- Nicole Van Der Meulen
-
Build Your Own Role-playing Game:
The Business Continuity Drill
- Janna Brummel
-
Charting The Course:
Navigating Maritime Cybersecurity
- Anna Prudnikova
-
Hâck The Hague: Making Impact
With Your Vulnerability Reports
- Lilian Knippenberg and Reinout Hoornweg
-
Abacus: Software For Secure
And Transparent Voting Results
- Marjolein Tamis and Ellen Van Leeuwen
-
Building An Appsec
Program From Scratch
- Mireia Cano
-
Surprise
- Surprise
-
Is Telegram The New Darkweb?
- Laura Pavias and Maike Borst
-
Who Watches The Watchmen? Stealing Credentials
From Policy-as-Code Engines (And Beyond)
- Shelly Raban
-
Closing
- Chantal Stekelenburg and VM