• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2024
  • 2023
Edition logo

WICCON 2024

2024-10-31 - 2024-11-01
  • Thumbnail for the video - click to play

    ►

    Opening
    - Jaimy Thepass
  • Thumbnail for the video - click to play

    ►

    Hacking The Vote: Why The Paper Trail Matters In Elections
    - Fleur Van Leusden
  • Video will not be published
    Melting The Ice: Heating Up The IcedID Infrastructure
    - Ilse Ruesink
  • Thumbnail for the video - click to play

    ►

    Inside Job: Tackling Insider Risk From All Angles
    - Diana Makienko and Lucile Renhas
  • Thumbnail for the video - click to play

    ►

    Turning Neurodiversity Into A Strength
    - Tirza Dijkstra
  • Thumbnail for the video - click to play

    ►

    AirDrop Forensics
    - Kinga Kieczkowska
  • Thumbnail for the video - click to play

    ►

    Metrics Matter In Effective Human Risk Management
    - Gerine Lodder
  • Thumbnail for the video - click to play

    ►

    How To Navigate The Cyber Resilience Act
    - Raluca Viziteu
  • Thumbnail for the video - click to play

    ►

    From Galactic Hacker Party 1989 To WHY2025: The History, Future And Importance Of Dutch Hacker Camps
    - Boekenwuurm
  • Video will not be published
    Are We Quiet Quitting In Cyber?
    - Jaya Baloo
  • Thumbnail for the video - click to play

    ►

    Mission: Impossible - Chatcontrol
    - Helma De Boer
  • Video not yet published
    A Crash-Course In Container Security: What Is A Container And What Does It Have To Do With Security?
    - Irina Chiscop
  • Video not yet published
    Running Forward: Year 1 Of Building A CTI Capability For A Sportswear Brand
    - Jennifer Wennekers
  • Thumbnail for the video - click to play

    ►

    When Artificial Becomes Authentic, How Do I Prove I Am Me?
    - Nicole Van Der Meulen
  • Thumbnail for the video - click to play

    ►

    Build Your Own Role-playing Game: The Business Continuity Drill
    - Janna Brummel
  • Thumbnail for the video - click to play

    ►

    Charting The Course: Navigating Maritime Cybersecurity
    - Anna Prudnikova
  • Thumbnail for the video - click to play

    ►

    Abacus: Software For Secure And Transparent Voting Results
    - Marjolein Tamis and Ellen Van Leeuwen
  • Thumbnail for the video - click to play

    ►

    Building An Appsec Program From Scratch
    - Mireia Cano
  • Thumbnail for the video - click to play

    ►

    IR To CTI - The Other Side Of The Coin
    - Daniela
  • Thumbnail for the video - click to play

    ►

    A Glimpse Into The World Of ICS Monitoring
    - Dominika Rusek Jonkers
  • Thumbnail for the video - click to play

    ►

    Who Watches The Watchmen? Stealing Credentials From Policy-as-Code Engines (And Beyond)
    - Shelly Raban
  • Video not yet published
    Closing
    - Chantal Stekelenburg and VM