Programme 2 Oct - 5 Oct 2018


Register Now
One Conference (registration closed)
Separate event
|
09:15 - 17:00
Tuesday, Wednesday
One Conference (registration closed)
Critical Infrastructure Protection and Resilience Europe (CIPRE)
Side events
|
14:00 - 17:30
Tuesday, Wednesday, Thursday
Critical Infrastructure Protection and Resilience Europe (CIPRE)
Cybersecurity: Kunnen we onze weerbaarheid vergroten met een digitale geweldsinstructie?
Side events
|
15:30 - 18:00
Wednesday
Cybersecurity: Kunnen we onze weerbaarheid vergroten met een digitale geweldsinstructie?
Networking Reception: Drinks & Bites at the City Hall
Networking drinks
|
19:00 - 21:30
Wednesday
Networking Reception: Drinks & Bites at the City Hall
Cyber Security for Industrial Automation and Control Systems: An introduction of the IEC 62443 standard
Workshop track
|
09:00 - 17:00
Thursday
Cyber Security for Industrial Automation and Control Systems: An introduction of the IEC 62443 standard
Incident Response Consortium's IR18 The Hague
Incident Response Consortium's IR18 The Hague
|
09:00 - 17:00
Thursday, Friday
Incident Response Consortium's IR18 The Hague
Opening: Panel-discussion International Collaboration on Cybersecurity
Plenary track
|
09:00 - 10:30
Thursday
Opening: Panel-discussion International Collaboration on Cybersecurity
Overview Exhibitors CSW Expo
CSW Expo
|
09:00 - 17:00
Thursday, Friday
Overview Exhibitors CSW Expo
CSW Expo
Could a VDR be the answer to shadow IT?
Side sessions
|
09:30 - 10:30
Thursday
Could a VDR be the answer to shadow IT?
Eric Verhelst (Advocatenkantoor Verhelst)
How an early warning system reduces your business risk
Side sessions
|
09:30 - 10:30
Thursday
How an early warning system reduces your business risk
Krijn de Mik (FOX-IT)
Incident 2018, Automation of IR
Incident Response Consortium's IR18 The Hague
|
09:30 - 10:35
Thursday
Incident 2018, Automation of IR
Joseph Loomis (CyberSponse, Inc.)
When Sharing Is Not Caring: How Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposed Over 1.5 Billion Files
Workshop track
|
09:30 - 10:30
Thursday
When Sharing Is Not Caring: How Misconfigured FTP, SMB, Rsync, and S3 Buckets Exposed Over 1.5 Billion Files
Becky Pinkard (Digital Shadows)
Inside of advanced malware protection technology
Workshop track
|
10:00 - 10:30
Thursday
Inside of advanced malware protection technology
Yuji Ukai (FFRI)
Matchmaking event
Matchmaking
|
10:00 - 16:00
Thursday, Friday
Matchmaking event
Resilient Twin City Workshop
Side sessions
|
10:00 - 11:00
Thursday
Resilient Twin City Workshop
Cybersecurity in Spain: new developments & possibilities for bilateral cooperation
Side sessions
|
10:30 - 12:45
Thursday
Cybersecurity in Spain: new developments & possibilities for bilateral cooperation
Javier Dieguez (Basque Cybersecurity Centre)
How to design your financial strategy in the fast moving cyber security market – trends, issues and approach.
Access to Capital
|
10:45 - 11:15
Thursday
How to design your financial strategy in the fast moving cyber security market – trends, issues and approach.
Hidde de Lange (Pointer Corporate Finance)
How we boost companies with capital & support
Access to Capital
|
10:45 - 11:15
Thursday
How we boost companies with capital & support
Sebastiaan Kors (TIIN Capital)
The Dutch financing landscape for cybersecurity companies
Access to Capital
|
10:45 - 11:15
Thursday
The Dutch financing landscape for cybersecurity companies
Johan Stins (InnovationQuarter)
The History of Root Kits
Incident Response Consortium's IR18 The Hague
|
10:45 - 11:35
Thursday
The History of Root Kits
Greg Hoglund (Incident Response Consortium)
Digital Identities: The currency of the Dark Web.
Plenary track
|
11:00 - 12:00
Thursday
Digital Identities: The currency of the Dark Web.
Adam Tyler (Experian)
Securing the energy infrastructure during the Olympic Games in 2020  
Plenary track
|
11:00 - 12:00
Thursday
Securing the energy infrastructure during the Olympic Games in 2020  
Scott Jarkoff (McAfee & Tepco)
The Evolution of SSL/TLS Browser Compliance Requirements in 2018
Side events
|
11:00 - 12:00
Thursday
The Evolution of SSL/TLS Browser Compliance Requirements in 2018
Peter Galvin (Entrust Datacard)
The North-South Cyber Forensic cooperation
Workshop track
|
11:00 - 12:00
Thursday
The North-South Cyber Forensic cooperation
Mouhssine Errais (GREST Research Group ,Morocco)
The Road to Derailment for Insider Risks
Workshop track
|
11:00 - 12:00
Thursday
The Road to Derailment for Insider Risks
Elsine van Os (Signpost Six)
Accelerating growth and value creation in Cyber Security & High Tech Ventures
Access to Capital
|
11:30 - 12:00
Thursday
Accelerating growth and value creation in Cyber Security & High Tech Ventures
Willem van den Berg (Value Creation Capital)
Financiële ondersteuningsmogelijkheden door RVO
Access to Capital
|
11:30 - 12:00
Thursday
Financiële ondersteuningsmogelijkheden door RVO
Marcel Vos (RVO)
Global Ecosystem of Ecosystems Partnership in Innovation and Cybersecurity (Global EPIC)
Plenary track
|
12:00 - 17:00
Thursday
Global Ecosystem of Ecosystems Partnership in Innovation and Cybersecurity (Global EPIC)
Access to Capital Event
Access to Capital
|
13:00 - 17:00
Thursday
Access to Capital Event
How to predict & mitigate future (cyber) attacks using data science and Artificial Intelligence
Plenary track
|
13:00 - 14:00
Thursday
How to predict & mitigate future (cyber) attacks using data science and Artificial Intelligence
Pieter Jansen (Cybersprint)
Post quantum secure technologies
Plenary track
|
13:00 - 14:00
Thursday
Post quantum secure technologies
Simona Samardjiska (Radboud Universiteit)
The Boardroom Game
Side sessions
|
13:00 - 14:15
Thursday, Friday
The Boardroom Game
AI Won’t Save Us: Unthinking Tools versus Human Judgement
Workshop track
|
13:30 - 14:00
Thursday
AI Won’t Save Us: Unthinking Tools versus Human Judgement
Philipp Blaas (Cyberlight Security)
Cyber War Game
Workshop track
|
13:30 - 16:30
Thursday
Cyber War Game
Cybercriminal Ecosystem DNA: Finding Strength and Resilience in Diversity
Side sessions
|
13:30 - 14:30
Thursday
Cybercriminal Ecosystem DNA: Finding Strength and Resilience in Diversity
Andrei Barysevich (Recorded Future)
Money Laundering via the Free-to-Play Gaming Market: An Examination of MaxiTooliOS
Incident Response Consortium's IR18 The Hague
|
13:30 - 14:35
Thursday
Money Laundering via the Free-to-Play Gaming Market: An Examination of MaxiTooliOS
Travis Farell (Anomali)
Scrum Based Multidisciplinary Training Approach
Side sessions
|
13:30 - 14:00
Thursday
Scrum Based Multidisciplinary Training Approach
Kubilay Onur GUNGOR (Cyber Struggle)
UK Country Track 2018
Side sessions
|
13:30 - 16:30
Thursday
UK Country Track 2018
Application Control Bypass Workshop
Side sessions
|
14:00 - 14:30
Thursday
Application Control Bypass Workshop
Anil YUKSEL (Havelsan)
Battle for the switch-ports:  Security challenges in hyper-connected industrial/building automation
Workshop track
|
14:30 - 15:30
Thursday
Battle for the switch-ports: Security challenges in hyper-connected industrial/building automation
Michael Theuerzeit (Hudson Cybertec)
Fraud Detection and Prevention via Machine Learning in Telecom
Side sessions
|
14:30 - 15:00
Thursday
Fraud Detection and Prevention via Machine Learning in Telecom
Ugur Cagal (Netas)
How to detect Malware in Encrypted Traffic WITHOUT Decryption
Plenary track
|
14:30 - 15:30
Thursday
How to detect Malware in Encrypted Traffic WITHOUT Decryption
Christopher van der Made (Cisco)
Victim, target, collateral, or lucky? How geo politics is influencing your cyber risk posture
Plenary track
|
14:30 - 15:30
Thursday
Victim, target, collateral, or lucky? How geo politics is influencing your cyber risk posture
Eward Driehuis (SecureLink)
Panel discussion #1 IRC
Incident Response Consortium's IR18 The Hague
|
14:45 - 16:30
Thursday
Panel discussion #1 IRC
Joseph Loomis (CyberSponse, Inc.)
Hacking Cryptocurrency Miners with OSINT Techniques
Side sessions
|
15:00 - 15:30
Thursday
Hacking Cryptocurrency Miners with OSINT Techniques
Seyfullah KILIÇ (SwordSec)
Next Generation Vulnerability Management
Side sessions
|
15:30 - 16:00
Thursday
Next Generation Vulnerability Management
Melih Berk Eksioglu (Penetra Cyber Security B.V.)
The impact of a breach on a business and on individuals: how protected are you?
Side events
|
15:30 - 17:00
Thursday
The impact of a breach on a business and on individuals: how protected are you?
Philippe Mazurier (Experian)
Edward Snowden: Whistleblower or Spy? (movie)
Plenary track
|
16:00 - 17:30
Thursday
Edward Snowden: Whistleblower or Spy? (movie)
Mobile Application Security : Apps are the new end points
Unknown Type
|
16:00 - 16:30
Thursday
Mobile Application Security : Apps are the new end points
Erdem Eriş (CyberArts)
Networking drinks
Networking drinks
|
17:00 - 20:00
Thursday
Networking drinks
Building a Secure Tracking and Tracing system for postal services leveraging Blockchain and Attribute Based Encryption
Plenary track
|
09:30 - 10:30
Friday
Building a Secure Tracking and Tracing system for postal services leveraging Blockchain and Attribute Based Encryption
Ronald Hoeksma (Innopay)
GDPR & Cybersecurity Presentation
Workshop track
|
09:30 - 10:30
Friday
GDPR & Cybersecurity Presentation
Lilian Knippenberg (Strict Cybersecurity)
Hackathon Gene Doping
Side sessions
|
09:30 - 14:00
Friday
Hackathon Gene Doping
Panel-discussie Cybersecurity Onderwijs en Talent
Plenary track
|
09:30 - 11:00
Friday
Panel-discussie Cybersecurity Onderwijs en Talent
Workshop #4 IRC
Incident Response Consortium's IR18 The Hague
|
09:30 - 10:35
Friday
Workshop #4 IRC
Scaling to international markets
Side sessions
|
10:00 - 12:00
Friday
Scaling to international markets
Delphine Pronk (Ministry of Foreign Affairs)
Stage- en Banenmarkt Studenten Forensisch ICT
Side sessions
|
10:30 - 12:30
Friday
Stage- en Banenmarkt Studenten Forensisch ICT
GDPR and What it means..
Incident Response Consortium's IR18 The Hague
|
10:45 - 11:50
Friday
GDPR and What it means..
George Chebat (Incident Response Consortium)
Identity proofing - the heart of eIDs
Workshop track
|
11:00 - 12:00
Friday
Identity proofing - the heart of eIDs
Maarten Wegdam (InnoValor Software B.V. )
Responding to Cyber Extortion Attacks: The latest developments in fastest growing cyber threat
Workshop track
|
11:00 - 12:30
Friday
Responding to Cyber Extortion Attacks: The latest developments in fastest growing cyber threat
Winston Krone (Kivu Consulting BV)
The Future Impact of AI in Cyber-Crime and Cyber-Defense
Plenary track
|
11:00 - 12:00
Friday
The Future Impact of AI in Cyber-Crime and Cyber-Defense
Ennio di Rosa (DarkTrace)
The cybersecurity talent gap 
Lecture
|
11:30 - 12:30
Friday
The cybersecurity talent gap 
Capacity Building and R&D: the best cases in IoT, Energy grids, cybersecurity and decentralized eHealth on blockchain
Side sessions
|
13:00 - 14:30
Friday
Capacity Building and R&D: the best cases in IoT, Energy grids, cybersecurity and decentralized eHealth on blockchain
Igor Kotsiuba (Cyberdesk)
Industry 4.0: The New Digital Revolution
Plenary track
|
13:00 - 14:00
Friday
Industry 4.0: The New Digital Revolution
Shadi A. Razak (CyNation)
Social media as a weapon
Side sessions
|
13:00 - 14:00
Friday
Social media as a weapon
Beatrice Cadet (RedSocks Security)
The challenges of being a privacy focussed company
Presentation
|
13:00 - 14:00
Friday
The challenges of being a privacy focussed company
Ancilla van de Leest (Startpage.com)
Cyber Security Next Gen!
Access to Talent
|
13:30 - 17:00
Friday
Cyber Security Next Gen!
Next Generation Security Automation
Incident Response Consortium's IR18 The Hague
|
13:30 - 14:35
Friday
Next Generation Security Automation
Joseph Loomis (CyberSponse, Inc.)
MKB-workshop: Zit uw digitale voordeur wel op slot?
MKB Cyber Awareness
|
14:00 - 17:00
Friday
MKB-workshop: Zit uw digitale voordeur wel op slot?
A global alliance against online child exploitation
Plenary track
|
14:30 - 15:30
Friday
A global alliance against online child exploitation
Luciën Stöpler (Justice in Practice)
Open Source Techniques for Network Defenders
Incident Response Consortium's IR18 The Hague
|
14:45 - 16:30
Friday
Open Source Techniques for Network Defenders
Roberto Sanchez
Points of Light Talk
Plenary track
|
16:00 - 17:00
Friday
Points of Light Talk
Closing drinks
Unknown Type
|
17:00 - 18:30
Friday
Closing drinks
On 2 & 3 October the One Conference takes place in The Hague. This event is independently organised by the Ministry of Justice and Security and the Ministry of Economic Affairs and Climate Policy. More info: one-conference.nl

Cybers Security Week is required by law to ask permission for using cookies. We use functional cookies, and cookies for managing website statistics.
The cookies are processed anonimously. By continuing on our website, you accept the use of cookies.
Read our privacy and cookie policy for more information.

 Close