Netherlands

Events

Mobile App Hacking Training
Date: 01 Oct 2019

Learn how to identify security flaws in iOS & Android apps to reduce costs by implementing security features early on.

The Mobile Security training course consists of two days. The first day is focused on Android and the second day on iOS. We start from a theoretical perspective with practical exercises in each afternoon, so you go home with a toolbox and practical experience.

Smartphone, a big brother predicting you
Date: 01 Oct 2019

Smartphones are build to become our most versatile assistant at hand. Despite the convenience they offer, their knowledge about us could be used against us. During this event, we will talk about why and how you can take control of your data on your smartphone.

Social setup: A conversation to understand the smartphone universe and how it affects our life.

Functional setup: Hands-on privacy approach for smartphones. Focus on technical security (aka installing tools); and on operational safety, which is how to develop patterns of use and behaviour to enhance our privacy needs.

During this event, we will talk about how you can take control of your data on your smartphone.

Smartphones are build to become our most versatile assistant at hand. Despite the convenience they offer, their knowledge about us could be used against us.

We will start by discovering how a smartphone works. To understand why smartphones become an infallible companion that goes around with us all the times, helping us getting around on this highly demanding world.

In between, we will observe how privacy does not come by default and how much personal data is leaking away. Most importantly, we will learn and practice what we can do to protect ourselves and our networks.

Secure Programming Training
Date: 03 Oct 2019

With the amount of (attempted) security breaches and high-paced agile sprint cycles, securing your software from day 1 is a major cost-saver. Know where common security flaws lie and how they can be prevented.

With the amount of (attempted) security breaches and high-paced agile sprint cycles, securing your software from day 1 is a major cost-saver. When developers know where common security flaws lie and how they can be prevented, the risk of security breaches and costs will be reduced by implementing security features early on. This course is given by Secura security experts, focused on code review and application security.

Hacker Mindset Workshop
Date: 09 Oct 2019

Join this interactive workshop to better understand the approach of an attacker and gain knowledge about technical vulnerabilities.

During the Hacker Mindset workshop, a guided, hands-on, technical session will be held where participants will be attacking a vulnerable application. Part frustration, part exhilaration, as these are both key elements in what drives hackers and will help you understand why hackers do what they do. We start with a vulnerable web application, and end with total control over the web server by compounding small design mistakes, vulnerabilities, and misconfigurations.

Smartphone a privacy checkup
Date: 10 Oct 2019

Smartphones are build to become our most versatile assistant at hand. Despite the convenience they offer, their knowledge about us could be used against us. During this event, we will talk about why and how you can take control of your data on your smartphone.

Social setup: A conversation to understand the smartphone universe and how it affects our life.

Functional setup: Hands-on privacy approach for smartphones. Focus on technical security (aka installing tools); and on operational safety, which is how to develop patterns of use and behaviour to enhance our privacy needs.

During this event, we will talk about how you can take control of your data on your smartphone.

Smartphones are build to become our most versatile assistant at hand. Despite the convenience they offer, their knowledge about us could be used against us.

We will start by discovering how a smartphone works. To understand why smartphones become an infallible companion that goes around with us all the times, helping us getting around on this highly demanding world.

In between, we will observe how privacy does not come by default and how much personal data is leaking away. Most importantly, we will learn and practice what we can do to protect ourselves and our networks.
DONATION BASED [suggested 10 €]

Threat Modeling Training
Date: 18 Oct 2019

It is important to ensure focus and efficiency by doing the most important security assessments on the right targets. However, what are these and how can you determine where the focus should be? Within this course our experts teach you how to do threat modeling according to the STRIDE methodology to support answering these questions. Learn how to: - Find problems when there's time to fix them - Identify the issues with the most risk first - Address Security Development Lifecycle (SDL) requirements - Deliver more secure products - Save costs

The eight-hour training course is divided in multiple sections.

Section 1: Introduction to threat modeling
The training course starts off with general introductions about threat modeling. What exactly is threat modeling, what are the benefits of it, and what are the basics of threat modeling.

Section 2: Creating a DFD-Diagram
We will create a DFD (Data Flow Diagrams) of a real-life case as an example. During the creation of the diagram we will jointly think about which aspects are important to how to create these diagrams in practice.

Section 3: Identifying threats
After creating a diagram, the threats can be identified. In this part we will introduce methods that can be used for this purpose, such as STRIDE, attack trees and attack libraries. Next, we will discuss STRIDE in more detail.

Section 4: Mitigating threats
After identifying the applicable threats, the following step is to mitigate these in a structural way and to validate whether these threats have been successfully mitigated.

Section 5: Implementing threat modeling in the Security Development Lifecycle
How can you implement threat modeling in the existing development processes and when should you perform threat modeling?

Lastly you get tips and tricks to lead efficient threat modeling sessions to get the maximum result in a short period of time.

FamilyFest: VirusFighters (4-12 yrs)
Date: 23 Oct 2019

During the autum holiday, families are VIPs in Het Nieuwe Instituut. Enjoy a full program of crazy workshops with designers and artists.

Het Nieuwe Instituut presents FamilyFest. A crazy fun day where families are VIPs. This time, the theme of the day is 'virusses'. Imagine colorful virusses with make-up artist Souad Laaziz, discover the exhibition Malware in an exiting speedtour, perform dramatic computer-diescenes with choreographer Bas van der Kruk and infect the world with your creative ideas.

Infosecurity, Data & Cloud expo
Date: 30 Oct 2019

Tradeshow and conference on IT-Security, Data Management And Coud Computing

Infosecurity.nl, Data & Cloud Expo is the top Dutch exhibition in the field of IT security, data management and cloud computing for IT managers and IT professionals. With 150 exhibitors and more than 100 sessions are you with one event up to date about Cyber Security, Cloud Computing, Datacenter & Infrastructure Optimisation, Data Science & Management, Digital Transformation, IT Service Management & Control and Privacy, Governance & Risk Management. Register now for free entrance.

Hikvision Cyber Security Event
Date: 31 Oct 2019

Cyber security event focused on the video surveillance industry, with additional focus on privacy and GDPR regulation.

We have seen a rapid burst in technological developments in the video surveillance industry, mostly focused around devices that can, and are most of the time, linked to the internet. This, in turn, leads to an increased need for awareness and knowledge concerning cyber security in our industry. In-depth seminars about this topic, as well as privacy and GDPR regulations, will be hosted at the Hikvision European Headquarters in Hoofddorp, the Netherlands, followed by a panel discussion with industry experts.

Cyber Kitchen Cooking
Date: 31 Oct 2019

Networking event around Cyber security

We proudly present Cyber Kitchen - the ultimate cookbook for hackers with a range of cyber dishes with appealing names such as Patch Pizza, Infected Chicken, Phishing Potpourri and Back-door lamb.
On 31 October, we organize the Cyber Kitchen event at restaurant FG Foodlabs of top chef François Geurds in Rotterdam. With our Cyber Kitchen concept, we want to get you in the mood for enjoying good food and interesting discussions about cyber security with your peers and our Cyber Security Team.
Cyber Kitchen is more than just cookbook. In addition to dishes and cooking tips, it contains a generous portion of inspiration about cyber security issues such as viruses, phishing, social engineering and ransomware. Register now and receive a copy of our exclusive cookbook.

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information