The Hague 2023
- drinks & bites
- speakers
- hackaton
About the event
24 of august
CyberSQUAD is back! After a successful first edition in the summer of 2022, the best cybersecurity event in The Netherlands fully dedicated to young professionals will return to The Hague next summer. CyberSQUAD23 will be bigger, better, and bolder, so bring your friends and colleagues!
The non-profit foundations Connect2Trust, DIVD Academy and Jong-PvIB are once again inviting their networks and all alumni and 2023 students of the International Cyber Security Summer School (ICSSS) for an afternoon of knowledge sessions, meet-and-greets with thought leaders, cyber challenges and fun. Tickets are available via the link below. Stay tuned to find out more about the programme, venues, and of course the names of our speakers.

Introduce yourself to the brilliant minds.
The program
Start time | End time | Organisation / Subject | Location |
---|---|---|---|
13:00 | 17:00 | Amare | |
18:00 | 23:00 | Azorra |
CyberSQUAD partners
Join the CyberSQUAD movement by becoming a partner
Frequently Asked Questions
When will the event take place?
Thursday August 24th, 2023.
Doors will open at 13.00u, the event starts at 13.30u. The social event in the evening will start at 18.00u.
How can I reach the different event venues?
Afternoon
Amare
Spuiplein 150
2511 DG Den Haag
Evening
Beachclub Azzorra
Zwarte Pad 66
Scheveningen
How can I reach the different event venues?
The event is invite-only by the co-organizers Connect2Trust, DIVD Academy and Jong-PvIB. We also warmly welcome referrals to register for the event.
How can I register for the event?
Registration is possible through Eventbrite via https://www.eventbrite.nl/e/cybersquad23-registration-493669126647
Can I register separately for the afternoon and the evening?
Yes, on the registration page you can select which parts of the event you will be attending (afternoon or evening). We encourage everyone to attend both.
I don’t like to be photographed or filmed. How can I communicate my preferences?
During the registration process, you will be asked if you have any objections against being photographed or filmed. In case you have any objections, your nametag will indicate your preferences to the on-site professionals. They will do their best to keep you out of any footage. After the event, all footage will be edited and in the case you are in a photo or video it will be adjusted or deleted.
For what purposes will the photos and aftermovie be used?
With CyberSQUAD, we are building the next generation of CISOs, CIOs and CTOs. That requires constant engagement with the community. Photos of the event and the aftermovie will be used on social media and the Connect2Trust website for promotional purposes. The predominant social medium used by Connect2Trust to communicate about CyberSQUAD is LinkedIn via the C2T corporate account and the “CyberSQUAD community” page. In addition, footage may be used on the website for people to get an impression of the 2023 event. The used footage will give an impression of the day and not single out one or a few attendees.
I don’t want my data to be stored. How can I communicate my preferences?
Please let us know via cybersquad@connect2trust.nl
How long will my data be stored?
Data will not be stored longer than required. Photos and videos will be used for the purpose described in the answer provided under “for what purposes will the photos and videos be used”. To that end, images can be useful for a period of 3 years. Data submitted upon registration are useful for informing about upcoming event. To that end, that data will be stored for a period of 2 years so that at least 1 upcoming edition of CyberSQUAD fall within that time period. Finally, if you want any of your data to be deleted, please let us know so via cybersqaud@connect2trust.nl.
Will the event be recorded?
No, the event is in-person only and no live video connection and/or recordings will be made. Only a few shots will be made for the aftermovie.
What will be the main language of the event?
CyberSQUAD is in English. We strive to bring together all young professionals in the Netherlands, regardless of their mother tongue.
Is the event free of charge?
Yes, attending CyberSQUAD is completely free of charge
I have another question that is not under the FAQ, how can I contact the organization?
You can always reach us at cybersquad@connect2trust.nl
What is the CyberSQUAD community?
CyberSQUAD is bringing together the next generation of CISO’s, CIO’s and CTO’s. Together, we are building a community that will last for years. That is what CyberSQUAD is all about. Join the SQUAD and become part of the community!
How can I stay informed about upcoming CyberSQUAD events?
Have you registered and attended the CyberSQUAD event? Then you will receive an invitation to join the CyberSQUAD community page on LinkedIn. We will use that page to foster the community.
I have dietary restrictions. How can I communicate them?
You can communicate your dietary restrictions upon registration via Eventbrite. Should your situation change, please let us know via cybersquad@connect2trust.nl
I registered for the event, but will no longer be able to attend. What do I do?
If unfortunately you are no longer able to attend (parts of) the event, please let us know in time (24 hours upfront) via cybersquad@connect2trust.nl. No-shows will be charged a fee of €10,-.

Last year OpenKAT was made available. Meanwhile it has been used in practice, expanded and new subprojects have been added while preserving our feline elements. Also the focus isn’t just technical compliance alone, but also compliance with standards based on technical facts and corresponding documents. In this talk Brenno touches on the technology and show how the approach of OpenKAT supports many aspects of your security (and compliance) need just by selecting sensible open source tools. Ultimately for security it is key how we deal with getting the PDCA-cycle effectively in use. Brenno will also talk about what the projects delivers for security, transparency, community-driven development, and access to experts. The presentation will end with the lessons learned and security observations and the way in which those have been put into source code.
In today’s rapidly evolving cyber landscape, where new vulnerabilities are exploited at an alarming rate, it is crucial to establish a culture of cyber resilience. With the constant influx of devices connecting to networks worldwide, the need to anticipate, respond to, adapt to, and recover from adverse events is more important than ever. Join Melissa Bischoping as she delves into the process of building a resilient technology ecosystem and fostering a business culture that prioritizes cyber resilience. Gain valuable insights into immediate steps that can enhance your organization’s cyber maturity and discover how to leverage multiple disciplines to develop a comprehensive strategy.
For the past decade, the Dutch National Cyber Security Centre (NCSC-NL) has served as the primary reporting point for vulnerabilities discovered within Dutch government infrastructure. The issuance of a seemingly modest reward when the report was legit, has impact and is fixed – a t-shirt with the known phrase, “I hacked the Dutch Government and all I got was this lousy t-shirt” – has sparked an average of 3,500 vulnerability reports annually. In this presentation, Sanne unravels the magic behind this famous black t-shirt and delves into the attempts of reporters in their pursuit of this esteemed collector’s item.
Effective network defense requires visibility into its real-time communication—whether that’s at home or in a massive corporate environment. In this talk, we will look at Zeek, a popular open source platform for network security monitoring that is today helping protect some of the largest, and most critical, networks in the world. Zeek is an extensible framework that creates comprehensive network visibility by turning raw packets into rich streams of actionable logs. We will examine what has made Zeek popular among incident responders in many SOCs. Install Zeek yourself from https://zeek.org!
Nation states have long since discovered the value of internet technology when applied to achieving political objectives. This ranges from stealing technology through hacking, to sabotaging electrical grids, to influencing people’s opinions through information operations. We can now safely make the statement: Digital Geopolitics is a real and very relevant field. Don will dive deeper into this subject and show you things that have a considerable impact on your daily life, but that you’ve probably never heard of before.