Top Categories



Nieuws Connect2Trust

Tuinbouwcluster krijgt toegang tot actuele cyberdreigings-informatie door samenwerking Connect2Trust en Cyberweerbaarheidscentrum Greenport

03-11-2022 Toegang tot de meest actuele en relevante dreigingsinformatie is een belangrijke voorwaarde om als ondernemer sneller betere beslissingen te nemen over de digitale veiligheid van je bedrijf. Belangrijke economische sectoren zoals het Nederlandse tuinbouwcluster hebben tot op heden echter nog zeer beperkt toegang hiertoe. Dat is waarom Connect2Trust en [...]

Top Voted
Sorry, there is nothing for the moment.

Cybersquad 2023

share close



Ticketsale Squad 2024

Save the date: The ticketsale will start April 12th 2024! The event will take place August 22th 2024 in The Hague. More details later! CyberSQUAD24 is the biggest Dutch cyber ...

Event details

CyberSQUAD is back! After a successful first edition in the summer of 2022, the best cybersecurity event in The Netherlands fully dedicated to young professionals will return to The Hague next summer. CyberSQUAD23 will be bigger, better, and bolder, so bring your friends and colleagues!

The non-profit foundations Connect2Trust, DIVD Academy and Jong-PvIB are once again inviting their networks and all alumni and 2023 students of the International Cyber Security Summer School (ICSSS) for an afternoon of knowledge sessions, meet-and-greets with thought leaders, cyber challenges and fun. Tickets are available via the link below. Stay tuned to find out more about the programme, venues, and of course the names of our speakers.

SOLD OUT - it is no longer possible to register

Register now and join the CyberSQUAD community

CyberSQUAD23 Logo

CyberSQUAD brings together students and alumni from summer schools, volunteers and cyberprofessionals in the early days of their careers to foster a network of the next generation CISOs, CTOs and CIOs. The CyberSQUAD summer event is a yearly cybersecurity event for young professionals that consists of 2 parts. The afternoon event (13:00 – 17:00) aims to make learning about cybersecurity fun and easy for everyone and the evening event fosters a community of enthousiastic cybersecurity professionals in the early stages of their career. Traditionally, the evening (18:00 – 23:00) is also the battlefield of the Capture-the-Flag challenge. This year with even more and bigger teams.

NEW this year are the CyberSQUAD evening events. Smaller scale events for the community to discuss relevant developments in the field of cybersecurity and meet up with peers.


Bio Brenno de Winter

Brenno is a well-known ICT researcher in the Netherlands with a special interest in information security and privacy. At only 5 years old, Brenno wrote his first computer program. He gained national fame in the Netherlands for hacking the OV-chipcard and has reported many complex problems. He currently holds the position of Chief Security and Privacy Operations at the Ministry of Health, Welfare and Sport.

Bio Melissa Bischoping

Melissa is a passionate security evangelist whose academic and professional background in human psychology and technology align to educate, advocate, and remediate the difficult security problems faced by businesses and individuals. She currently works as Director of Endpoint Security Research at Tanium where she analyzes emerging threats, zero-days, and CVEs to provide subject matter expertise for internal and external customers. Prior to Tanium, she held positions in operations and security across the hospitality, casino gaming, and industrial/manufacturing industries.

Bio Sanne Maasakkers

Sanne Maasakkers works as a security specialist at the National Cyber Security Center (NCSC). After working as an ethical hacker for several years and breaking into various parties, she now uses this ‘hacker mindset’ to protect vital infrastructure and government against threats. In addition, she is active in organizing crisis exercises, lectures, workshops and live hacking demonstrations, she has introduced more than 10,000 children and young people to hacking and coaches the European CTF team during international competitions.

Bio Robin Sommer

Robin Sommer is a Co-Founder at Corelight, a San Francisco-based startup providing network security solutions based on Zeek. He used to lead the open-source development team behind Zeek for many years. At Corelight, Robin’s been wearing various hats over time: CTO, Head of Engineering, Open Source. Before Corelight, Robin was a Senior Researcher at the International Computer Science Institute (ICSI) in Berkeley, California, where he led a range of research projects on network security and privacy. Robin has served on many review committees for academic conferences and funding organizations and has a doctorate from Technical University of Munich, Germany.

Bio Don Eijndhoven

Don Eijndhoven is a highly experienced Chief Information Security Officer. He has a long and distinguished professional record in the Cyber Security field advising globally operating enterprises as a thought leader, interim-CISO, cyber security strategist and enterprise architect. Don holds a Master’s degree in Crisis & Security Management and a Bachelor in Computer Science. He also holds multiple certifications from the prestigious Nyenrode Business University, where he is also a guest lecturer, teaching cyber security strategy and management within the Cyber Resilience curriculum. His articles on the state of affairs in the cyber security sector are regularly published both nationally and internationally. In 2011, Don founded the Dutch Cyber Warfare Community, a non-profit networking organisation which is dedicated to providing a platform for the Dutch Cyber Warfare industry.


Afternoon program 13:00 – 17:00 at Amare
Evening program 18.00 – 23.00 at Azorra

Kittens fixing compliance

Brenno de Winter

Last year OpenKAT was made available. Meanwhile it has been used in practice, expanded and new subprojects have been added while preserving our feline elements. Also the focus isn’t just technical compliance alone, but also compliance with standards based on technical facts and corresponding documents. In this talk Brenno touches on the technology and show how the approach of OpenKAT supports many aspects of your security (and compliance) need just by selecting sensible open source tools. Ultimately for security it is key how we deal with getting the PDCA-cycle effectively in use. Brenno will also talk about what the projects delivers for security, transparency, community-driven development, and access to experts. The presentation will end with the lessons learned and security observations and the way in which those have been put into source code.

Building a resilient technology ecosystem

Melissa Bischoping

In today’s rapidly evolving cyber landscape, where new vulnerabilities are exploited at an alarming rate, it is crucial to establish a culture of cyber resilience. With the constant influx of devices connecting to networks worldwide, the need to anticipate, respond to, adapt to, and recover from adverse events is more important than ever. Join Melissa Bischoping as she delves into the process of building a resilient technology ecosystem and fostering a business culture that prioritizes cyber resilience. Gain valuable insights into immediate steps that can enhance your organization’s cyber maturity and discover how to leverage multiple disciplines to develop a comprehensive strategy.

The magic of the black t-shirt

Sanne Maasakkers

For the past decade, the Dutch National Cyber Security Centre (NCSC-NL) has served as the primary reporting point for vulnerabilities discovered within Dutch government infrastructure. The issuance of a seemingly modest reward when the report was legit, has impact and is fixed – a t-shirt with the known phrase, “I hacked the Dutch Government and all I got was this lousy t-shirt” – has sparked an average of 3,500 vulnerability reports annually. In this presentation, Sanne unravels the magic behind this famous black t-shirt and delves into the attempts of reporters in their pursuit of this esteemed collector’s item.

Meet Zeek: Open Source Network Security Monitoring for Incident Response and Threat Hunting

Robin Sommer

Effective network defense requires visibility into its real-time communication—whether that’s at home or in a massive corporate environment. In this talk, we will look at Zeek, a popular open source platform for network security monitoring that is today helping protect some of the largest, and most critical, networks in the world. Zeek is an extensible framework that creates comprehensive network visibility by turning raw packets into rich streams of actionable logs. We will examine what has made Zeek popular among incident responders in many SOCs. Install Zeek yourself from!

Digital geopolitics – an aspect of daily life

Don Eijndhoven

Nation states have long since discovered the value of internet technology when applied to achieving political objectives. This ranges from stealing technology through hacking, to sabotaging electrical grids, to influencing people’s opinions through information operations. We can now safely make the statement: Digital Geopolitics is a real and very relevant field. Don will dive deeper into this subject and show you things that have a considerable impact on your daily life, but that you’ve probably never heard of before.

Organized by
divd logo
Logo PvIB

Sponsored by

About the event

When will the event take place?

Thursday August 24th, 2023.

Doors will open at 13.00u, the event starts at 13.30u. The social event in the evening will start at 18.00u.

Where will the event take place?


Spuiplein 150
2511 DG Den Haag


Beachclub Azzorra
Zwarte Pad 66

How can I reach the different event venues?


Amare is located at Spuiplein, in the centre of The Hague. Please visit the Amare website for more information:


In the evening, CyberSQUAD will continue at beachclub Azzorra.

By car: park your car at the paid parking spot “Zwarte Pad Scheveningen”, Gevers Deynootweg, 2586 HZ The Hague (open 24/7)

By tram: take line 1 or 9 to the final stop “Zwarte Pad”

By bike: we recommend you park your bike at “Biesieklette Zwarte Pad”, Gevers Deynootweg, 2586 ZZ The Hague

Who can attend this event?

The event is invite-only by the co-organizers Connect2Trust, DIVD Academy and Jong-PvIB. We also warmly welcome referrals to register for the event.


How can I register for the event?

Registration is possible through Eventbrite via

Can I register separately for the afternoon and the evening?

Yes, on the registration page you can select which parts of the event you will be attending (afternoon or evening). We encourage everyone to attend both.


I don’t like to be photographed or filmed. How can I communicate my preferences?

During the registration process, you will be asked if you have any objections against being photographed or filmed. In case you have any objections, your nametag will indicate your preferences to the on-site professionals. They will do their best to keep you out of any footage. After the event, all footage will be edited and in the case you are in a photo or video it will be adjusted or deleted.

For what purposes will the photos and aftermovie be used?

With CyberSQUAD, we are building the next generation of CISOs, CIOs and CTOs. That requires constant engagement with the community. Photos of the event and the aftermovie will be used on social media and the Connect2Trust website for promotional purposes. The predominant social medium used by Connect2Trust to communicate about CyberSQUAD is LinkedIn via the C2T corporate account and the “CyberSQUAD community” page. In addition, footage may be used on the website for people to get an impression of the 2023 event. The used footage will give an impression of the day and not single out one or a few attendees.

I don’t want my data to be stored. How can I communicate my preferences?

Please let us know via

How long will my data be stored?

Data will not be stored longer than required. Photos and videos will be used for the purpose described in the answer provided under “for what purposes will the photos and videos be used”. To that end, images can be useful for a period of 3 years. Data submitted upon registration are useful for informing about upcoming event. To that end, that data will be stored for a period of 2 years so that at least 1 upcoming edition of CyberSQUAD fall within that time period. Finally, if you want any of your data to be deleted, please let us know so via


Will the event be recorded?

No, the event is in-person only and no live video connection and/or recordings will be made. Only a few shots will be made for the aftermovie.

What will be the main language of the event?

CyberSQUAD is in English. We strive to bring together all young professionals in the Netherlands, regardless of their mother tongue.

Is the event free of charge?

Yes, attending CyberSQUAD is completely free of charge

I have another question that is not under the FAQ, how can I contact the organization?

You can always reach us at

What is the CyberSQUAD community?

CyberSQUAD is bringing together the next generation of CISO’s, CIO’s and CTO’s. Together, we are building a community that will last for years. That is what CyberSQUAD is all about. Join the SQUAD and become part of the community!

How can I stay informed about upcoming CyberSQUAD events?

Have you registered and attended the CyberSQUAD event? Then you will receive an invitation to join the CyberSQUAD community page on LinkedIn. We will use that page to foster the community.

I have dietary restrictions. How can I communicate them?

You can communicate your dietary restrictions upon registration via Eventbrite. Should your situation change, please let us know via

I registered for the event, but will no longer be able to attend. What do I do?

If unfortunately you are no longer able to attend (parts of) the event, please let us know in time (24 hours upfront) via No-shows will be charged a fee of €10,-. for any questions or problems with registration