Do(n’t) give hackers a chance: the role of hackers within the public security domain

November 10, 2021

We invite you to participate in this Virtual Round Table, where we elaborate on how we can use an ethical hack-community to increase cybersecurity and improve awareness among employees and partners within the IT-ecosystem.

  • Small scaled peer session
  • Open dialogue by means of the Chatham House Rule
Sign up
Speaker

Jeroen Schipper

CISO

Before Jeroen Schipper started as CISO in 2018, he had a role as cyber security specialist within the Ministry of Defense. Within his current role, he is responsible for organising "The Hague Cyber Security Month". The hacking contest has become an annually returning event. This year, around 175 hackers participate in the contest. Jeroen shares his experiences on using the international hacking-community to increase cybersecurity which is relevant for local governments as private organisations.

Company

Information
Topic

Through digitalisation, efficiency and quality is increasing in the public sector. However, the dependency on IT comes with an increasing risk for cyber attacks. How can organisations make sure that not only their systems are protected, but its whole partner ecosystem is safe? To realise optimal digital security, municipality The Hague organises an annual hack-event at which ethical hackers show vulnerabilities within cybersecurity systems and suggest improvements. During this event, the municipality not only aims to protect residential data, but tries to improve awareness among employees and partners.

Program

16:55 | Call in at MS Teams meeting
17.00 | Start program including presentation & discussion.
18.30 | End

Audience

CISO’s & IT Directors

Main language

Dutch

Conditions

  • Participants have to meet the previously described target audience.
  • If applicable, our partners will be presented with every application.
  • During all our sessions, the Chatham House Rule applies. This means that the participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed. This means that no report, no photos and no recordings are made of the meeting. The presentation will also not be distributed to the participants afterwards.
Partner(s)

Contact information

Agenda

Do you wish to be informed about our upcoming sessions? Subscribe to our monthly agenda!