Joining forces for a resilient cyber world!
The CISO community provides a platform for Chief Information Security Officers (CISOs) and cybersecurity professionals in the Netherlands. By bringing together the top talents in the sector, we will be able to share knowledge, exchange experiences, and work together with the ultimate goal of increasing cyber awareness and cyber resilience in a quick-moving digital world.
Why do we need a CISO community?
Cyber-attacks can have far-reaching consequences. Even a minor privacy breach can jeopardize a company’s survival, due to legal consequences and negative media attention.
Meanwhile, digitization continues at full speed, and companies have to evolve just as fast. This is causing a shift in leaders’ opinions on security – and a corresponding change in thinking about the CISO’s role.
Over the years, the CISO role has grown and matured fast under the CIO’s wings and is now starting to stand on its own two feet by reporting directly to the board. The role can be demanding and requires professionals to combine hard and soft skills to meet requirements from many parties. Looking at all these challenges, a network of cybersecurity professionals can be extremely helpful.
Therefore, we are creating a dedicated CISO community. Our community aims to reposition cybersecurity in the boardroom, contribute to knowledge development, stimulate the conversation between relevant stakeholders, and create a cybersecurity domain ecosystem that helps security providers shape their roadmaps.
On this platform, we will expand the successful Highly Resilience Organizations (HRO) program, which relies on organizations operating at the highest cybersecurity level. We are also working on setting up an annual CISODAY, which will include the election of the CISO of the Year. In addition, a members-only environment will be created to exchange tips and knowledge securely.
By bringing together the top talents in cybersecurity, we aim to share knowledge, provide tools, and work together to accelerate the shift to a more secure digital world.
MEMBERSHIP
NEWSLETTER
Experience groups
CISO positioning & governance
Leadership is essential to developing effective cybersecurity strategies and policies. Organizations need to rethink and future-proof their cyber operating models and governance structures.
Talent & skills
The cybersecurity sector needs to address workforce shortages, but it also has an opportunity to accelerate the development of essential skills. ‘Old and wise’ experts can collaborate with ‘young and ambitious’ professionals. This group includes anything that helps build a resilient talent pool.
Competencies
The CISO’s role is broad. Technical knowledge and management skills for operations and business are essential, as are personal competencies such as soft skills, communication skills, leadership, and stakeholder management. “Infinite game skills” and a stoic mindset are useful as well.
Business continuity
Essential to ensure the resilience and operational integrity of an organization after a cyber attack or other disruption, business continuity involves preparation for and restoration of business operations. The integration of offensive and defensive cyber models and strategies is important here.
Innovation
New technologies, strategies, and ways of thinking to improve security and stay proactive are the focus here. These are crucial to the evolution and effectiveness of cybersecurity, given rapid technological advances and the ever-changing nature of threats.
Technology
Technology plays an essential role in cybersecurity. Cyber threats are evolving rapidly. Areas of technology that are fundamental to the protection of information systems and infrastructure is the focus of his group.
“The digital transition could pose a threat to our society. With more processes being online, our attack surface increases too.”
Recent articles
Remote working increases security threats, report
Criminal cyberactivity increases in run-up to U.S. election
A CISO’s guide to cybersecurity in action
Remote working increases security threats, report
Ninety-nine percent of organizations with over 2,000 employees have experienced a security attack in the last 12 months. In 44 percent of cases, this was due to remote, hybrid, or roaming workers, according to research commissioned by Xalient.
Criminal cyberactivity increases in run-up to U.S. election
On November 5, global attention will focus on the U.S. presidential election, as cybercriminals continue to exploit the digital landscape through hacking and disinformation, raising concerns about how these evolving tactics will impact this year’s election.
A CISO’s guide to cybersecurity in action
Put cyber security into action. Discover practical recommendations for top-tier technologies and tools that can augment and elevate your security initiatives as a CISO. Unlock power and potential. Explore these solutions: AI-powered threat intelligence, zero trust, a consolidated cyber security architecture and unified cloud-native security.
Fighting cybercrime with open-source SOAR tools
To combat the challenges around the existing SOAR tools and help organizations improve their cybersecurity posture, TNO has launched an open-source SOAR tool.
Cybersecurity Week in The Hague kicks off
From September 30 to October 4, The Hague’s Cybersecurity Week 2024 will bring together experts, companies and international delegations to share knowledge, collaborate, promote innovation, increase cyber awareness and strengthen cybersecurity solutions.
Stakes are high in OpenAI’s for-profit shift
OpenAI’s reported move to a for-profit organization might push Sam Altman’s plans for more data centers and nuclear energy forward, but it will come at a cost, the tech world worries, leaving no space for OpenAI’s initial top priority: keeping humanity safe.
CISO Platform Nederland, ECSO form partnership
This week, CISO Platform Nederland, the Dutch platform for Chief Information Security Officers (CISOs) and other high-ranking cybersecurity professionals in medium and large enterprises and non-profit organizations, has formalized its collaboration with the CISO Community of the European Cyber Security Organisation (ECSO).
Chinese botnet contains thousands of Dutch devices
Cyber actors linked to China have compromised over 260,000 devices with the goal of creating a botnet, the FBI reported this week. Of those devices, thousands are located in the Netherlands.
RaaS and the commercialization of cybercrime
As we get better at defending, criminals also get better at attacking. They do so by professionalizing their services, almost working similarly to legitimate software businesses, and creating a business model of attacks: selling Ransomware-as-a-Service (RaaS).
YubiKeys’ unfixable security flaw: Should you be worried?
Security researchers have detected a vulnerability in YubiKey two-factor authentication tokens that enables attackers to clone the device, its manufacturer Yubico announced this week.