top of page

Building Cyber Security Culture

The following talks are available as your stepping stone towards understanding and developing cyber security culture. Every talk is customizable to your industry or theme along with real examples and custom talks can be created for any cyber security and privacy related topic.

structure.jpg

Inside The Hacker Mind

Understanding cyber attacks for everyone by showing how a hacker thinks

tom (1 von 3).jpg

The Shadow of AI & Cyber Security

It's time to start thinking outside the bots. What AI means for your cyber defense 

22b_edited.jpg

Software Supply Chains Under Threat

How do we regain control of software stacks?

structure_edited.jpg

Talk 1

Inside The Hacker Mind

Have you ever wanted to look through the eyes of a hacker?

Want to see a real hacker at work? Do you know what hackers go for first and why? Do you know the most used mistake made within organisations when it comes to trying to protect themselves against the worse case scenarios?

Then you are in for a treat! Tom Van de Wiele will show your organisation not only how cyber attacks occur, you will be able to see, touch and experience the things that make cyber attackers successful.

Understanding cyber attacks should not just be for technical audiences
 

Understanding cyber attacks should not just be for technical audiences because criminals focus on both technical and non-technical victims. That is why this presentation is for all audiences.
 

Using over 23 years of professional hacker and intrusion consultancy experience, Tom Van de Wiele brings an informative and engaging presentation on how cyber crime and attacks work from target selection to data theft, what attackers are thinking and need and how you can help make life miserable for them.

Real-life examples are shown to get a better understanding on what happens behind the scenes of an attack. Better understanding the attack process enables the defenders to think defensively. To become more hacker minded.

Length
40 minutes with Questions & Answers


Audience
This presentation was created with a wide audience in mind, suitable for all 

tom (1 von 3).jpg

Talk 2

The Shadow of AI & Cybersecurity

Thinking outside the bots

Generative AI is part of our personal lives and businesses but its impact on cyber security is constantly evolving. But what does it mean for your business and cyber security strategy?

Understanding the impact of AI on cyber security is not a luxury

Do online attackers now really possess super human writing skills to write the perfect phishing email? Can AI and LLMs be used to make undetectable malware? Can all my company data be stolen through my service desk chatbot? Why is it so hard to make a DeepFake image or video detector? How do we use AI to our own benefit and our own defense? These and other questions will be answered in this insightful presentation along with recent media examples and self-developed proof of concept experiments.

Topics such as ethics, threat modeling, compliance and future planning are also discussed in this talk that will inform and inspire your organisation to think differently and more defensively about how it adapts generative AI as part of your cyber security strategy. 

Using over 23 years of professional hacker and intrusion consultancy experience, Tom Van de Wiele brings an informative and engaging presentation on how generative AI influences cyber crime and how defenders can adapt and learn how to plan ahead by learning how AI trustworthiness can be threatened and what can be done about it.

Length
40 minutes with Questions & Answers


Audience
This presentation was created with a wide audience in mind, suitable for all 

AI is here, but what does mean for your organisation's cyber defense?

22b.jpeg

Talk 3

Software Supply Chains Under Threat

How do we regain control over our software stacks?

Software supply chains are what has given us the mobile apps in our pocket, the applications we use on a daily basis and the luxury and convenience that comes with software in combination of the internet. But with creation comes maintenance and upkeep, and it is here combined with the distributed and fractured state of software supply chains we come to the situation of today: a big hot mess that is the target of criminals, state actors and organized crime.

Free software has a price

Free and open-source software (FOSS) has given a lot of businesses a leg up when it comes to speed of innovation and creativity. But the modular nature of software development, where dependencies on other projects introduce vulnerabilities and maintenance challenges are still being underestimated. And as development environments become more abstract and complex, where developers are mini-administrators on their own patches in the cloud, things can get dangerous pretty fast when an incident occurs.

So how do we regain control, where do you need to make the necessary investments and how do we get ourselves out of this situation? 

Using over 23 years of professional hacker and intrusion consultancy experience, Tom Van de Wiele brings an informative and engaging presentation on the history and difficulties of securing software stacks we all use every day and how a strategy for better software security environments and oversight is possible.

Length
40 minutes with Questions & Answers


Audience
This presentation was created with a wide audience in mind, suitable for all

bottom of page