Sign in to view Vincent’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
The Hague, South Holland, Netherlands
Sign in to view Vincent’s full profile
Vincent can introduce you to 10 people at Modat
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
4K followers
500+ connections
Sign in to view Vincent’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Vincent
Vincent can introduce you to 10 people at Modat
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Vincent
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Vincent’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Specialties:
Leading CISO teams…
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
4K followers
-
Vincent Thiele shared thisHope to see you there! If you are around, just ping me and we will get a coffee 👍 #Modat #ThreatIntelligence #FIRSTCTI26Vincent Thiele shared thisWe’re proud to be a «𝐂𝐡𝐚𝐦𝐩𝐢𝐨𝐧 𝐒𝐩𝐨𝐧𝐬𝐨𝐫» at 𝐭𝐡𝐞 𝐅𝐈𝐑𝐒𝐓 𝐂𝐓𝐈 𝐂𝐨𝐧𝐟𝐞𝐫𝐞𝐧𝐜𝐞 in Munich Apr 21-23. If you’re here too, come to find us Vincent Thiele and Koen Volwerk. #Modat #FIRSTCTI26 #ModatMagnify #cybersecurity #internetintelligence
-
Vincent Thiele reposted thisVincent Thiele reposted this𝐅𝐨𝐜𝐮𝐬𝐢𝐧𝐠 𝐨𝐧 𝐈𝐫𝐚𝐧’𝐬 “𝐛𝐥𝐚𝐜𝐤𝐨𝐮𝐭” 𝐦𝐢𝐬𝐬𝐞𝐬 𝐭𝐡𝐞 𝐛𝐢𝐠𝐠𝐞𝐫 𝐩𝐢𝐜𝐭𝐮𝐫𝐞 𝐨𝐟 𝐰𝐡𝐚𝐭’𝐬 𝐡𝐚𝐩𝐩𝐞𝐧𝐢𝐧𝐠 𝐭𝐨 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐢𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐚𝐜𝐫𝐨𝐬𝐬 𝐭𝐡𝐞 𝐌𝐢𝐝𝐝𝐥𝐞 𝐄𝐚𝐬𝐭 𝐝𝐮𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐜𝐨𝐧𝐟𝐥𝐢𝐜𝐭. The data tells a different story. Our latest research at Modat examines how internet infrastructure actually behaved across 8 countries during the Middle East conflict. Infrastructure didn't disappear. It revealed three distinct strategies These findings change how you think about it: 𝐈𝐧𝐟𝐫𝐚𝐬𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐝𝐨𝐞𝐬𝐧'𝐭 𝐝𝐢𝐬𝐚𝐩𝐩𝐞𝐚𝐫. 𝐈𝐭 𝐫𝐞𝐟𝐥𝐞𝐜𝐭𝐬 𝐝𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐭 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐢𝐜 𝐜𝐡𝐨𝐢𝐜𝐞𝐬. Three distinct patterns emerged: 𝐈𝐫𝐚𝐧 – 𝐌𝐞𝐝𝐢𝐚𝐭𝐢𝐨𝐧: Near-total external visibility collapse. But instead of a void, new layers appear: proxy infrastructure and controlled gateways. Access doesn’t vanish; it becomes tightly mediated. 𝐈𝐬𝐫𝐚𝐞𝐥 – 𝐃𝐞𝐜𝐞𝐩𝐭𝐢𝐨𝐧: Exposed infrastructure scaled ~27x in a month. The dominant category? Honeypots. Flood the attack surface with decoys, let adversaries exhaust themselves, learn their tactics. 𝐆𝐮𝐥𝐟 𝐒𝐭𝐚𝐭𝐞𝐬 – 𝐒𝐭𝐚𝐛𝐢𝐥𝐢𝐬𝐚𝐭𝐢𝐨𝐧: The telling signal wasn't what disappeared. It was what surged: honeypot deployment, camera infrastructure, proxy servers across the Gulf countries simultaneously. All of it seems to beintentional. “Internet shutdown" is an insufficient framework. The real question isn't whether connectivity exists, it's how infrastructure is being shaped, by whom, and why Full research https://lnkd.in/erc8E-JP Try Modat Magnify: https://magnify.modat.io/ #Modat #cybersecurity #internetintelligence #threatintelligence #ModatMagnify #Iranblackout
-
Vincent Thiele reposted thisVincent Thiele reposted thisWe’re excited to announce a new integration between Modat and EclecticIQ. By bringing Modat Device DNA intelligence into EclecticIQ Intelligence Center™, analysts can accelerate the detection, tracking, and analysis of malicious infrastructure with greater speed and context. This integration helps threat intelligence teams enrich investigations with AI-driven infrastructure insights, making it easier to identify relevant assets, connect activity, and support faster decision-making. Looking forward to seeing how teams use this integration to strengthen intelligence-led security operations. #ThreatIntelligence #CyberThreatIntelligence #CyberSecurity #ThreatIntel #MaliciousInfrastructure #SecurityOperations #TIP #CTI
-
Vincent Thiele shared thisVincent Thiele shared this𝐍𝐞𝐰 𝐉𝐨𝐢𝐧𝐭 𝐑𝐞𝐬𝐞𝐚𝐫𝐜𝐡 𝐍𝐞𝐮𝐭𝐫𝐚𝐥𝐢𝐳𝐢𝐧𝐠 𝐭𝐡𝐞 𝐖𝐚𝐭𝐜𝐡𝐝𝐨𝐠: 𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐞𝐝 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐑𝐞𝐦𝐨𝐯𝐚𝐥 𝐢𝐧 𝐚 𝐌𝐨𝐝𝐮𝐥𝐚𝐫 𝐂𝐫𝐲𝐩𝐭𝐨𝐦𝐢𝐧𝐢𝐧𝐠 𝐂𝐚𝐦𝐩𝐚𝐢𝐠𝐧 New joint research by Modat and Recorded Future examines a modular cryptomining campaign leveraging living-off-the-land techniques to disable security controls and hijack system resources. The publication, prepared by Soufian El Yadmani and 𝐂𝐚𝐥 𝐆𝐥𝐚𝐝𝐲𝐧𝐠 breaks down the automated defense evasion, credential harvesting, and resource abuse observed during the investigation. Read the full research https://lnkd.in/eY6yjz_a #Modat #RecordedFuture #cybersecurity #research
-
Vincent Thiele reposted thisHonored to be invited by Ashraf Aboukass to join this Saturday’s webinar on: SOC Standard - Operations in Conflict. I’ll be sharing new insights on internet shifts in the Middle East from Iran to Gulf countries revealing structure and patterns that haven't been shared before. A great way to spend a Saturday afternoon! Sign up here: https://lnkd.in/ddGbFsGFVincent Thiele reposted thisFlash Webinar: What Threats SOC Teams Are Facing Right Now. 💻 Saturday 28th March 7pm Qatar Time- 4pm GMT time! Update: I will be joined by Soufian El Yadmani an incredibly talented CyberSecurity professional and founder sharing some data driven insights you probably haven't seen before! https://lnkd.in/ddGbFsGFWhat SOC Teams Are Seeing Right Now (And Most Are Missing)What SOC Teams Are Seeing Right Now (And Most Are Missing)Ashraf A.
-
Vincent Thiele posted thisSoufian El Yadmani and I are excited to attend RSAC the upcoming week. We are eager to explore the evolution of Internet Intelligence and Modat . If you would like to hear more and connect with us during the event, please reach out. Looking forward to seeing many of you at RSAC. #Modat #Internetintelligence #Threatresearch #RSAC
-
Vincent Thiele shared thisGreat to help to secure the healthcare sector. This is close to my heart. Thank you Z-CERT for the opportunity #healthcare #nis2 #cyberresilience #modatVincent Thiele shared thisZ-CERT 𝐒𝐞𝐥𝐞𝐜𝐭𝐬 Modat 𝐭𝐨 𝐒𝐭𝐫𝐞𝐧𝐠𝐭𝐡𝐞𝐧 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐟𝐨𝐫 𝐃𝐮𝐭𝐜𝐡 𝐇𝐞𝐚𝐥𝐭𝐡𝐜𝐚𝐫𝐞 𝐎𝐫𝐠𝐚𝐧𝐢𝐬𝐚𝐭𝐢𝐨𝐧𝐬 We are excited to announce a formal collaboration between Modat and Z-CERT, the national sectorial CERT for healthcare in the Netherlands. The partnership focuses on improving visibility into emerging risks affecting healthcare organisations across the country. “As a Dutch company, we feel a strong responsibility to support the resilience of our own healthcare sector. By working closely with Z-CERT, we aim to give healthcare organisations earlier and clearer insight into their external risk, so they can focus on delivering safe and reliable care,” said Soufian El Yadmani, CEO of Modat. Wim Hafkamp, Managing Director at Z-CERT, said, “Z-CERT welcomes initiatives like this within the cybersecurity sector. Companies such as Modat make a valuable contribution to our mission: keeping Dutch healthcare digitally secure.” This collaboration also contributes to strengthening European autonomy in cybersecurity by leveraging local expertise. #Cybersecurity #Healthcare #ZCERT #ModatMagnify #PatientSafety #NIS2 #Innovation #zorg #Modat
-
Vincent Thiele reposted thisVincent Thiele reposted this𝐋𝐚𝐭𝐞𝐬𝐭 𝐑𝐞𝐬𝐞𝐚𝐫𝐜𝐡: 𝐌𝐨𝐥𝐭𝐛𝐨𝐭 𝐔𝐧𝐦𝐚𝐬𝐤𝐞𝐝: 𝐀 𝐆𝐥𝐨𝐛𝐚𝐥 𝐃𝐞𝐩𝐥𝐨𝐲𝐦𝐞𝐧𝐭 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬 🔗 Read the full research https://lnkd.in/eEykb35w 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬: 🔓 𝐦𝐃𝐍𝐒 𝐁𝐫𝐨𝐚𝐝𝐜𝐚𝐬𝐭𝐬 𝐋𝐞𝐚𝐤: Our findings indicate that 𝐌𝐨𝐥𝐭𝐛𝐨𝐭 instances are routinely exposing far more information via mDNS than expected, posing a significant configuration risk for global infrastructure. 🌍 𝐆𝐥𝐨𝐛𝐚𝐥 𝐄𝐱𝐩𝐨𝐬𝐮𝐫𝐞: Moltbot exposure spans 53 countries, with a high density in the 𝐔.𝐒. 📊 𝐓𝐡𝐞 𝐍𝐮𝐦𝐛𝐞𝐫𝐬: 𝟏,𝟒𝟖𝟕 𝐡𝐨𝐬𝐭𝐬 announced Moltbot services via mDNS 𝟔𝟑𝟓 𝐩𝐮𝐛𝐥𝐢𝐜𝐥𝐲 accessible Web Control Panels 📂 𝐂𝐫𝐞𝐝𝐞𝐧𝐭𝐢𝐚𝐥 & 𝐈𝐝𝐞𝐧𝐭𝐢𝐭𝐲 𝐋𝐞𝐚𝐤𝐚𝐠𝐞 Moltbot open directory listings related found with sensitive artifacts that go far beyond basic metadata: 𝐄𝐧𝐜𝐫𝐲𝐩𝐭𝐞𝐝 𝐈𝐝𝐞𝐧𝐭𝐢𝐭𝐲 𝐅𝐢𝐥𝐞𝐬: Signal, Telegram, and WhatsApp identity data 𝐒𝐞𝐜𝐫𝐞𝐭𝐬: Registration secrets and agent runtime metadata 👇full article https://lnkd.in/eEykb35w #cybersecurity #modatmagnify #dataleaks #moltbot #clawdbot #threatintel #visibility
-
Vincent Thiele reposted thisVincent Thiele reposted this𝐀𝐧𝐨𝐭𝐡𝐞𝐫 𝐫𝐨𝐮𝐧𝐝 𝐨𝐟 𝐦𝐞𝐚𝐧𝐢𝐧𝐠𝐟𝐮𝐥 𝐮𝐩𝐝𝐚𝐭𝐞𝐬 𝐡𝐚𝐬 𝐥𝐚𝐧𝐝𝐞𝐝 𝐢𝐧 𝐌𝐨𝐝𝐚𝐭 𝐌𝐚𝐠𝐧𝐢𝐟𝐲. These improvements are focused on one thing: giving investigators more precision, more context, and more control when working with large-scale internet data. Here’s what’s new: • 𝐔𝐧𝐢𝐟𝐢𝐞𝐝 𝐈𝐏 𝐃𝐞𝐭𝐚𝐢𝐥 𝐕𝐢𝐞𝐰 • 𝐍𝐞𝐰 𝐒𝐞𝐫𝐯𝐢𝐜𝐞 𝐓𝐚𝐠𝐬: VPN, PQC over SSH • 𝐓𝐢𝐦𝐞-𝐁𝐚𝐬𝐞𝐝 𝐅𝐢𝐥𝐭𝐞𝐫𝐢𝐧𝐠 • 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐞 𝐕𝐚𝐥𝐢𝐝𝐢𝐭𝐲 𝐒𝐞𝐚𝐫𝐜𝐡 • 𝐂𝐍 𝐖𝐢𝐥𝐝𝐜𝐚𝐫𝐝 𝐒𝐞𝐚𝐫𝐜𝐡 • 𝐈𝐬𝐬𝐮𝐞𝐫 𝐀𝐥𝐭𝐞𝐫𝐧𝐚𝐭𝐢𝐯𝐞 𝐍𝐚𝐦𝐞 (𝐈𝐀𝐍) 𝐒𝐞𝐚𝐫𝐜𝐡 • 𝐄𝐦𝐩𝐭𝐲 𝐅𝐢𝐞𝐥𝐝 𝐒𝐞𝐚𝐫𝐜𝐡 • 𝐓𝐋𝐒 𝐕𝐞𝐫𝐬𝐢𝐨𝐧 𝐅𝐢𝐥𝐭𝐞𝐫𝐢𝐧𝐠 • 𝐁𝐚𝐧𝐧𝐞𝐫 𝐇𝐞𝐱 𝐒𝐞𝐚𝐫𝐜𝐡 These updates continue to push Modat Magnify toward deeper visibility and more efficient investigations. For more details how to use these features check out: https://lnkd.in/eEF9Me_A Explore the new features inside the platform: https://magnify.modat.io/ #Modat #cybersecurity #threatintelligence #internetintelligence #platformupdate
-
Vincent Thiele liked thisVincent Thiele liked thisWorkshop Cyber Scenario Planning completed! 50+ practitioners from accross the world, received practical handles to have more informed and meaningful conversations about future threat or risk. Although our format is a 4-hour introduction setup, there was never going to be enough time to go through everything. Just showing how complicated this matter is. That’s exactly why we at Venation provide teams practical handles and provide direct access to our receipts. Once they get back, they can go over all the materials at their own pace. Grateful for the practitioners and specialists in our workshop and their feedback! Sherman Chu and I had a great time! Interested in joining an upcoming session or want to know more about cyber scenario planning? Follow Venation | Cyber Scenario Intelligence or myself for more updates. Ps Get access to more free materials to help you perform cyber scenario planning here: https://lnkd.in/e3GaCUCk
-
Vincent Thiele liked thisVincent Thiele liked thisWhen in Munich… Looking forward to seeing old friends and making new ones! Now scenario planning & practical how to’s IRL instead of social media or newsletter. 🙏
-
Vincent Thiele liked thisVincent Thiele liked thisWe’re proud to be a «𝐂𝐡𝐚𝐦𝐩𝐢𝐨𝐧 𝐒𝐩𝐨𝐧𝐬𝐨𝐫» at 𝐭𝐡𝐞 𝐅𝐈𝐑𝐒𝐓 𝐂𝐓𝐈 𝐂𝐨𝐧𝐟𝐞𝐫𝐞𝐧𝐜𝐞 in Munich Apr 21-23. If you’re here too, come to find us Vincent Thiele and Koen Volwerk. #Modat #FIRSTCTI26 #ModatMagnify #cybersecurity #internetintelligence
-
Vincent Thiele liked thisVincent Thiele liked thisWhen you think you know what the vibecoded code you just vibecoded does. Think again. That's why we do TDD.
-
Vincent Thiele liked thisVincent Thiele liked thisEveryone is talking about the Opus 4.7 release. The jumps in visual reasoning are massive, and the gains in agentic coding are exactly the "frontier" performance we've come to expect. In the cybersecurity world, the initial buzz is around vulnerability discovery. Vendors are showing how 4.7 outpaces the already highly capable Opus 4.6 at raw discovery. This is the leap before the big leap that Mythos is anticipated to be. But here’s the reality for the enterprise: Discovery is no longer the bottleneck. Validation is. Finding a bug is one thing; determining if it's truly exploitable in a production environment is another. In an era where remediation should be happening at machine speed, getting a "pure signal" on exploitability is the only way to cut through the noise. We’ve been in the trenches with 4.7 lately, focused exactly on the validation problem. Our internal benchmarking shows a consistent ~10% improvement over Opus 4.6. In customer production workloads, we are seeing gains beyond that 10% in some more nuanced/complex scenarios. Better instruction following, more consistency in long-running tasks, and improved multi-step workflows are delivering real-world gains for validation AI workloads.
-
Vincent Thiele liked thisThis is so cool!Vincent Thiele liked thisHappy Friday guys! Just pushed some new features to LevelUp and new stuff for you to play with over the weekend :) We now have 36 categories and 12 challenge types and two new streams alongside our offensive / red team content. A.) Blue stream - focused on incident triage, timeline reconstruction and threat hunting with real evidence packs, real question banks, real ticket workflows. B.) Purple stream - covers both attack and defense because analysts who can think like attackers can usually respond fastest. There are no flags for defense - you get graded by submitting verdicts, IOCs, and MITRE ATT&CK techniques. Same workflow as a real SOC. You get forensic toolkits in the 'defender box' - tshark, volatility3, yara, sleuthkit, radare2, bulk-extractor etc. We still use ELO + skill-vector routing which means no two players will get the same training path even for blue or purple streams. Please try it out, as I would love feedback from all you blue and purple teamers. Any ideas or suggestions on how I can make the platform even more useful is always welcome. Have a great weekend! https://levelupctf.com/ #CyberSecurity #SOC #IncidentResponse #SecurityTraining #BlueTeam #CISO #PurpleTeam #hackallthethings #defendallthethreatsLevelUp | Red, Blue & Purple Team Training an AI Can't GoogleLevelUp | Red, Blue & Purple Team Training an AI Can't Google
-
Vincent Thiele reacted on thisVincent Thiele reacted on thisMy heart is so full right now.👏 The first smiling CTI face I had the pleasure of seeing this morning was that of my friend Pratik Sawant. 🇮🇳 Long before this trip was a reality, Pratik told me “if you ever come to Pune, I’ll pick you up at the airport”.🚗 Sure enough, he was standing right at the exit from baggage claim in Pune. 🫂 While I work professionally with collaboration tech every day, this was just the reassurance anyone should ever need that in-person relationships are exponentially more impactful. 🚀 The human energy of two friends, no longer separated by 8000 miles, is something I wouldn’t trade for anything right now.⚡️🧨🎆 Aditi Bansal you are next. I can’t wait to see you tomorrow! #CTIRocks #CTIIndia #BuildingRelationships #avtweeps
Experience & Education
-
Modat
********** * ***
-
*********
*****
-
************* ******** ******* ******
******
-
***** ****
***** **** undefined undefined
-
-
***** ***
***** *** undefined
-
View Vincent’s full experience
See their title, tenure and more.
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View Vincent’s full profile
-
See who you know in common
-
Get introduced
-
Contact Vincent directly
Explore more posts
-
Q-Feeds
238 followers
It’s time to take action and take your cybersecurity posture seriously. Protecting your organisation from cyber risks requires a multi-layered approach. A key layer? Cyber Threat Intelligence. That’s where Q-Feeds comes in: delivering real-time intel, updated every 20 minutes, to keep you ahead of threats and strengthen your defences. #CyberSecurity #ThreatIntelligence #QFeeds
5
-
Meteonic Innovation Pvt Ltd
2K followers
In today’s evolving threat landscape, relying on static defenses isn’t enough. Organizations need continuous, proactive, and measurable security validation to stay ahead of attackers. 💡 That’s where Breach and Attack Simulation (BAS) comes in! BAS empowers organizations of all sizes to: ✔️ Validate security controls against real-world threats. ✔️ Measure the effectiveness of defenses in real time. ✔️ Identify gaps and optimize security posture effortlessly. Whether you're managing security for a small business or a global enterprise, BAS offers comprehensive insights to enhance your defenses and reduce risks. 📊 Curious about how BAS can transform your cybersecurity strategy? Let’s talk! https://lnkd.in/dG44dAyw 💬 Drop a comment, send a message, or Contact Us to explore how BAS can safeguard your organization against modern threats. #meteonic #devsecops #Cybersecurity #BreachAndAttackSimulation #BAS #ThreatManagement #ContinuousValidation
7
-
Paolo C.
Trinity College Dublin • 7K followers
Recent cyberattacks in the Netherlands have once again highlighted a critical truth: "Digital resilience is essential to prevent damage. Entrepreneurs are well advised to take their cyber risks seriously and implement preventive measures, as cybercrime has become one of the biggest business risks." Despite this, smaller companies often overestimate their cybersecurity readiness, with many lacking advanced measures like proactive monitoring or staff training. The government has responded with support like the "Mijn Cyberweerbare Zaak" subsidy, which reimburses half the costs (up to €1,250) for cybersecurity investments. As the article stresses, "Cybersecurity is not a one-time investment, but an ongoing responsibility. Acting now prevents much greater damage later." Equally important, more companies are choosing to manage residual risks by securing a cyber insurance policy. Protecting your organization is no longer optional. Cyber insurance can be a vital part of a comprehensive strategy to safeguard business continuity and financial stability in the face of growing cyber threats. https://lnkd.in/ezN623NN #CyberInsurance #Cybersecurity #RiskManagement #DigitalResilience
1
-
Raf Van der Veken
Cyfora • 3K followers
Cybersecurity and GRC leaders need to focus on the fundamentals of the organization's cybersecurity ecosystem, not on compliance spreadsheets. If the fundamentals are done right, the green checks on the compliance spreadsheet will follow automatically... #Cyfora #NIS2 #CyFun #ISO27001 #DORA
22
-
Toon Segers
4K followers
Dutch intelligence agency, Algemene Inlichtingen- en Veiligheidsdienst - AIVD, recommends considering privacy technology for data sharing: "The use of #PETs can enhance digital security in collaborative data processing. The AIVD therefore recommends considering using PETs when exchanging data with another party." (translated) "With this publication, the AIVD aims to contribute to strengthening the digital resilience and resilience of the Dutch government, vital sectors, high-tech top sectors, and knowledge institutions." For questions on Roseman Labs' PET solution, please reach out. https://lnkd.in/eb7rbksp
34
2 Comments -
Nedap Security
16K followers
Beyond operations, PIAM provides measurable gains in governance and compliance: ✅ Audit readiness improves with clear, time-stamped records of who has access, who approved it, and why. ✅ Least privilege enforcement becomes practical, not just aspirational, when roles and access are aligned through automation. ✅ Change management is streamlined. As departments reorganize or buildings evolve, delegated stakeholders can update access configurations in real time without waiting on IT. If your organization is subject to regulatory frameworks or physical security mandates, PIAM can support both the technical controls and the evidence trail required for compliance. Learn more about this here: https://lnkd.in/eqA8ZFb4
24
-
Pieter van den Berg
Ministerie van Buitenlandse… • 1K followers
Over the past few months our team cooperated closely with NCC-NL to develop a subsidy grant, worth EUR 2,5 mln, aimed at bringing together Dutch and Ukranian cybersecurity businesses. Focus areas are 1. SOC-as-a-Service 2. Cloud Security 3. Identity & Access Management (email security) 4. Digital Forensics & Incident Response. The grant is now open for applications. The framework will allow businesses to deepen their understanding of the persistent and complex cyberthreats that Ukraine is faced with on a day to day basis, ultimately contributing to digital resilience in both countries. Thank you to all colleagues in both 🇳🇱 and 🇺🇦 who made this happen! Jurriën Norder Verena de Lange Ilja Hilhorst Anton Demokhin Embassy of the Kingdom of the Netherlands in Ukraine Embassy of Ukraine in the Kingdom of the Netherlands Ministerie van Buitenlandse Zaken Ernst Noorman
32
2 Comments -
Ronald Prins
SARZA Western Cape • 8K followers
Our 2026 Cyber Trend Report is out — and I'm genuinely proud of what the team has put together. This is not a generic threat overview. Built on 54,000+ security investigations, it cuts through the noise and gets to what actually matters. One thing that stands out to me: the analysis of state actors goes well beyond simple attribution. The report shows how the lines between state actors, cybercriminals, and hacktivists are increasingly blurring — they share tools, impersonate each other, and mix motives. That complexity makes defence harder, and understanding it is essential. Other highlights worth your attention: identity-centric attacks are accelerating, technical debt is being actively exploited, and the cybersecurity market itself is quietly part of the problem. Huge thanks to the entire team for the depth and quality of this work. Well done.
18
-
Edward Millington - CISO, FCIIS, MIET
CariSec Global Inc • 4K followers
This is to be expected, as the evolving nature of cybercrime tools and the evolution of criminal groups. The approach to cyber and information security is very much reactive and supported by individuals who are just trained to carry out cybersecurity, whether in government or supporting organisations. Additionally, cybersecurity programs are not sustainable after 2 to 3 years. A regional holistic approach is needed. Let us work together in achieving this. CariSec Global Inc. #SecurityLeadership #Cybersecurity #RegionalCyberResilience #CaribbeanCyberResilience #CyberResilience #CyberAdvisory #CyberRiskManagement #CyberRisks #RansomwareAttacks #Cybercrime #Cybercriminals #InformationSecurityProgram
3
1 Comment -
Floor van Eijk
Evanta, a Gartner Company • 4K followers
✴️ Exactly one week ago I attended KPN NLSecure[ID], KPN’s leading event for the Dutch security community. I hosted a session about a challenge many of us face: how to navigate regulatory challenges while keeping up with new threats, emerging technologies and and keeping the security of our organisation strong. We showed how NN Group's approach on automating controls can help. It reduces manual work for DevOps teams, information security officers and risk managers. It also makes the work more consistent and efficient while having a good visibility on IT controls and security. The key idea is: automate the proof, not the promise. Leverage data and build controls that can be checked automatically. Thank you to KPN and specifically Chantal Vergouw and Vladimir Cibic for hosting, great keynote speakers and to the community for great conversations. Let’s keep learning from each other and strengthen our security and resilience. 📣 Special kudos’ for the Angry Nerds Podcast for interesting conversations with all speakers and attendees! #NNGroup #NLSecureID #CyberSecurity #Compliance #DORA #Automation #DevOps #DevSecOps #ITControls
130
2 Comments -
Hendry Rahardja
1K followers
KLM confirms a data breach affecting personal info such as names, contact details, and Flying Blue data, linked to a third-party system. Core systems and sensitive info like passwords and cards remain secure. #KLM #DataProtection #Netherlands link: https://ift.tt/9MeWYoU
-
Philipp K.
Fonds Soziales Wien (FSW) • 555 followers
You are currently evaluating or defining your cyber security strategy? (e.g. in the NIS context) Perhaps this paper from the Dutch Government may help focussing on the five basic principles of digital resilience and referencing the NIS and ISO 27001/2 links. https://lnkd.in/dKwENhc8
2
-
DEFION Security
6K followers
🔐 2025 Annual Ransomware Report - The Netherlands The 2025 Annual Ransomware Report has been published by the Nationaal Cyber Security Centrum (NCSC-NL), the Politie Nederland, the Netherlands Public Prosecution Office (Openbaar Ministerie) and Cyber Secure NL (Cyberveilig Nederland) - the association of Dutch cybersecurity companies - by means of participating incident response firms, including DEFION Security. In 2025 DEFION's Digital Forensics and Incident Response Team handled 15 ransomware specific cases. The NL report’s findings closely reflect what we observe in our global incident response practice: identity compromise is a primary entry vector and the business impact remains significant. For many organisations, ransomware is not just a theoretical cyber risk, but a real business continuity challenge. Key findings of the NL annual report are: ➡️ 65 ransomware incidents reported to police ➡️ 39 unique ransomware families observed ➡️ 55% of attacks started with account compromise ➡️ 42.5% involved double extortion ➡️ 43% of organisations experienced downtime exceeding 3 days ➡️ 15% required a week or more to recover 📄 Read the full report in Dutch 🇳🇱 here: https://lnkd.in/dUAxPi82 Other contributing incident response companies include DataExpert, Deloitte, Eye Security, Fox-IT, NFIR B.V., Northwave Cyber Security, Tesorion, Kennedy Van der Laan and PwC. #Ransomware #PublicPrivateCollaboration #CyberResilience #IncidentResponse #BusinessContinuity #DEFION
30
-
NL Digital Government
664 followers
New Cybersecurity Bills Submitted to House of Representatives The bills for the Cybersecurity Act (Cybersecuritywet, or Cbw in Dutch) and the Critical Entity Resilience Act (Wet weerbaarheid kritieke entiteiten) have been submitted to the House of Representatives. These laws transpose the European NIS2 and CER directives into national legislation. The aim is to strengthen the resilience of EU member states against threats. Full article: https://lnkd.in/eC64Dimn
2
-
Tiennot van Dilst CISSP CIPP/e
STANDIC • 2K followers
**Cybersecurity Insight - Week 26** This week, several significant cybersecurity threats and vulnerabilities have emerged across the region. 🔹 In the Netherlands, the NCSC issued a warning regarding new phishing campaigns targeting governmental and municipal email accounts, exploiting recent Microsoft Exchange vulnerabilities (CVE-2024-38023). The attacks aim to gain unauthorized access and sensitive information. 🔹 In Germany and Belgium, authorities reported increased activity from the APT group "Cobalt Strike," leveraging zero-day exploits in widely used VPN solutions. These attacks focus on critical infrastructure providers, with successful intrusions potentially leading to ransomware deployment. 🔹 Across Europe, researchers have observed the spread of a new ransomware variant dubbed "DarkGate," which is propagated through spear-phishing emails and malicious attachments. Notably, this malware is capable of bypassing several common endpoint protections. We encourage all organizations to stay alert, apply the latest security patches, and educate employees about ongoing phishing threats. If you have any questions on how to better safeguard your digital environment, or if you would like tailored advice or support, please do not hesitate to get in touch. For more detailed updates on recent cyber threats and how to enhance your security posture, visit [www.cert2connect.com](https://lnkd.in/embrqpjD). Stay safe, stay informed.
5
-
Trescudo
104 followers
🚨 URGENT ADVISORY: Dutch NCSC Issues Critical Vulnerability Warning The Dutch National Cyber Security Centre (NCSC) has just issued a critical advisory (NCSC-2025-0268) regarding a severe vulnerability that requires immediate attention from organizations in the Netherlands and across the Benelux. This is more than just another patch alert; it's a stark reminder of the dangerous "patching gap"—the window of exposure between a vulnerability's disclosure and when a patch is successfully deployed. A reactive "patch-and-pray" strategy is a gamble you can't afford to take, especially when the warning comes directly from a national authority. At Trescudo, we believe a proactive, resilient defense is the only sustainable strategy. This means: ➤ Continuous Vulnerability Management: To identify, prioritize, and shield against critical vulnerabilities before they can be exploited. ➤ Robust Endpoint Security (XDR): To detect any anomalous behavior that could indicate an attacker is attempting to exploit an unpatched system. ➤ A Tested Incident Response Plan: To ensure you can act swiftly and effectively when an alert like this is issued. The advisory from the NCSC is a clear signal. The time to act is now. Read the full advisory here: https://lnkd.in/d4ykbQUQ Is your organization prepared to move from a reactive cycle to a proactive state of resilience? Let's have a conversation. Schedule your Cyber Resilience Strategy Session today: https://lnkd.in/drZ57-2b #Cybersecurity #NCSC #Vulnerability #PatchManagement #InfoSec #Benelux #Nederland #CyberResilience
6
2 Comments -
Jethro Stange
IPQS • 1K followers
In a recent conversation with Henri Beek, CTI analyst at DataExpert in the Netherlands with 17 years of OSINT experience, we explored how threat intelligence continues to evolve in fraud prevention. Henri summed it up perfectly: “OSINT is a cost-efficient way to get a better picture of threats.” Context turns isolated IPs, hashes, or device fingerprints into full stories about criminal ecosystems, attack patterns, and recurring behaviors. That context strengthens detection, response, and strategic decisions. But here are the challenges many CTI teams face: Information overload from endless feeds Difficulty separating signals from noise Balancing fraud intelligence with traditional CTI approaches Maintaining a frictionless experience for legitimate users while keeping defenses strong. This is where layered signals, feedback loops, and PDCA cycles make a real difference. It’s also where IPQS adds value, enriching OSINT investigations within tools like Maltego, correlating domains, IP-addresses and behavioral signals so analysts like Henri can cut through noise and focus on what matters most. Key Takeaways for Cybersecurity Professionals: OSINT isn’t just about gathering data, it’s about connecting it through analysis Fraud intelligence demands a different lens than traditional CTI. The future lies in multi-layered, automated, and context-rich workflows that empower investigators rather than overwhelm them. As Henri says, “Knowledge shared is knowledge multiplied.” When we connect the signals, we multiply impact, because shared knowledge strengthens not only our detection capabilities but also our ability to prevent fraud and build resilience.
19
4 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Vincent Thiele
4 others named Vincent Thiele are on LinkedIn
See others named Vincent Thiele