
An information security professional with 10 years of experience in Application Security, DevSecOps, API security, security architecture, secure design principles, threat modelling, and risk assessment. Bring project management experience and creative problem-solving abilities. Possess a diverse background in building and maintaining positive relationships with a wide range of stakeholders, providing end-to-end support for Security Operations, and protecting companies against internal and external threats. Consistently recognised for outstanding contributions and a solid reputation for resolving complex issues.
- The Time Machine of Security: Stopping Vulnerabilities Before They're Born

Passionate about advancing knowledge in application security and challenging industry leaders, Alexandra is a cybersecurity content creator and community manager at Escape and hosts the podcast "The Elephant in AppSec." This podcast brings together cybersecurity professionals and industry leaders to discuss and tackle challenging topics in application security.
- What Your Exposed APIs Are Leaking

Andreea Focsa is a Security Consultant specializing in governance, risk, and compliance, with a focus on ISO frameworks, GDPR, and data management. She works on improving privacy practices, conducting impact assessments, and strengthening internal governance to help organizations meet regulatory requirements while managing cybersecurity risks.
- Beyond Compliance: Rethinking Legal Accountability in Cybersecurity

Ankshita is a cybersecurity consultant with a sharp focus on malware analysis, offensive tactics, and real-world threat detection. Her background spans the finance sector, tech industry, and incident response, where she has worked as a SOC analyst, security engineer, and consultant across corporate and critical infrastructure environments. She holds the ISTQB Certified Security Tester credential, is KLCP certified, and is currently researching advanced malware evasion techniques and system exploitation pathways.
She has presented her work at Hack.lu (Luxembourg), Après Cyber Slopes Summit (Utah), DevFest Africa, and The Developers Conference (Mauritius). Her technical approach blends dynamic analysis, code unpacking, and attacker tradecraft — often with a focus on web-based attack surfaces. Ankshita has also been recognized by Huawei Mauritius in 2024 for her innovation in engineering
- When Nostalgia Hacks Back: A Forensic Autopsy of a Trojanized Flash Game

I am a Data Scientist at Siemens Healthineers, working in the Cybersecurity department and currently based in Bratislava. Alongside my professional role, I am pursuing a PhD at the Slovak University of Technology, Faculty of Electrical Engineering and Informatics, specializing in Mechatronic Systems with a focus on intelligent systems and technologies. In my free time, I enjoy reading, staying active through sports, and spending time with friends.
- Adversarial robustness of ML-based malware classifiers

Anniek is a security tester and general devsecops nerd.
- Azure DevOps privilege escalation: Pipeline shenanigans

I'm a researcher at Radboud University, where I work on deep learning-based side-channel analysis. I started in this field during my Ph.D. at TU Delft. My research interests include the security of small hardware, side-channel analysis of post-quantum cryptography, and exploring how deep learning techniques can advance this area. Of all the side activities related to working in academia, I enjoy meeting new people and discovering new places the most, which means I'm looking forward to all the interesting discussions we can have during the WICCON workshop.
- Hardware Hacking with Artificial Intelligence

Dominika is one of the Senior Security Specialists at Bureau Veritas Cybersecurity with 10 years of experience in industrial cybersecurity. Her experience spans from pentesting critical infrastructure (like manufacturing, energy, pharma, terminals, trams) to implementing concrete solutions (like ICS monitoring, or network segmentation). She also enjoys occasional hacking of IoT devices and some good old soldering projects. Her background is in Security and Network Engineering.
- Pentesting the rails - security of metro and trams

Helma is a privacy and security professional, currently working as Lead Privacy Expertise Center with SURF, the ICT cooperation for education and research. Before this role she was Information Security Officer at SURF. Early in her career, she worked as a legal assistant. She taught herself programming in the 1990s and built many websites and databases for SMEs. She is certified DPO, Information Privacy Technologist (CIPT) and CISM and she has a bachelor in education.
- Persuasion in Practice: Social Engineering Workshop

Irina Iarlykanova is a co-founder of the first ACM Student Chapter in the Maastricht University where she studies Computer Science. She is also an active CTF player, specializing in web application security. Irina has professional experience as a software engineer at a security consulting firm and she currently writes her thesis on web framework security.
- Unsafe Code Lab: How Modern Web Frameworks Fail (and How to Fix Them)

- Opening

Julia has worked in the IT industry for over a quarter of a century. For the past five years she's been running the systems for a pentesting company in Amsterdam.
- When the Hackers are inside the building

Kellamity is a volunteer Threat Intel Content Lead at KC7. This free platform teaches concepts of incident response and threat hunting in a gamified way to everyone, from school students to career changers.
From a literature and languages background, they started playing --quite obsessively-- on KC7 at the beginning of 2024, and after making it quickly to the top of the leaderboard and helping others over on Discord, they were offered to join the team. Which they quickly accepted, because giving back to the community is great, and creating new scenarios is fun!
- Ghostbusters Reloaded: catching a tech-savvy ghost in the logs

Lianne Klaver is (spoiler alert!) now a Security Engineer at Sogeti. With over nine years in tech as a QA professional and Certified Ethical Hacker, she brings curiosity, a hands-on mindset, and a human touch to cybersecurity.
Lianne is passionate about making security engaging and accessible especially when sharing her journey.
She lives in Utrecht with her family and recharges through trail running, traveling, and connecting at festivals and events.
Get ready for a story that’s as insightful as it is energizing!
- Breaking in: a journey through the cybersecurity hiring maze

Lilian Knippenberg works as the CISO for the municipality of The Hague. Being the third biggest city in the Netherlands, The Hague is known as the city of Peace & Justice. Lilian is an experienced information security advisor, dedicated to enhancing digital security (and compliance). With a strong background in advising on security policies and best practices, Lilian collaborates closely with colleagues and leadership to ensure effective communication and implementation of security measures.
- How we handled a major increase in our threat landscape

Lizzy is currently a PhD candidate at the Institute for Computing and Information Sciences (iCIS) at the Radboud University. With a background in both Cyber Security and Artificial Intelligence, she is currently doing research in AI-assisted physical attacks on cryptographic implementations. Next to doing research, Lizzy likes to teach classes and supervise students.
When not working, she is playing with her two cats, reading books, doing sports or making music.
Linktree: https://bruteforcemisa.github.io
- Hardware Hacking with Artificial Intelligence

Marina wears many hats as a cybersecurity analyst focusing on digital forensics, incident response, and OT security, while also dabbling in security awareness and culture. She combines a passion for protecting people, a strong belief in digital privacy as a human right, and an overly-enthusiastic approach to problem-solving. When not defending digital spaces, Marina actively nurtures her already-unhealthy obsession with cats and resorts to baking or martial arts when desperate.
- Nightmare on NTLM Street: Legacy's Revenge

Mirjam van Delft - Kaijser helps organizations cut through IT complexity and elevate cybersecurity to a leadership priority. With her RISICO method, she equips boards - particularly in the public sector - with practical tools to take ownership of information security. She firmly believes that cybersecurity is not a technical issue, but an organizational one, and communicates in clear, human language to make digital threats relatable and actionable. Known for her sharp insights and no-nonsense tone, Mirjam turns abstract risks into boardroom urgency. Her background as a public sector advisor, along with her active role in the Zeeland CISO network, makes her a trusted voice in strengthening digital resilience.
- How to Make Cybersecurity Sexy - Get the Board on Board

Nancy Beers is a seasoned gamification expert, and the owner of Happy Game Changers. With over 25 years of experience in ICT, Nancy brings a wealth of knowledge and expertise to the table. As the co-chair of Stichting IFCAT, hacker and a passionate advocate for digital rights and freedoms, she is helping out in shaping the Dutch hacker community. Nancy is not only an international speaker but also an avid participant in various ICT events worldwide. She is known for her engaging talks on topics ranging from female leadership, Women in Tech, cybersecurity to gamification, captivating audiences with her insights and expertise. In addition to her speaking engagements, Nancy is deeply involved in the organization of WHY2025, the next big Dutch Hacker Camp. Her dedication to fostering collaboration, innovation, and exploration within the hacker community is evident in her role as a co organizer of this event. Beyond her professional endeavors, Nancy is an amateur social engineer, open source hippie and constantly seeking new ways to leverage technology for positive change. With her unique blend of technical skills and social insight, she continues to push the boundaries of what is possible in the world of hacking and beyond.
- We've gathered 4000 hackers on a field and here's what happened.

Nynke is a technical information security officer at Mediahuis with 7 years of experience in information security, including 5 years with Mediahuis. Nynke has been focused on both technical security implementation and security awareness during her time at Mediahuis.
- Crack, communicate, change: turning password failures into security wins

Prithvi is a Senior Manager at PwC Netherlands with over 13 years of experience in cybersecurity consulting. She has developed deep, hands-on expertise in cybersecurity services, particularly within security operations centers (SOC). In past few years she has also supported organizations in defining and building broader long-term security strategies and achieving optimization across their environments. Currently, she leads Security Operations (SecOps) for PwC NL, driving innovative solutions and resilient security practices for clients in diverse industries. An avid reader and traveler, she is passionate about public speaking and sharing her knowledge with the cybersecurity community. Outside of work, she is embracing adventures as a new mother.
- Embedded AI - Evolving attack surface and ways to defend them

Raluca Viziteu is a security consultant at Bureau Veritas Cybersecurity (former Secura), based in the Netherlands, where she brings a strong foundation in certification and compliance across regulations such as IEC 62443 and the RED Delegated Act, etc. Over the past two years her primary focus has been the Cyber Resilience Act (CRA), from monitoring its legislative development to helping clients prepare for its upcoming compliance deadlines.
- Inside the CRA Standardisation Trenches: Our Real‑World Struggle to Harmonise

My name is Ramiëlla Ramos, a Security Consultant with a background in law and criminology. After starting my career in the legal field, I transitioned into cybersecurity, where I now specialize in the GRC domain focusing on risk management, security awareness and implementing frameworks such as BIO 2.0 and NIS2 to help clients meet compliance and resilience goals. I’ve worked with both public and private sector clients, including the Ministry of Justice and Security, combining technical expertise with strong communication and advisory skills. My experience as a top-level athlete has shaped me into a resilient, goal-driven team player. I’m passionate about making the field more inclusive and accessible for women and young professionals.
- The Human Firewall: How Soft Skills Became My Strongest Tool

With a background in social and neuropsychology, Roos helps organizations work through the complex puzzle of human behavior. She has addressed behavioral challenges in cybercrime, digital safety, and financial decision-making, and previously founded an international collective applying behavioral insights to digital product design.
Now partnering with BehaviorBirds, she strengthens the human side of cybersecurity by designing solutions that work with how people think and act. Known for her drive, charisma, and expertise in behavioral change, she translates complex science into clear, actionable strategies that resonate with any audience.
- The Awareness Trap: Why security awareness training often fails – and what to do instead

Rosanne started her career in cyber security as an Information Security Officer and Privacy Officer. Since 2022 she found her calling as a cyber security awareness professional. Blending her knowledge of human behavior with the increasing need to address awareness and training in organizations. She supports research and education institutions with an awareness toolkit and community for awareness professionals. She has a MSc in Social Psychology and is CISSP certified.
- Persuasion in Practice: Social Engineering Workshop

Tess Sluijter-Stek often describes herself as "a Jill-of-all-trades, but master of none", as "eternal newbie" and as "nerd-for-hire". She contracts as consultant for Unixerius and she teaches Linux and DevSecOps at ITVitae.
- Hooray, I failed!

For nearly a decade, Tünde has been helping ministries and large organizations tackle their toughest behavioral challenges. From nationwide campaigns to subtle workplace interventions, she knows how to translate behavioral science into practical strategies that change human behavior. In recent years, she has focused her expertise on cybersecurity, founding BehaviorBirds to move the field beyond its obsession with what she calls “the A-word” (aka, awareness). She combines scientific research with actionable design, starting from a simple truth: you can’t change behavior without first understanding it. Known for her spontaneous, high-energy presence and keen scientific eye, Tünde brings both insight and enthusiasm to every stage she steps on.
- The Awareness Trap: Why security awareness training often fails – and what to do instead

R&D engineer for OMRON in the Netherlands. 27 years of experience in the system testing of software and industrial control system software and products. Currently focussed on the Cybersecurity aspects of products, development processes, and the management of security related issues in industrial environments.
- Inside the CRA Standardisation Trenches: Our Real‑World Struggle to Harmonise