This is pretty incredible! Thanks for sharing Ruben Valcarcel Feliu, MSc . This is another example of why at Asherify, when we are consulting with organizations regarding #cyberprotection and #dataarchitecture we often recommend Eclypses MicroToken Exchange MTE technology, and setup a discussion with Judson M. Stone. The eclypses data security solution has won multiple awards, including the Best Data Protection Solution by Cybernews Please connect with Jud or I if you are interested in learning more!
Bundelt krachten in de strijd tegen cybercrime, door mensen en organisaties aan elkaar te verbinden.
Exploring common grounds in victim notification and boosting cyberresilliance. Today we met Troy Hunt and Charlotte Hunt CEO and COO of https://haveibeenpwned.com, the place on the internet to go to if you want to know if your credentials have been obtained in a databreach. We have formed a small group of professionals from Politie Nederland, Digital Trust Center, Nationaal Cyber Security Centrum (NCSC-NL), Openbaar Ministerie and Ministerie van Justitie en Veiligheid to exchange experiences on the subject of victim notification. To bad not every organisation was able to be there today. Todays goal: getting to know and inspire eachother and to boost our services to better help protect all possible victims of data breaches and cybercrime. It is always fun to see that if you share a common goal, the short introduction quickly changes into an on topic brainstorm in which time flies. We gained insights from Troy on #haveibeenpwned and shared experiences on interventions like #NoMoreLeaks where compagnies can join to protect their users/consumers so breached credentials will be automatically block when a person tries to log onto the site. And #checkyourhack where we shared a service to check if your credentials were on the #genesismarket or in the #qbot botnet. For me the password check service provided was a great insight. We will check if it is possible to share passwords within our privacy laws? If a password is discovered in multiple breaches password managers can block these automatically because they are not safe. I am eager to find out. What do you think? Are passwords alone considered as Personal Identifiable Information (PII)? Farid Boutiba, MSc. Bart Vrancken Barend Frans Rob Witteman Roeland van Zeijst CISSP CISM CIPP/E and everyone else, thanks for your participation today!