Ruben V.’s Post

View profile for Ruben V., graphic

Bundelt krachten in de strijd tegen cybercrime, door mensen en organisaties aan elkaar te verbinden.

Exploring common grounds in victim notification and boosting cyberresilliance. Today we met Troy Hunt and Charlotte Hunt CEO and COO of https://haveibeenpwned.com, the place on the internet to go to if you want to know if your credentials have been obtained in a databreach. We have formed a small group of professionals from Politie Nederland, Digital Trust Center, Nationaal Cyber Security Centrum (NCSC-NL), Openbaar Ministerie and Ministerie van Justitie en Veiligheid to exchange experiences on the subject of victim notification. To bad not every organisation was able to be there today. Todays goal: getting to know and inspire eachother and to boost our services to better help protect all possible victims of data breaches and cybercrime. It is always fun to see that if you share a common goal, the short introduction quickly changes into an on topic brainstorm in which time flies. We gained insights from Troy on #haveibeenpwned and shared experiences on interventions like #NoMoreLeaks where compagnies can join to protect their users/consumers so breached credentials will be automatically block when a person tries to log onto the site. And #checkyourhack where we shared a service to check if your credentials were on the #genesismarket or in the #qbot botnet. For me the password check service provided was a great insight. We will check if it is possible to share passwords within our privacy laws? If a password is discovered in multiple breaches password managers can block these automatically because they are not safe. I am eager to find out. What do you think? Are passwords alone considered as Personal Identifiable Information (PII)? Farid Boutiba, MSc. Bart Vrancken Barend Frans Rob Witteman Roeland van Zeijst CISSP CISM CIPP/E and everyone else, thanks for your participation today!

  • No alternative text description for this image
Rega Sie

Beschikbaar voor een nieuwe uitdaging.

1y

Good question. I believe that a password alone is not a PII. You can’t always determine from the password which user it belongs to. But I do think it’s a good idea to block these passwords. Beter safe than sorry.

Farid Boutiba, MSc.

Ministerie van Economische Zaken en Klimaat

1y

Ruben V., it was an absolute honour to be present today and to learn various interesting new insights from all the great initiatives focusing on victim notification!! Really awesome and cool to meet new people today that share these same goals. 😄 Please keep up the good work Ruben of connecting and bringing everyone together that plays a role in victim notification!! 🙏 Special thanks also to you Troy Hunt for taking the time to inspire us with your valuable insights!!

Roeland van Zeijst

Cybercrime & Cybersecurity Strategist

1y

It was indeed a wonderful and fruitful gathering, thank you very much Ruben for organizing this and Troy and Charlotte for taking this time during your holiday! 😎 And now I can't help but wondering if my first pet's privacy is protected by any password laws... 🤔

Martijn Peijer

Cybersecurity Expert | Intelligence Expert | CTI & OSINT

1y

Sounds great! Is it possible to invite us (Ministry of Finance) for the next meeting as well? :)

See more comments

To view or add a comment, sign in

Explore topics