• Security Talent
  • Cyber Security Werkt
  • Cyber Security Summer School
  • Security Insight
  • NL
  • EN
Security Talent
  • NL
  • EN
  • Over ons
  • Nieuws
  • Evenementen
  • Contact
  • Nieuwsbrief
  • Home
  • Vacatures
  • Opleidingen
  • Carrière
  • Werkgevers
  • Human Capital Activiteiten
Security Talent
145
Opleidingen & Cursussen
216
Vacatures & Stages
111
Opleiders
224
Werkgevers

0
Opleidingen & Cursussen
0
Vacatures & Stages
0
Opleiders
0
Werkgevers
Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour.
’’
’ Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour. ’
’’
’ Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour. ’
Inge Wetzer has become a recognizable face on stage at the ONE Conference in the Hague over the years. When she’s not on stage to discuss the importance of behavioural change in the field of cybersecurity, Inge works at Secura as a Social psychologist cyber security &...
Nobody asks a psychologist to build a firewall, but often IT personnel is expected to adequately mitigate the security risks caused by human behaviour.
Inge Wetzer
Social psychologist cybersecurity & compliance
Lees Interview
Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions.
’’
’ Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions. ’
’’
’ Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions. ’
Life-long learning and climbing the education ánd professional ranks is the name of the game for Joeri. We were curious to find out which educational pathway and what attitude has gotten him to his current position. So we sat down and asked him about his perspective.
Since I was a teenager I have been fascinated by technology and its impact, today I can form a bridge between the ‘tech-savvy’ and people in non-technical positions.
Joeri Donker
Governance, Risk & Compliance Consultant
Lees Interview
If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet.
’’
’ If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet. ’
’’
’ If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet. ’
In 1987 I started at the PTT, the predecessor of KPN. After two years I then switched to APT, a joint venture between AT&T and Philips telecommunication, working on corporate telecom centers. After a couple of years, in 1992, I was invited for a small three-week assignment in...
If you choose to enter the security and privacy field at this moment or in the next 20-30 years, the world is at your feet.
Jaap Meijer
Cyber Security and Privay Officer
Lees Interview
What I like is that I can do the investigation and research an incident and then come back with concrete results
’’
’ What I like is that I can do the investigation and research an incident and then come back with concrete results ’
’’
’ What I like is that I can do the investigation and research an incident and then come back with concrete results ’
As an incident handler she is the knight in shining armour when a crisis emerge.This time we interviewed Mandy, to find out what her tasks are in the KPN-CERT department and how she got to where she sits now. Read the interview to find out all about her role.
What I like is that I can do the investigation and research an incident and then come back with concrete results
Mandy Mak
Incident Handler at KPN-CERT
Lees Interview
People, process and technology: Combining digital business and human behavior insights in the field of cyber security
’’
’ People, process and technology: Combining digital business and human behavior insights in the field of cyber security ’
’’
’ People, process and technology: Combining digital business and human behavior insights in the field of cyber security ’
During her first years as a student, Laura never thought she would be working in cyber security right now. We had a talk with her to hear how she became a cyber security advisor after obtaining a master’s degree in Business Administration. Read the interview to find out how she...
People, process and technology: Combining digital business and human behavior insights in the field of cyber security
Laura Sumajow
Advisor Cybersecurity at EY
Lees Interview

Nieuwste vacatures

2086
Security Trainer
Vast dienstverband | Den Haag
1810
Consultant/Scientist Decision Making and Intelligence
Vast dienstverband | Soesterberg
2019
Beleidsmedewerker externe veiligheid
Vast dienstverband | Den Haag
2031
(Senior) Adviseur Informatiebeveiliging
Vast dienstverband | Den Haag

Opleidingen & Cursussen in Veiligheid

Deloitte
GICSP Exam Preparation
en-GB
Deloitte | Den Haag
University of Twente (UT)
Computer Science/Informatica
University of Twente (UT) | Enschede
Nederlandse AI Coalitie (NL AIC)
Elements of AI
Nederlandse AI Coalitie (NL AIC) | Leidschendam
Signpost Six
Online Insider Risk Management Training
en-GB
Signpost Six |
Carrière Navigator in Veiligheid

Carrière Navigator in Veiligheid

Vind je volgende uitdaging: verken mogelijke carrièrepaden via de Carrière Navigator in Veiligheid
Naar Navigator
Dashboard Vacatures HSD-partners

Dashboard Vacatures HSD-partners

Vind nieuwe inzichten in banen en stages van onze partners.
Naar Dashboard
For the time being I’ll keep doing all sorts of different things I find interesting.
’’
’ For the time being I’ll keep doing all sorts of different things I find interesting. ’
’’
’ For the time being I’ll keep doing all sorts of different things I find interesting. ’
When you complete the infamous Kerckhoffs master, a well renowned name in the security scene it's obvious that you will need a good challenge when you start your career. Erwin found this challenge at TNO where he started as a researcher and security consultant. Read how he got...
For the time being I’ll keep doing all sorts of different things I find interesting.
Erwin Middelesch
Researcher and Security consultant
Lees Interview
If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on.
’’
’ If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on. ’
’’
’ If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on. ’
Bas works as a Security Analyst in the Security Operations Center (SOC) at DearBytes. We were curious to find out what kind of challenges and incidents a Security Analyst has to deal with and what life is like at DearBytes.
If a person is attacking you, they try to hide and you really have to investigate it thoroughly to find out what’s going on.
Bas van den Bosch
Security Analyst
Lees Interview
It’s all about finding and protecting those ‘crown jewels
’’
’ It’s all about finding and protecting those ‘crown jewels ’
’’
’ It’s all about finding and protecting those ‘crown jewels ’
As an Information Security Consultant, Mike helps organisations identify potential risks and threats to their core business and how to deal with this. Read the interview to find out what he does exactly to protect the 'crown jewels'.
It’s all about finding and protecting those ‘crown jewels
Mike Onderdelinden
Information Security Consultant
Lees Interview
You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it.
’’
’ You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it. ’
’’
’ You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it. ’
Stein is a perfect example of someone who does not have a typical security study but found his way into the security domain through experience and a curiosity for the business. Read his interview to find out how he got to be the Chief Technology Architect at a succesful...
You don’t just need to look at ‘how to make’ something but also at ‘how to break’ it.
Stein Welberg
Chief Technology Architect
Lees Interview
It’s that combination between the technical and social aspects of information security that make this job so attractive to me
’’
’ It’s that combination between the technical and social aspects of information security that make this job so attractive to me ’
’’
’ It’s that combination between the technical and social aspects of information security that make this job so attractive to me ’
While he has only just graduated from his bachelor in Information Security Management, Fynn already secured himself a challenging job as a security engineer at Guardian360. We had a talk with him about why he choose for a career in cybersecurity and his work.
It’s that combination between the technical and social aspects of information security that make this job so attractive to me
Fynn Loeffen
Security Engineer
Lees Interview

Security Talent Nieuws

Nieuwe Engelstalige deeltijd master Digital Forensics
Nieuwe Engelstalige deeltijd master Digital Forensics
16 november 2022
Security Talent Nieuws
New Career Event: Werken bij Justitie en Veiligheid
New Career Event: Werken bij Justitie en Veiligheid
09 februari 2022
Security Talent Nieuws
Mitchell From The Hague Makes Career Steps As Cybersecurity Specialist
Mitchell From The Hague Makes Career Steps As Cybersecurity Specialist
01 december 2021
Security Talent Nieuws

HSD Nieuws

3rd Capture the Flag School Competition
3rd Capture the Flag School Competition
23 januari 2023
HSD Nieuws
'Cybersecurity Talent: 1+1 Adds Up to About 1,83'
'Cybersecurity Talent: 1+1 Adds Up to About 1,83'
16 oktober 2022
HSD Nieuws
HR-event ICSSS 2022 Pool for Cybersecurity Talent and Organisations
HR-event ICSSS 2022 Pool for Cybersecurity Talent and Organisations
25 augustus 2022
HSD Nieuws

Komende Evenementen

21
mrt
ZIE Hi Delta 2023: De Technologische Industrie
21-23
mrt
Data Spaces Symposium & Deep-Dive Day
22
mrt
Lezing: Sabotage van internet zeekabels en satellieten
30
mrt
Dcypher Donderdag #7: Topsectors United

Vacatures ontvangen?

Meld u aan voor de job alert
Job Alert

Contact

Security Delta (HSD)
Wilhelmina van Pruisenweg 104
2595 AN The Hague
The Netherlands

 

T: +31 (0)70-2045180
E: info@securitytalent.nl

Sitemap

  • Vacatures & Stages
  • Opleidingen
  • Carrière
  • Werkgevers
  • Human Capital Activiteiten
  • Over ons
  • Nieuws
  • Evenementen
  • Contact

Security Tweets

Partners @UvA_Amsterdam and @NedForInst opened a forensic research lab🔍 ‘’Al4forensics’’ in @AmsterdamNL. The lab f… https://t.co/226nv3PSVY
Mar 16
India-based technology company @tmsystemsbv has established an office in The Hague #NL as part of their European e… https://t.co/PYCvS7GRLr
Mar 14

Volg ons

Twitter
LinkedIn
YouTube
Nieuwsbrief
  • Disclaimer
  • Privacy & Cookies
  • Responsible Disclosure
  • Home
  • Vacatures
  • Opleidingen
  • Carrière
  • Werkgevers
  • Human Capital Activiteiten
  • Over ons
  • Nieuws
  • Evenementen
  • Contact
  • Nieuwsbrief
  • Security Talent
  • Cyber Security Werkt
  • Cyber Security Summer School
  • Security Insight