<div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{51}" paraid="1464728848"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The Netherlands has launched a Cyber Resilience Network, a public-private partnership aimed at fundamentally overhauling the nation’s approach to digital </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing">. </span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{65}" paraid="436163315"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The initiative, detailed in a </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2025/september/10/bouwplan-cyberweerbaarheidsnetwerk/CWN+Bouwplan+2025.pdf"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">comprehensive </span><span data-ccp-charstyle="Hyperlink">building </span><span data-ccp-charstyle="Hyperlink">plan</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> from the National Cyber Security Centre (NCSC-NL), aims to connect over 1,152 </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> in a collaborative framework that extends far beyond simple information sharing to include coordinated incident response, training and threat intelligence. </span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{8}" paraid="1089799130"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The move comes at a critical time, as a stark government report reveals just how close the country came to a debilitating IT crisis that could have brought essential public services to a standstill.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{84}" paraid="2081641295"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The urgency for this </span><span data-ccp-parastyle="No Spacing">new approach</span><span data-ccp-parastyle="No Spacing"> becomes clear when examining the statistics. The chance of an </span><span data-ccp-parastyle="No Spacing">organisation</span><span data-ccp-parastyle="No Spacing"> being hit by a cyber incident is now one in eight, yet preparation for such a crisis </span><span data-ccp-parastyle="No Spacing">remains</span><span data-ccp-parastyle="No Spacing"> alarmingly low</span><span data-ccp-parastyle="No Spacing">, according to the</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">NCSC </span><span data-ccp-parastyle="No Spacing">building plan</span><span data-ccp-parastyle="No Spacing">. This </span><span data-ccp-parastyle="No Spacing">isn’t</span><span data-ccp-parastyle="No Spacing"> merely a private sector problem. </span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{84}" paraid="2081641295"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">A recently published</span><span data-ccp-parastyle="No Spacing"> Dutch</span><span data-ccp-parastyle="No Spacing"> government report, titled </span></span><em><a rel="noreferrer noopener" target="_blank" href="https://www.rijksoverheid.nl/binaries/rijksoverheid/documenten/rapporten/2025/09/12/rapport-van-kwetsbaar-naar-weerbaar/ABDTOPConsult+Rapport+geleerde+lessen+ICT+uitbesteding+Februari+2025+Definitief+-vertrouwelijk+%28002%29.pdf"><span xml:lang="EN-US" data-contrast="none">From vulnerable to resilient</span></a></em><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">, paints a sobering picture of the Dutch government’s own digital dependencies, revealing that the </span><span data-ccp-parastyle="No Spacing">near-collapse</span><span data-ccp-parastyle="No Spacing"> of a major IT supplier in early 2024 could have triggered a national crisis</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{115}" paraid="1703362729"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The report concluded that government bodies are insufficiently prepared for the acute and prolonged failure of outsourced IT services, having become what </span><span data-ccp-parastyle="No Spacing">researchers</span><span data-ccp-parastyle="No Spacing"> term “analogously incompetent”.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{115}" paraid="1703362729"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">In a world </span><span data-ccp-parastyle="No Spacing">where</span><span data-ccp-parastyle="No Spacing"> relying on physical processes is no longer </span><span data-ccp-parastyle="No Spacing">an option</span><span data-ccp-parastyle="No Spacing">, this digital vulnerability poses a critical threat to national stability. The potential consequences would have been severe: no benefit payments to millions of Dutch citizens, a complete halt to legal proceedings, healthcare </span><span data-ccp-parastyle="No Spacing">indication</span><span data-ccp-parastyle="No Spacing"> processes grinding to a standstill, and operational problems across </span><span data-ccp-parastyle="No Spacing">numerous</span><span data-ccp-parastyle="No Spacing"> government </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <h2 paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{129}" paraid="2041808812">Shared responsibility</h2> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{154}" paraid="1620528678"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">It is hardly surprising, then, that the Dutch government is</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> pursuing a comprehensive strategy to address these vulnerabilities. The Cyber Resilience Network </span><span data-ccp-parastyle="No Spacing">represents</span><span data-ccp-parastyle="No Spacing"> a significant evolution from the </span><span data-ccp-parastyle="No Spacing">previous</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">n</span><span data-ccp-parastyle="No Spacing">ationwide </span><span data-ccp-parastyle="No Spacing">network (</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">Landelijk</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">Dekkend</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">Stelsel</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">)</span><span data-ccp-parastyle="No Spacing">, which was primarily focused on information sharing between </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing">. The new network is built around five core functions that transform how the Netherlands </span><span data-ccp-parastyle="No Spacing">collectively approaches cyber </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{161}" paraid="205206403"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">“Digital security is a shared responsibility,” said Belle Webster, a board member at the NCSC-NL and unit manager for the Cooperation and Knowledge Exchange, in a </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.linkedin.com/pulse/cwn-bouwplan-voor-stevigere-basis-cyberweerbaarheid-pavme/"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">LinkedIn post</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> announcing the network’</span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">s launch.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{161}" paraid="205206403"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">“The Cyber Resilience Network is a prime example of how government and industry are coming together to strengthen the digital resilience of the entire Kingdom of the Netherlands,” she added, highlighting the collaborative nature of the initiative.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{192}" paraid="1812696697"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">This expansion reflects a growing understanding that individual </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> can no longer fend for themselves against sophisticated cyber threats. </span><span data-ccp-parastyle="No Spacing">Compare it with burglars</span><span data-ccp-parastyle="No Spacing">, who will always seek out the house that is easiest to break into.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{192}" paraid="1812696697"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">In the digital realm, attackers are increasingly targeting supply chains and managed service providers, knowing that a single breach can provide access to dozens of victims. The <em>From vulnerable to resilient</em> report highlights this “digital monoculture”, where many </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> depend on a small number of providers, as a major </span><span data-ccp-parastyle="No Spacing">risk of concentration</span><span data-ccp-parastyle="No Spacing">.</span></span></p> </div> <div> <h2 paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{210}" paraid="1146228926">Heavily digitised</h2> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{196}" paraid="1903053106"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The Netherlands’ position as one of the top five most </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> countries in Europe has created both opportunities and vulnerabilities. ICT plays a crucial role in the primary processes of major government </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> such as DUO (student finance), SVB (social security), UWV (employment services), CJIB (traffic fines) and the Tax Authority.</span></span></p> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{196}" paraid="1903053106"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">Even </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> with significant physical assets and processes, including Rijkswaterstaat (infrastructure), RIVM (public health), </span><span data-ccp-parastyle="No Spacing">Defence</span><span data-ccp-parastyle="No Spacing">, and the National Police, have become heavily </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing">.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{226}" paraid="1193424990"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">This </span><span data-ccp-parastyle="No Spacing">digitisation</span><span data-ccp-parastyle="No Spacing"> has led to extensive outsourcing of ICT activities to external suppliers. While these arrangements offer opportunities in terms of technological development, digital capabilities and professional services, they have also made government </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> more dependent on ICT suppliers. The concentration risk has increased significantly, with many companies and government bodies housing their ICT with US “</span><span data-ccp-parastyle="No Spacing">hyperscalers”</span><span data-ccp-parastyle="No Spacing"> such as Microsoft, Amazon and Google.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{236}" paraid="1524182398"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The Cyber Resilience Network is designed to counter these very threats by creating a network of trust and shared capabilities. Rather than each </span><span data-ccp-parastyle="No Spacing">organisation</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">attempting</span><span data-ccp-parastyle="No Spacing"> to build comprehensive cyber </span><span data-ccp-parastyle="No Spacing">defences</span><span data-ccp-parastyle="No Spacing"> independently, the CWN enables collective resilience through systematic information exchange, coordinated incident response, shared knowledge and joint training exercises.</span></span></p> <p paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{236}" paraid="1524182398"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The plan includes concrete priorities for the coming year, focusing on </span><span data-ccp-parastyle="No Spacing">establishing</span><span data-ccp-parastyle="No Spacing"> the network’s core functions and onboarding key partners from both public and private sectors.</span></span></p> </div> <div> <h2 paraeid="{d92b4879-c09c-46bf-97f3-a428a194e41e}{246}" paraid="1778717408">Preparation for NIS-2</h2> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{3}" paraid="1583695161"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The timing of these initiatives is particularly significant. The </span></span><em><a rel="noreferrer noopener" target="_blank" href="https://www.ncsc.nl/binaries/ncsc/documenten/publicaties/2024/oktober/28/csbn-2024-turbulente-tijden-onvoorziene-effecten/Cybersecuritybeeld+2024_turbulente+tijden%2C+onvoorziene+effecten.pdf"><span xml:lang="EN-US" data-contrast="none">Cybersecurity assessment Netherlands 2024</span></a></em><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">emphasises</span><span data-ccp-parastyle="No Spacing"> the threat of large-scale outages and explicitly mentions the risk of a “digital monoculture”. State actors and criminal </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> are increasingly targeting ICT suppliers, knowing that once inside, they potentially have access to many </span><span data-ccp-parastyle="No Spacing">organisations</span><span data-ccp-parastyle="No Spacing"> that have housed their ICT there.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{18}" paraid="1305877012"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">Recent incidents have </span><span data-ccp-parastyle="No Spacing">demonstrated</span><span data-ccp-parastyle="No Spacing"> the vulnerability of </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> systems. Major disruptions have occurred at </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/feature/Dutch-universitys-rapid-response-saved-it-from-ransomware-devastation"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">TU Eindhoven</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> (2025),</span><span data-ccp-parastyle="No Spacing"> </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366596334/NCSC-Beware-of-criminal-CrowdStrike-opportunists"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">Crowdstrike</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> (2024) and </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/252477997/Maastricht-University-pays-200000-to-Russian-hackers"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">Maastricht University</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"> (20</span><span data-ccp-parastyle="No Spacing">20</span><span data-ccp-parastyle="No Spacing">). While these incidents were often resolved in days or weeks </span><span data-ccp-parastyle="No Spacing">through intensive effort, the question </span><span data-ccp-parastyle="No Spacing">remains</span><span data-ccp-parastyle="No Spacing"> how resilient governments would be if major ICT incidents could not be resolved in weeks or months.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{51}" paraid="1549480766"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The </span><span data-ccp-parastyle="No Spacing">Dutch </span><span data-ccp-parastyle="No Spacing">government’s </span><span data-ccp-parastyle="No Spacing">new approach</span><span data-ccp-parastyle="No Spacing"> acknowledges that existing structures, knowledge and measures are insufficiently </span><span data-ccp-parastyle="No Spacing">utilised</span><span data-ccp-parastyle="No Spacing"> for mitigating the risk and impact of acute and prolonged ICT outages. In audit terms of “design, existence and operation”, much is available on the design front, but implementation and testing are often lacking.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{65}" paraid="539273073"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The network’s establishment </span><span data-ccp-parastyle="No Spacing">coincides with the Netherlands’ preparation</span><span data-ccp-parastyle="No Spacing"> for the implementation of the Cybersecurity Act (NIS-2) later in 2025, which will strengthen requirements for digital resilience. </span><span data-ccp-parastyle="No Spacing">However, the government report notes that compared with legislation in the financial sector, such as the Digital Operational Resilience Act, current frameworks </span><span data-ccp-parastyle="No Spacing">remain</span><span data-ccp-parastyle="No Spacing"> insufficiently specific about risks related to large-scale, acute and prolonged outages of ICT service providers</span><span data-ccp-parastyle="No Spacing">.</span></span></p> </div> <div> <h2 paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{83}" paraid="1602996519">Collaboration is key</h2> </div> <div> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{210}" paraid="1309255072"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">This shift from individual </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing"> to collective resilience marks a pivotal moment for the Netherlands. The government’s dual-pronged approach acknowledges the reality that in the face of sophisticated and persistent cyber threats, the only </span><span data-ccp-parastyle="No Spacing">viable</span><span data-ccp-parastyle="No Spacing"> </span><span data-ccp-parastyle="No Spacing">defence</span><span data-ccp-parastyle="No Spacing"> is a shared one.</span></span></p> <p paraeid="{d33cfd11-46be-418d-9986-2b3b492a3c83}{210}" paraid="1309255072"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The </span><span data-ccp-parastyle="No Spacing">Cyber Resilience Network </span><span data-ccp-parastyle="No Spacing">represents</span><span data-ccp-parastyle="No Spacing"> not just a technical solution, but a fundamental reimagining of how a highly </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> nation can </span><span data-ccp-parastyle="No Spacing">maintain</span><span data-ccp-parastyle="No Spacing"> its digital sovereignty while </span><span data-ccp-parastyle="No Spacing">benefiting</span><span data-ccp-parastyle="No Spacing"> from the efficiencies of modern ICT services.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> </div> <div> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{103}" paraid="1770943791"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing"></span></span><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The success of this initiative will depend on effective implementation and genuine collaboration between public and private sectors. As the Netherlands moves forward with this ambitious plan, it may well serve as a model for other highly </span><span data-ccp-parastyle="No Spacing">digitised</span><span data-ccp-parastyle="No Spacing"> nations grappling with similar challenges.</span></span></p> <p paraeid="{7b099cfe-b75e-4663-aa1d-b81c077ef281}{103}" paraid="1770943791"><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">The foundation for this transformation is information and collaboration. Everything else, as they say, is noise.</span></span><span data-ccp-props="{"201341983":0,"335559739":0,"335559740":240}"> </span></p> <div class="extra-info"> <div class="extra-info-inner"> <h3 class="splash-heading">Read more about cybersecurity in The Netherlands</h3> <div> <ul class="default-list"> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">The Netherlands is facing a growing cyber security crisis, with a staggering 66% of Dutch businesses </span></span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366624847/Dutch-businesses-lag-behind-in-cyber-resilience-as-threats-escalate"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">lacking adequate cyber resilience, according to research</span></span></a><span xml:lang="EN-US" data-contrast="auto"><span data-ccp-parastyle="No Spacing">.</span></span></li> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366538512/Netherlands-makes-case-for-harmonisation-of-cloud-security-standards"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">Harmonisation of cyber security standards is necessary</span></span></a><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink"> to reduce the regulatory burden on Dutch SMEs – and regulators need to cooperate better</span></span><span data-ccp-props="{"134233117":false,"134233118":false,"134245418":true,"134245529":true,"335559738":0,"335559739":600}">.</span></li> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><span data-ccp-charstyle="Hyperlink">Dutch method to counter deepfakes </span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366628022/Dutch-researchers-use-heartbeat-detection-to-unmask-deepfakes"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">analyses blood flow patterns in faces that current deepfake generation tools cannot yet replicate</span></span></a><span data-ccp-props="{"134233117":false,"134233118":false,"134245418":true,"134245529":true,"335559738":0,"335559739":600}">.</span></li> <li paraeid="{50f39bfa-2436-4724-886a-6d3dd6e963e4}{2}" paraid="1340957584"><span data-ccp-charstyle="Hyperlink">Dutch PhD study </span><a rel="noreferrer noopener" target="_blank" href="https://www.computerweekly.com/news/366620387/Dutch-police-disrupt-half-of-ransomware-operations-finds-embedded-PHD-student"><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink">reveals the impact of </span><span data-ccp-charstyle="Hyperlink">centralised</span><span data-ccp-charstyle="Hyperlink"> intelligence and strategic interventions</span></span></a><span xml:lang="EN-US" data-contrast="none"><span data-ccp-charstyle="Hyperlink"> in the fight against ransomware</span></span>. </li> </ul> </div> </div> </div></div><div class="ad-wrapper ad-embedded no-float"> <div id="halfpage" class="ad ad-hp"> <script>GPT.display('halfpage')</script> </div> <div id="mu-1" class="ad ad-mu"> <script>GPT.display('mu-1')</script> </div> </div>
