WHY2025

Mischa Rick van Geelen

Hi! I’m Mischa Rick van Geelen, founder of Anovum B.V., a leading cybersecurity company. I have investigated and resolved large-scale cyber incidents, including the attacks on Hof van Twente and ROC Mondriaan (publicly documented), and have been involved in numerous anonymous incidents. Additionally, I conducted the penetration test on the CoronaMelder app, with the results submitted to the Dutch Parliament, and I actively contribute to the development of the MIAUW methodology.

As a security consultant, incident responder, and digital forensic investigator, I help organizations strengthen their IT security, investigate incidents, and resolve issues. My expertise includes secure software development, network security, and the implementation of EDR/XDR solutions. I also provide workshops and lectures to enhance cybersecurity awareness.


Sessions

08-10
14:00
50min
Synology Disk Station Manager (DSM) Forensic Recovery Methods
Mischa Rick van Geelen

In this WHY2025 session, we aim to explore advanced forensic recovery techniques for Synology Disk Station Manager (DSM). We’ll analyze how DSM handles data at the system/OS level, uncover hidden artifacts, and leverage undocumented features crucial to digital forensics. Our findings, detailed in an accompanying whitepaper, guide attendees through best practices and highlight previously unknown methods for evidence collection.

Hacking
Cassiopeia
08-11
17:00
50min
From barking to Meow: mature pentesting
Mischa Rick van Geelen, Brenno de Winter

In a world of relentless cyber-threats, MIAUW (Methodology for Information Security Assessment with Audit Value) turns every pentest into a high-impact, traceable mission. This session reveals how its storyline-driven playbook fuses technical exploitation, legal rigor and forensic reporting into a reusable blueprint that regulators love and attackers fear. Expect war-stories, live-demo snippets, and a roadmap to weaponize compliance while clawing back control over risk.

Hacking
Delphinus