Webinar Archief
- Webinar on Demand | NIS2-uitdaging: hoe beheert u grote aantallen leveranciers?
- Webinar on Demand | Hacking AI - Understanding cyber risks in AI-driven applications
- Webinar on Demand | Onder de radar: De onzichtbare OT-risico’s in uw gemeente en hoe u ze kunt beheersen
- Webinar on Demand | Hoe de nieuwste Common Criteria-updates EUCC en CC:2022 impact hebben op uw producten
- Webinar on Demand | Begrijpen en voldoen aan de RED 3.3-richtlijn voor producten met draadloze mogelijkheden
- Webinar ON DEMAND | My First Red Team
- Webinar on Demand | UNECE R155 regulation - How automotive suppliers are affected
- Webinar on Demand | Cyber Crisis Management
- Webinar | DORA - The Latest Technical Standards
- Webinar Herhaling | Verhogen van uw Cyber Resilience in Offshore Wind
- Webinar Replay | Het Kwantificeren van Menselijk Risico in Cybersecurity
- Webinar | Koers Uitzetten: Navigeren in Maritieme Cybersecurity
- Webinar replay | hoe bereikt u cybersecurity naleving als automotief leverancier
- Replay webinar | Red Teaming bij RDW
- Webinar | Ransomware: How did we get here and where are we going?
- Webinar Gemist| NIS2: Perspectief van de Toezichthouder
- Webinar | The NIS2 Directive: Raising Cyber Resilience Across Europe
- Webinar: Psychology in Cybersecurity
- Webinar | Hacking Azure Cloud: Introducing the “Broken Azure.Cloud” Training Tool
- Live Webinar: Raising Resilience against Ransomware Attacks
- Live Webinar: Cybersecurity of Industrial Equipment – IEC 62443
- Live Webinar: Trends in Operational Technology Security
- Live Webinar: Log4j, Latest Insights and How to Stay Secure?
- Protecting Vital Assets | Security Awareness Online Workshop 2022
- Webinar: Presenting OTCAD, the Operational Technology Cyber-Attack Database
- Webinar: Evaluating OT Cyber Resilience through Red Teaming
- Webinar: Crystal Box Assessments in Cloud
- Webinar: Ransomware in de Zorg
- Webinar: IoT Products Certification - What are your Options?
- Webinar: Medical Devices Security - Regulations and Practical Approaches
- Webinar: How to Get the Most Out of Your Pentest?
- Webinar: Security Challenges of a Cloud Migration
- Webinar: Industrial Products Certification - What are your Options?
- Webinar: BSPA voor CIP
- Webinar: Ransomware in het publieke domein
- Webinar: In Control of Water Sector Cybersecurity Threats
- Webinar - Shifting Left: How to Develop Software Securely? Secure SDLC Explained
- Informatieveiligheid in de Zorg - Nulmeting NEN 7510 & Gedragslijn Audit
- OT Security Risks: Remote Access & Maintenance
- Water sector threats as seen through the lens of MITRE's ATT&CK framework for ICS
- Impact Wijzigingen DigiD 2.0: Update 2020
- Protecting Crown Jewels: Red Teaming in OT
- OT Security Risks: How to Assess and Address?
- Demystifying Cloud Security: The Fundamentals
- Breach and Attack Simulation: Bringing the Reds and Blues Together
- Shift Left - Secure SDLC Explained
- Secure Coding – Best Practices
- ICS Cyber Security: Assessing & Protecting Critical Infrastructure