Webinar Archive
- Webinar | NIS2 challenge: how to manage large numbers of suppliers
- Webinar on Demand | Under the Radar: Invisible OT Risks in Your Municipality and How to Manage Them
- Webinar on Demand | How the latest Common Criteria updates EUCC and CC:2022 impact your products
- Webinar on Demand | Understanding and Complying with the RED 3.3 Directive for Products with Wireless Capabilities
- Webinar on Demand | My First Red Team - DORA’s Requirements for Financials New to Red Teaming
- Webinar on Demand | UNECE R155 regulation - How automotive suppliers are affected
- Webinar on Demand | Cyber Crisis Management
- Webinar on Demand | DORA - The Latest Regulatory Technical Standards (RTS)
- Webinar Replay | Raising Your Cyber Resilience in Offshore Wind
- Webinar Replay | Quantifying Human Risk in Cybersecurity
- Webinar Replay | Red Teaming in OT @Enexis
- Webinar | Defend Your Domain: Securing Your External Attack Surface
- Webinar | Charting The Course: Navigating Maritime Cybersecurity
- Webinar | How to achieve Cybersecurity Compliance as an Automotive Supplier
- Webinar Replay | NIS2: Perspectives From a Regulator
- Webinar | Red Teaming at RDW
- Webinar | Ransomware: How did we get here and where are we going?
- Webinar | The NIS2 Directive: Raising Cyber Resilience Across Europe
- Webinar: Psychology in Cybersecurity
- Webinar | Hacking Azure Cloud: Introducing the “Broken Azure.Cloud” Training Tool
- Live Webinar: Raising Resilience against Ransomware Attacks
- Live Webinar: Cybersecurity of Industrial Equipment – IEC 62443
- Live Webinar: Trends in Operational Technology Cybersecurity
- Live Webinar: Log4j, Latest Insights and How to Stay Secure?
- Protecting Vital Assets | Security Awareness Online Workshop 2022
- Webinar: Presenting OTCAD, the Operational Technology Cyber-Attack Database
- Webinar: Evaluating OT Cyber Resilience through Red Teaming
- Webinar: Crystal Box Assessments in Cloud
- Webinar: Ransomware in de Zorg
- Webinar: IoT Products Certification - What are your Options?
- Webinar: Medical Devices Security - Regulations and Practical Approaches
- Webinar: How to Get the Most Out of Your Pentest?
- Webinar: Security Challenges of a Cloud Migration
- Webinar: Industrial Products Certification - What are your Options?
- Webinar: BSPA voor CIP
- Webinar: Ransomware in het publieke domein
- Webinar: In Control of Water Sector Cybersecurity Threats
- Webinar - Shifting Left: How to Develop Software Securely? Secure SDLC Explained
- Informatieveiligheid in de Zorg - Nulmeting NEN 7510 & Gedragslijn Audit
- OT Security Risks: Remote Access & Maintenance
- Water sector threats as seen through the lens of MITRE's ATT&CK framework for ICS
- Impact Wijzigingen DigiD 2.0: Update 2020
- Protecting Crown Jewels: Red Teaming in OT
- OT Security Risks: How to Assess and Address?
- Demystifying Cloud Security: The Fundamentals
- Breach and Attack Simulation: Bringing the Reds and Blues Together
- Shift Left: Secure SDLC Explained
- Secure Coding – Best Practices
- ICS Cyber Security: Assessing & Protecting Critical Infrastructure