Webinars

Interactive session: The benefits of using automation to stay compliant

Interactive session: The benefits of using automation to stay compliant

During this 1-hour interactive session hosted by Eric Luteijn of LuteijnMedia, Michael...

2024-05-21

Panel Discussion: Beating the Clock in Cybersecurity

Panel Discussion: Beating the Clock in Cybersecurity

During this 1-hour interactive session in collaboration with Logpoint and Cyberint, we...

2024-04-25

The importance of Prioritizing Cyber Threats!

The importance of Prioritizing Cyber Threats!

A lot of organizations are constantly struggling with the fact that the threat...

2020-11-16

Can’t change Cybersecurity Game?

Can’t change the Cybersecurity Game? Change Its Structure

Within companies, cybersecurity has a finite setup; with procedures, protocols, plans and...

2020-06-16

The value of hackers’ mistakes

The real value of hackers’ mistakes and how to use these to your advantage

Setting up and maintaining the right security measures is a hard task and in many cases...

2020-06-16

Cloud based- SIEM and Vulnerability Management

Cloud based- SIEM and Vulnerability Management further explained

How can hackers invade your network? Technical vulnerabilities, deviant behavior patterns...

2020-06-16

Data Security in times of change

Data Security in times of change

Translating data in intelligence provides organizations with the ability to better...

2020-06-16

Modern and modular SIEM

Controllable modern and modular SIEM in action

Translating data in intelligence provides organizations with the ability to better...

2020-06-16

The power of Deception

The real power of Deception Technology!

How can Deception Technology enable organizations so they can make sure that potential...

2020-06-16

Who are targeting us

Who are targeting us

The rapid evolution in Cyber Threat Intelligence now makes it possible for organizations,...

2020-06-16

Cloud Security

Cloud Security or, data security within a SaaS and IaaS environment

In 45 minutes we will inform you how to better secure your SaaS/IaaS environment with...

2020-06-16

Zero-Day Read-Only Cloud Apps

Zero-Day Read-Only Cloud Apps

Zero-Day data & threat protection for any app, any device, anywhere.

2017-12-04

ThreatQ and Blueliv integration

Gain Insights and Prioritize Threats with BlueLiv and ThreatQ

ThreatQ and Blueliv integration.

2017-10-19

Webinar ThreatQ

ThreatQ Threat Intelligence Platform Webinar

The relevance of threat intelligence, as well as the ThreatQ platform.

2017-06-21

Webinar Blueliv

Webinar Blueliv

The difference between a free- and a premium Threat Feed, and the value of it? How to...

2017-06-29

Webinar Logpoint

Logpoint 6.0 and the Logpoint Director

The affordable, intelligent, easy to implement, maintain and manage SIEM solution of...

2017-06-08

Webinar Netwrix

How to ensure compliance with the GDPR standards

How to ensure compliance with GDPR standards using Netwrix Auditor?

2017-06-08