ossimUpdate

 

I'd certainly advise on ATTENDING and ACTIVELY PARTICIPATING in webinars, webcasts and conferences as one of the KEY COMPONENTS to anyone's professional development, i.e. life (as you can get in direct contact - or better said, INTERACTION with many valued experts / colleagues). After all, you might also get a few CPE points (usually 1 pt for each webinar attended)...

 

However, during the years I've attended and participated in many of those listed below (it's a never-ending list though!):

 

Amazon Web Services:

Masterclass: Advanced Security Best Practices with AWS webinar (Sep 22, 2015)

The Journey through the AWS Cloud: Digital Media (Nov 24, 2015)

Masterclass - Amazon EC2 (Jan 20, 2016 )

Security First in the Public Cloud - Agile, Innovative and Compliant with AWS (Computerwoche.de & AWS Germany)

Amazon EC2 for Microsoft Windows Server 8/27 (AWS - August 2015)

How To Get The Essential Visibility and Control You Need For AWS Security and Compliance (AlienVault - November 8, 2018)

 

BrightTALK:

How the GDPR Impacts Your Enterprise Mobility Management Practices
Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance
Recorded: Sep 28 2017 57 mins

Malware of the Week | One-Two Punch
Proofpoint
Recorded: Jul 20 2018 10 mins

Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint
Recorded: Jun 5 2018 54 mins

Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
Recorded: May 24 2018 44 mins

What Does “Next Generation Security” Mean To You?
Patrick Grillo, Senior Director, Security Solutions, Fortinet
Recorded: Jul 3 2018 31 mins

Identify and Stop Malware in the Quickest and Most Accurate Way Possible
Bob Honour - EMEA Marketing Director; John Aarsen - Solutions Architect
Recorded: Jun 21 2018 52 mins

How to Best Protect Your Data from Cyber Threats
John Aarsen - Solutions Architect – SonicWall, Florian Malecki – International Product Marketing Director - StorageCraft
Recorded: Jun 7 2018 69 mins

Data Breaches, Identity & Security
Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
Recorded: Jun 6 2018 45 mins

Advanced Endpoint Protection (AEP) 2.0 Group Test Results
Bhaarath Venkateswaran, Phuong Nguyen
Recorded: May 17 2018 50 mins

Advanced Endpoint Protection (AEP) 2.0 Group Test Results - SentinelOne
Mike Spanbauer - NSS Labs, Aviram Shmueli - Sentinel One & Gary Mello - SentinelOne
Recorded: May 24 2018 59 mins

How can you ensure that your logging infrastructure is GDPR compliant?
Istvan Molnar, John Murdoch
Recorded: May 17 2018 60 mins

Kerberoasting Attack Detection For SOC Analysts (Securonix - November 12, 2018)

Using Machine Learning to Detect Command Line Anomalies (Adobe - November 13, 2018)

Ready for Liftoff? Planning a Safe and Secure Cloud Migration (Cyxtera - November 20, 2018) 

Architecting a Sophisticated DDoS Attack in 5 steps (Link11 - November 22, 2018)

2018: The Year in Data Security (Code42 - December 12, 2018) 

 

 

Sophos:

 

Security SOS Week day 4 - privacy - can you have too much of a good thing? (July 2018)

Security SOS Week day 4 - trends in malware: first ransomware, now cryptojacking, what next? (July 2018)

Sophos Mobile Tips & Tricks: Attacks on Mobiles and How to Mitigate Them (June 2018)

EU GDPR: How Sophos can help you become compliant (May 2017)

Secure EU GDPR: Legal advice on what companies have to know to stay compliant (May 2017)

Sophos Central - an overview into Synchronized Security Management (June 2016)

Sophos Cloud Server Protection Advanced (Server Lockdown) (June 2016)

Security Heartbeat - Mehr Sicherheit für Ihre Kunden, mehr Umsatz für Sie (December 2015)

Enterprise Mobility Management (Sophos Mobile Control 5.0)  (April 2015)

Cybercriminals and Their New Weapons in 2019 – How to fight off EMOTET and other modern threats (January 22, 2019)

 

Tenable:

Understanding Cyber Exposure: Crucial for GDPR Compliance (May 2018)

13 Essential Steps to Address GDPR Security Requirements (September 2017)

Achieving Effective Cyber Hygiene with CIS Critical Security Controls 1-5 (March 2017)

Overcoming Security Threats in an Evolving IT Landscape (January 2017)

2017 Global Cybersecurity Assurance Report Card (January 2017)

Making Foundational Security Controls Work for Your Organization (November 2016)

 

Ultimate Windows Security:

Understanding “Red Forest”: The 3-Tier Enhanced Security Admin Environment (ESAE) and Alternative Ways to Protect Privileged Credentials (Information Security - Active Directory; December 1, 2017)


Using YARA to Describe, Classify and Search for Malware (Information Security - Security Log; July 24, 2018)


How Attackers Exploit the Windows Registry for Persistence, Hiding File-less Malware, Privilege Elevation and More (Information Security - Windows Security; August 23, 2018)


Office Macro Exploitation: Mitigating and Threat Hunting This Widely Exploited Vector (Information Security - Workstation Security; August 28, 2018)

Which User and What Program Sent This Packet, and Should I be Concerned? Correlating Network Security Alerts with Host Logs for Full Traffic Attribution (Information Security - Security Log; September 13, 2018)


Top 10 Steps to Hardening Linux Systems (Information Security - Network Security; October 16, 2018)

Checking your Application Against the OWASP Top 10 Security Risks (Rapid 7 - November 27, 2018)

Building MITRE ATT&CK Technique Detection into Your Security Monitoring Environment (LogRythm - December 18, 2018)

Closing the Loop: Detecting Vulnerabilities is Great but Risk Only Decreases After Remediation (Rapid 7 - January 29, 2019)

Why SIEM is Difficult (LogRythm - September 28, 2023)

 

 

Others / Unsorted: 

Zscaler Internet Security and Compliance

Lokale Internet-Zugänge für jeden Standort - aber sicher und performant (Zscaler & Computerwoche - July 2015)

Advanced Persistent Threats (FireEye - October 2015)

The Malware Pitfall and the Human Factor (Proofpoint - October 2015)

Understanding Container Security

Introduction to Cloud Networking (Cisco Meraki - August 2015)

Data Security Requirements in the EU Data Protection Regulation (Balabit - February 2016)

Network Monitoring With Nagios 15 (Nagios - March 2016)

Assessing the Implications of the GDPR for your business (Balabit - October 2016)

Best Practice Privileged Access Management (Balabit - November 2016)

Span Data Protection Day Conference (Zagreb - November 22, 2016)

COMBIS, Veeam and VMware Workshop (Zagreb - December 13, 2016)

Sagena Security Day 10 (Sagena & McAfee - Zagreb - October 12, 2017)

Praxisleitfaden Datenverschlüsselung: Sicher, einfach und EU DSGVO-konform (Matrix42 - September 2018)

How to integrate GDPR with ISO 27001 (Advisera - September 26, 2018)

Sicherheit und Datenschutz für Public Clouds (Computerwoche / Rohde & Schwarz Cybersecurity - October 2, 2018)

The itsa 2018 IT Security Expo and Congress (Nuremberg, DE - October 10, 2018)

The State of Endpoint Security - How to Mitigate Endpoint Security Risk (Cybersecurity INSIDERS / the Ponemon Institute - October 25, 2018)

Automation: The Ultimate Enabler for Incident Detection & Response (Rapid7 - October 30, 2018)

Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations (IBM Security - November 1, 2018)

Cyber Threat Intelligence - Workshop (ENISA / CTI-EU - Brussels, BE - November 5-6, 2018)

Is your organization ready for automation? (Rapid7 - November 13, 2018)

Premium Webinar: Datenschleuse - Die intelligente Datenwaschanlage zum Schutz vor mobilen Datenträgern (EgoSecure - November 15, 2018)

Customer Training: How to Configure AlienVault HIDS (AlienVault - November 15, 2018)

The basics of risk assessment and treatment according to ISO 27001 (Advisera - November 21, 2018)

Cyberattacken – so funktioniert ganzheitlicher Schutz (IBM & Computerwoche - November 29, 2018)

Impact of GDPR to U.S. Companies (EUGDPR Academy - November 29, 2018)

Future-Ready Threat Detection & Response: SOC, SIEM or MDR? (Rapid7 - December 3, 2018)

Schluss mit Malware-Stress! Endpoint Security geht automatisiert (Matrix42 & enSilo - December 5, 2018) 

ISO 27001/ISO 22301: The certification process (Advisera - December 5, 2018)

The Pending Impact of Quantum Computing on Cybersecurity (IBM Security -  December 5, 2018) 

Building Better Security (Carbon Black & EY - December 5, 2018)

(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis Strategies (SANS & Awake Security - December 5, 2018)

The Top Cyber Security Trends in 2018 and Predictions for the Year Ahead (IBM Resilient - December 6, 2018)

An Evaluator's Guide to Next-Generation SIEM (SANS Analyst Program & LogRythm - December 6, 2018)

Is your IT environment secure? – Find out where it leaks with Sophos attack simulation tools (Sophos - December 7, 2018)

Cyber Security Threat Predictions 2019 (Checkpoint & Forrester - December 11, 2018) 

Cybersecurity Trends in 2018 and Predictions for 2019 (HelpSystems - December 11, 2018)

Comparing Privacy Laws: GDPR v. CCPA (Future of Privacy Forum & DataGuidance - December 13, 2018) 

How to Mitigate Cyber Risk with Security Information and Event Management (SIEM) (HelpSystems & Cybersecurity Insiders - December 13, 2018)

2019 Security Predictions (Cybereason - December 19, 2018)

IT-Security: Prävention statt Schadensbegrenzung - Malware proaktiv stoppen, Einfallstore schließen (Computerwoche & Logicalis - January 31, 2019)

Achieving Office 365 Cyber Resilience (Conversational Geek - January 31, 2019)

Leveraging Your SIEM to Implement Security Best Practices (Rapid7 - February 5, 2019)

20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered? ((ISC)2 & Splunk - February 12, 2019)

Vienna Cyber Security Week (WKO - Vienna, AT - March 11-15, 2019)

Stop the parasites on your network & regain control over your applications with Sophos XG Firewall (Sophos - March 18, 2019)

Albtraum Datenspionage - keine Chance für Datendiebe! (Matrix42 & Kingston - March 22, 2019)

Splunk 2019 Predictions (Splunk - March 28, 2019)

Digital Guardian DLP und EDR - Datenschutzverletzungen sind unvermeidlich, Datenverlust ist es nicht (Digital Guardian & Aqaio - September 08, 2020)

OWL Datendioden der Schutz für Ihre Kritische Infrastruktur (OWL Cyber Defense & Aqaio - October 15, 2020)

The Certified Kubernetes Security Specialist: What to Know and How to Pass (StackRox and The Linux Foundation - January 21, 2021)

Hack My Mis-Configured Kubernetes (Snyk and The Linux Foundation - January 28, 2021)

Humio - Effizientes Logmanagement in Echtzeit (humio & Aqaio - February 09, 2021)

Warnzeichen erkennen und sofort reagieren (MTR; Computerwoche & Sophos - March 11, 2021)

IT-Forensik leichter gemacht (Matrix42 - March 25, 2021)

EU MITRE ATT&CK Community Workshop (the European Commission - June 1-2, 2021)

How we respond to attacks and protect EU institutions (Airbus CyberSecurity - July 6, 2021)

IT-Sicherheit der Zukunft – mit XDR, KI und Automation (Security-Insider.de - September 17, 2021)

Airnow Cybersecurity Presents: The NIST framework (series: Identify, Protect, Detect - October 25 - 27, 2021)

Cyber Security in Defence and IT (Airbus CyberSecurity - November 2, 2021)

Providing the full and secure Visibility in OT and IT Networks with Garland Technology (Aqaio - November 30, 2021)

Microsoft Intelligent Security Summit: Europe (Microsoft Security - December 1, 2021)

Splunk Tech Talk: Security Edition - Splunk Intelligence Management for Splunk SOAR (Splunk - December 14, 2021)

Microsoft Tech Briefings: Protect your data in the hybrid work era with Microsoft Information Protection (Microsoft - December 15, 2021)

(Data Security) Predictions 2022: How to Stay Ahead of the Curve - Episode 2 (Splunk - January 18, 2022)

(Data Security) Predictions 2022: How to Stay Ahead of the Curve - Episode 3 (Splunk - January 20, 2022)

Vom Asset Management zur Asset Intelligence mit Axonius (Aqaio GmbH - July 21, 2022)

Microsoft Defender for Endpoint on Linux (Microsoft - November 9, 2022)

Wie sicher ist M365? (Security-Insider.de & mimecast & statista - November 11, 2022)

Automatisierte Pen-Tests und Red-Team-Tooling mit Core Impact & Cobalt Strike (Aqaio & Fortra - November 16, 2022)

Microsoft 365 Defender Overview (November 16, 2022)

Linux Foundation Webinar, sponsored by Cockroach Labs: Is Kubernetes the Next Fault Domain? (November 16, 2022)

Filesharing im Job ohne Sicherheitsrisiko (Security-Insider & FTAPI - November 18, 2022)

Cyber Defense Hack | Capture the Flag (Trend Micro Vision One CTF Europe - pco GmbH & Trend Micro - November 24, 2022)

TrendMicro VisionOne CTF EU

 

Guidelines for Improving Your Cloud Security Posture (EC-Council - November 30, 2022)

Microsoft Defender for Cloud Apps Deep Dive (December 7, 2022)

Faktencheck Endpoint Detection & Response: Weil normale Malware Detection nicht ausreicht (Security-Insider.de & Qualys Inc. - December 8, 2022)

True Cyber Emergency Stories and Leadership Action Plans (EC-Council - January 17, 2023)

Microsoft Sentinel 101: Using a Cloud Native SIEM (SANS Institute - February 16, 2023)

Blue Teaming – die Frontkämpfer der Cybersecurity (Trend Micro - February 23, 2023)

Threat Exposure Management - Wie bekomme ich meine externe Angriffsfläche unter Kontrolle? (Aqaio & ULTRARED - March 7, 2023)

Introducing Novel Technologies for Effective Threat Hunting (EC-Council - March 7, 2023)

Mastering Email Authentication and Slashing Overrides (Microsoft 365 Defender Virtual Ninja Training - March 9, 2023)

Microsoft Sentinel Integration (Microsoft 365 Defender Virtual Ninja Training - March 14, 2023)

Defender Experts for Hunting Overview (Microsoft 365 Defender Virtual Ninja Training - March 16, 2023)

Mobile Threat Defense (Microsoft 365 Defender Virtual Ninja Training - March 20, 2023)

Microsoft Defender for Identity and Defender for Endpoint: Better together (Microsoft 365 Defender Virtual Ninja Training - March 23, 2023)

Get to know the Microsoft Defender Vulnerability Management Premium Capabilities (Microsoft 365 Defender Virtual Ninja Training - March 27, 2023)

Monitoring Threats in All Types of Cloud Environments (EC-Council - March 28, 2023)

Cloud Threats and Vulnerabilities Summit (Cloud Security Alliance - March 28 - 30, 2023):

  • Achieve Tip-of-the-Spear Security with Confidential Computing (Anjuna)
  • What the Flunk? Failing to Identify Risks and Threats to Enable Business Decisions. A Deeper Look at Top Threats. (CSA)
  • Thinking Like an Attacker in the Cloud (Uptycs)
  • ChatGPT Security Implications (CSA)
  • The Cloud Vulnerability Journey - It s Rocky Terrain (Anchore)
  • Defending Against The Cloud Native Adversary: How Threat Actors Weaponize the Cloud for Targeted Attacks (Rapid7)
  • Exposing the Future: Leveraging CSA's Global Security Database (CSA)
  • Vulnerability Landscape 2022 Year In Review (Qualys)

Securing Cloud Native Applications in 2023: Using visualization, context and guided remediation to eliminate critical risks (Aqaio & Ermetic, March 29, 2023)

Attack disruption (Microsoft 365 Defender Virtual Ninja Training - March 29, 2023)

Identity threat detection and response (Microsoft 365 Defender Virtual Ninja Training - March 30, 2023)

Cybersecurity Meetup (The Demo Forum / CSA - April 4 - 7, 2023):

  • Semantic Intelligence for Zero Trust (Concentric)
  • Agile Data Security in the Cloud (Laminar Technologies)
  • Executive Overview (Normalyze)

  • Flying Blind: The Case for Cloud Data Security (Open Raven)
  • Ilumio Flexible Labeling (Illumio)
  • Containment Switch aka "Killswitch" (Illumio)

Detect LIVE: Scaling Up Cyber Security Operations (Anomali, April 18, 2023)

Reduce the Noise: How Machine Learning and AI Improves Detection & Response (Cisco Secure - April 18, 2023)

Identity-Driven Security: The Key to Zero Trust (EC-Council - April 19, 2023)

Die dunkle Seite der IT: Methoden moderner Hacker – Update (2023) (Trend Micro - April 20, 2023)

Qualys Technical Series: How TruRisk Helps You Manage Vulnerabilities More Effectively (Qualys - April 20, 2023)

Threat Protection Engagement for Microsoft Partners (The Partner Masters - August 7, 2023)

Integrating Microsoft 365 Defender with Azure Logic Apps (Microsoft Techcommunity - September 18, 2023)

Direktive mit Biss – wie die EU Cybersicherheit neu definiert (Trend Micro - September 28, 2023)

Why SIEM is Difficult (Ultimate Windows Security - September 28, 2023)

Complete Visibility in your Network and reduce your TCO for your SIEM (Aqaio & Corelight - October 5, 2023)

ATT&CKCON 4.0 (MITRE - October 24 - 25, 2023)

Modern SOC & Security Copilot (Nixu & Microsoft - October 24, 2023)

Autumn Online Summit (Infosecurity Magazine - November 14 - 15, 2023)

Shadow IT and Shadow SAAS, what is the Problem and how Axonius can solve it (Aqaio & Axonius - November 15, 2023)

Why SOAR is worth the investment (IBM - November 15, 2023)

EMEA Virtual Workshop: Machine Learning & AI (Splunk - November 16, 2023)

Was gibt es Neues rund um Microsoft Entra (Microsoft Deutschland - December 5, 2023)

Take your Red Teaming to the next level - Cobalt Strike & Outflank (Aqaio & Fortra - December 6, 2023)

Automotive CISO Forum - 4th edition (Google Deutschland - December 6, 2023)

Perspektivwechsel (Azure, Workplace und Security) (glueckkanja - December 7, 2023)

RSAC 365 Virtual Seminar: Operations—Improving Collaboration & Reducing Risk (RCA Conference - December 7, 2023)

Microsoft Security - build an effective infra against Ransomware (Microsoft Reactor - December 7, 2023)

Gaining control of SAP applications security & automatic attack disruption (Microsoft - December 11, 2023)

CYBERsicher WebImpuls: Die NIS-2-Richtlinie (Transferstelle Cybersicherheit im Mittelstand - December 12, 2023)

Microsoft Defender for Endpoint deception (Microsoft Virtual Ninja Show - December 13, 2023)

Cybersecurity Richtlinie NIS2 - Wer ist betroffen und was ist zu tun? (TheUnified - December 14, 2023)

Demystifying Defender for IoT (Microsoft - December 18, 2023)

Protect on-premises resources with MFA via Microsoft Entra Private Access (December 20, 2023)

Azure Community Enthusiasts User Group Episode 7 (December 27, 2023)

QRadar SOAR Training - Day 3 (IBM - January 17, 2024)

NIS-2 im Klartext: Fristen, Pflichten, Übergang (G DATA CyberDefense - January 17, 2024)

Ransomware: Angriff ist die beste Verteidigung (MindBytes - January 17, 2024)

The Role of Generative AI for Security Operations (Mandiant EMEA - January 18, 2024)

There Will Be Lawyers: The Legal Costs of Breach Response (Illumio - January 18, 2024)

Securing Apps in Distributed Environments (F5 - January 18, 2024)

KI erfolgreich nutzen & Cybersecurity (TheUnified - January 25, 2024)

Sichere Datenklassifizierung: FORTRA Suite, DCS Integration & MS Purview (Aqaio - January 25, 2024)

Resilience Talks: Reflections from Davos 2024 (Splunk - January 29, 2024)

Microsoft Discovery Day: Building Cyberthreat Resilience (Microsoft Deutschland - January 30, 2024)

Microsoft Discovery Day: Modernize Your Security Operations Center (Microsoft Deutschland - January 30, 2024)

Microsoft Discovery Day: Protecting Your Data (Microsoft Deutschland - January 30, 2024)

Azure Architects Connect | Entra Suite im Fokus: Innovationen, Entwicklungen und die Secure Service Edge Lösung (Microsoft Deutschland - January 31, 2024)

Microsoft Tech Brief: Comprehensive Threat Protection with XDR and SIEM (Microsoft Deutschland - February 6, 2024)

Microsoft Tech Brief: Modernize Your Security Operations with Microsoft Sentinel (Microsoft Deutschland - February 6, 2024)

Microsoft Tech Brief: Improve Data Security with Microsoft Purview (Microsoft Deutschland - February 6, 2024)

Fortify your Data Security with Microsoft Purview Workshop (Microsoft - February 6, 2024)

2023 Mobile Threat Landscape Overview (Brighttalk / ThreatFabric - February 7, 2024)

Hybrid Active Directory Identity Attacks and Defense (CQURE Academy - February 7, 2024)

EU NIS2 Implementation in EU Countries - OpenKRITIS (Insignals GmbH - February 27, 2024)

[TO BE CONTINUED...]