During the years I've attended and participated in those listed below:
Masterclass: Advanced Security Best Practices with AWS webinar (Sep 22, 2015)
The Journey through the AWS Cloud: Digital Media (Nov 24, 2015)
Masterclass - Amazon EC2 (Jan 20, 2016 )
Security First in the Public Cloud - Agile, Innovative and Compliant with AWS (Computerwoche.de & AWS Germany)
Amazon EC2 for Microsoft Windows Server 8/27 (AWS - August 2015)
How To Get The Essential Visibility and Control You Need For AWS Security and Compliance (AlienVault - November 8, 2018)
How the GDPR Impacts Your Enterprise Mobility Management Practices
Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance
Recorded: Sep 28 2017 57 mins
Malware of the Week | One-Two Punch
Proofpoint
Recorded: Jul 20 2018 10 mins
Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint
Recorded: Jun 5 2018 54 mins
Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
Recorded: May 24 2018 44 mins
What Does “Next Generation Security” Mean To You?
Patrick Grillo, Senior Director, Security Solutions, Fortinet
Recorded: Jul 3 2018 31 mins
Identify and Stop Malware in the Quickest and Most Accurate Way Possible
Bob Honour - EMEA Marketing Director; John Aarsen - Solutions Architect
Recorded: Jun 21 2018 52 mins
How to Best Protect Your Data from Cyber Threats
John Aarsen - Solutions Architect – SonicWall, Florian Malecki – International Product Marketing Director - StorageCraft
Recorded: Jun 7 2018 69 mins
Data Breaches, Identity & Security
Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
Recorded: Jun 6 2018 45 mins
Advanced Endpoint Protection (AEP) 2.0 Group Test Results
Bhaarath Venkateswaran, Phuong Nguyen
Recorded: May 17 2018 50 mins
Advanced Endpoint Protection (AEP) 2.0 Group Test Results - SentinelOne
Mike Spanbauer - NSS Labs, Aviram Shmueli - Sentinel One & Gary Mello - SentinelOne
Recorded: May 24 2018 59 mins
How can you ensure that your logging infrastructure is GDPR compliant?
Istvan Molnar, John Murdoch
Recorded: May 17 2018 60 mins
Kerberoasting Attack Detection For SOC Analysts (Securonix - November 12, 2018)
Using Machine Learning to Detect Command Line Anomalies (Adobe - November 13, 2018)
Ready for Liftoff? Planning a Safe and Secure Cloud Migration (Cyxtera - November 20, 2018)
Architecting a Sophisticated DDoS Attack in 5 steps (Link11 - November 22, 2018)
2018: The Year in Data Security (Code42 - December 12, 2018)
SANS:
Securing industrial control systems: A peek into building automation security (March 16, 2018)
(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis Strategies (December 5, 2018)
An Evaluator\'s Guide to Next-Generation SIEM (December 6, 2018)
Identifying Emerging Threats with Security Analytics (February 20, 2019)
SANS Workshop – Metadata Madness (January 24, 2023)
Microsoft Sentinel 101: Using a Cloud Native SIEM (February 16, 2023)
Security SOS Week day 4 - privacy - can you have too much of a good thing? (July 2018)
Security SOS Week day 4 - trends in malware: first ransomware, now cryptojacking, what next? (July 2018)
Sophos Mobile Tips & Tricks: Attacks on Mobiles and How to Mitigate Them (June 2018)
EU GDPR: How Sophos can help you become compliant (May 2017)
Secure EU GDPR: Legal advice on what companies have to know to stay compliant (May 2017)
Sophos Central - an overview into Synchronized Security Management (June 2016)
Sophos Cloud Server Protection Advanced (Server Lockdown) (June 2016)
Security Heartbeat - Mehr Sicherheit für Ihre Kunden, mehr Umsatz für Sie (December 2015)
Enterprise Mobility Management (Sophos Mobile Control 5.0) (April 2015)
Cybercriminals and Their New Weapons in 2019 – How to fight off EMOTET and other modern threats (January 22, 2019)
Understanding Cyber Exposure: Crucial for GDPR Compliance (May 2018)
13 Essential Steps to Address GDPR Security Requirements (September 2017)
Achieving Effective Cyber Hygiene with CIS Critical Security Controls 1-5 (March 2017)
Overcoming Security Threats in an Evolving IT Landscape (January 2017)
2017 Global Cybersecurity Assurance Report Card (January 2017)
Making Foundational Security Controls Work for Your Organization (November 2016)
Understanding “Red Forest”: The 3-Tier Enhanced Security Admin Environment (ESAE) and Alternative Ways to Protect Privileged Credentials (Information Security - Active Directory; December 1, 2017)
Using YARA to Describe, Classify and Search for Malware (Information Security - Security Log; July 24, 2018)
How Attackers Exploit the Windows Registry for Persistence, Hiding File-less Malware, Privilege Elevation and More (Information Security - Windows Security; August 23, 2018)
Office Macro Exploitation: Mitigating and Threat Hunting This Widely Exploited Vector (Information Security - Workstation Security; August 28, 2018)
Which User and What Program Sent This Packet, and Should I be Concerned? Correlating Network Security Alerts with Host Logs for Full Traffic Attribution (Information Security - Security Log; September 13, 2018)
Top 10 Steps to Hardening Linux Systems (Information Security - Network Security; October 16, 2018)
Checking your Application Against the OWASP Top 10 Security Risks (Rapid 7 - November 27, 2018)
Building MITRE ATT&CK Technique Detection into Your Security Monitoring Environment (LogRythm - December 18, 2018)
Closing the Loop: Detecting Vulnerabilities is Great but Risk Only Decreases After Remediation (Rapid 7 - January 29, 2019)
Why SIEM is Difficult (LogRythm - September 28, 2023)
Others / Unsorted:
Zscaler Internet Security and Compliance
Lokale Internet-Zugänge für jeden Standort - aber sicher und performant (Zscaler & Computerwoche - July 2015)
Advanced Persistent Threats (FireEye - October 2015)
The Malware Pitfall and the Human Factor (Proofpoint - October 2015)
Understanding Container Security
Introduction to Cloud Networking (Cisco Meraki - August 2015)
Data Security Requirements in the EU Data Protection Regulation (Balabit - February 2016)
Network Monitoring With Nagios 15 (Nagios - March 2016)
Assessing the Implications of the GDPR for your business (Balabit - October 2016)
Best Practice Privileged Access Management (Balabit - November 2016)
Span Data Protection Day Conference (Zagreb - November 22, 2016)
COMBIS, Veeam and VMware Workshop (Zagreb - December 13, 2016)
Sagena Security Day 10 (Sagena & McAfee - Zagreb - October 12, 2017)
Praxisleitfaden Datenverschlüsselung: Sicher, einfach und EU DSGVO-konform (Matrix42 - September 2018)
How to integrate GDPR with ISO 27001 (Advisera - September 26, 2018)
Sicherheit und Datenschutz für Public Clouds (Computerwoche / Rohde & Schwarz Cybersecurity - October 2, 2018)
The itsa 2018 IT Security Expo and Congress (Nuremberg, DE - October 10, 2018)
The State of Endpoint Security - How to Mitigate Endpoint Security Risk (Cybersecurity INSIDERS / the Ponemon Institute - October 25, 2018)
Automation: The Ultimate Enabler for Incident Detection & Response (Rapid7 - October 30, 2018)
Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations (IBM Security - November 1, 2018)
Cyber Threat Intelligence - Workshop (ENISA / CTI-EU - Brussels, BE - November 5-6, 2018)
Is your organization ready for automation? (Rapid7 - November 13, 2018)
Premium Webinar: Datenschleuse - Die intelligente Datenwaschanlage zum Schutz vor mobilen Datenträgern (EgoSecure - November 15, 2018)
Customer Training: How to Configure AlienVault HIDS (AlienVault - November 15, 2018)
The basics of risk assessment and treatment according to ISO 27001 (Advisera - November 21, 2018)
Cyberattacken – so funktioniert ganzheitlicher Schutz (IBM & Computerwoche - November 29, 2018)
Impact of GDPR to U.S. Companies (EUGDPR Academy - November 29, 2018)
Future-Ready Threat Detection & Response: SOC, SIEM or MDR? (Rapid7 - December 3, 2018)
Schluss mit Malware-Stress! Endpoint Security geht automatisiert (Matrix42 & enSilo - December 5, 2018)
ISO 27001/ISO 22301: The certification process (Advisera - December 5, 2018)
The Pending Impact of Quantum Computing on Cybersecurity (IBM Security - December 5, 2018)
Building Better Security (Carbon Black & EY - December 5, 2018)
The Top Cyber Security Trends in 2018 and Predictions for the Year Ahead (IBM Resilient - December 6, 2018)
Is your IT environment secure? – Find out where it leaks with Sophos attack simulation tools (Sophos - December 7, 2018)
Cyber Security Threat Predictions 2019 (Checkpoint & Forrester - December 11, 2018)
Cybersecurity Trends in 2018 and Predictions for 2019 (HelpSystems - December 11, 2018)
Comparing Privacy Laws: GDPR v. CCPA (Future of Privacy Forum & DataGuidance - December 13, 2018)
How to Mitigate Cyber Risk with Security Information and Event Management (SIEM) (HelpSystems & Cybersecurity Insiders - December 13, 2018)
2019 Security Predictions (Cybereason - December 19, 2018)
IT-Security: Prävention statt Schadensbegrenzung - Malware proaktiv stoppen, Einfallstore schließen (Computerwoche & Logicalis - January 31, 2019)
Achieving Office 365 Cyber Resilience (Conversational Geek - January 31, 2019)
Leveraging Your SIEM to Implement Security Best Practices (Rapid7 - February 5, 2019)
20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered? ((ISC)2 & Splunk - February 12, 2019)
Vienna Cyber Security Week (WKO - Vienna, AT - March 11-15, 2019)
Stop the parasites on your network & regain control over your applications with Sophos XG Firewall (Sophos - March 18, 2019)
Albtraum Datenspionage - keine Chance für Datendiebe! (Matrix42 & Kingston - March 22, 2019)
Splunk 2019 Predictions (Splunk - March 28, 2019)
Digital Guardian DLP und EDR - Datenschutzverletzungen sind unvermeidlich, Datenverlust ist es nicht (Digital Guardian & Aqaio - September 08, 2020)
OWL Datendioden der Schutz für Ihre Kritische Infrastruktur (OWL Cyber Defense & Aqaio - October 15, 2020)
The Certified Kubernetes Security Specialist: What to Know and How to Pass (StackRox and The Linux Foundation - January 21, 2021)
Hack My Mis-Configured Kubernetes (Snyk and The Linux Foundation - January 28, 2021)
Humio - Effizientes Logmanagement in Echtzeit (humio & Aqaio - February 09, 2021)
Warnzeichen erkennen und sofort reagieren (MTR; Computerwoche & Sophos - March 11, 2021)
IT-Forensik leichter gemacht (Matrix42 - March 25, 2021)
EU MITRE ATT&CK Community Workshop (the European Commission - June 1-2, 2021)
How we respond to attacks and protect EU institutions (Airbus CyberSecurity - July 6, 2021)
IT-Sicherheit der Zukunft – mit XDR, KI und Automation (Security-Insider.de - September 17, 2021)
Airnow Cybersecurity Presents: The NIST framework (series: Identify, Protect, Detect - October 25 - 27, 2021)
Cyber Security in Defence and IT (Airbus CyberSecurity - November 2, 2021)
Providing the full and secure Visibility in OT and IT Networks with Garland Technology (Aqaio - November 30, 2021)
Microsoft Intelligent Security Summit: Europe (Microsoft Security - December 1, 2021)
Splunk Tech Talk: Security Edition - Splunk Intelligence Management for Splunk SOAR (Splunk - December 14, 2021)
Microsoft Tech Briefings: Protect your data in the hybrid work era with Microsoft Information Protection (Microsoft - December 15, 2021)
(Data Security) Predictions 2022: How to Stay Ahead of the Curve - Episode 2 (Splunk - January 18, 2022)
(Data Security) Predictions 2022: How to Stay Ahead of the Curve - Episode 3 (Splunk - January 20, 2022)
Vom Asset Management zur Asset Intelligence mit Axonius (Aqaio GmbH - July 21, 2022)
Microsoft Defender for Endpoint on Linux (Microsoft - November 9, 2022)
Wie sicher ist M365? (Security-Insider.de & mimecast & statista - November 11, 2022)
Automatisierte Pen-Tests und Red-Team-Tooling mit Core Impact & Cobalt Strike (Aqaio & Fortra - November 16, 2022)
Microsoft 365 Defender Overview (November 16, 2022)
Linux Foundation Webinar, sponsored by Cockroach Labs: Is Kubernetes the Next Fault Domain? (November 16, 2022)
Filesharing im Job ohne Sicherheitsrisiko (Security-Insider & FTAPI - November 18, 2022)
Cyber Defense Hack | Capture the Flag (Trend Micro Vision One CTF Europe - pco GmbH & Trend Micro - November 24, 2022)
Guidelines for Improving Your Cloud Security Posture (EC-Council - November 30, 2022)
Microsoft Defender for Cloud Apps Deep Dive (December 7, 2022)
Faktencheck Endpoint Detection & Response: Weil normale Malware Detection nicht ausreicht (Security-Insider.de & Qualys Inc. - December 8, 2022)
True Cyber Emergency Stories and Leadership Action Plans (EC-Council - January 17, 2023)
Blue Teaming – die Frontkämpfer der Cybersecurity (Trend Micro - February 23, 2023)
Threat Exposure Management - Wie bekomme ich meine externe Angriffsfläche unter Kontrolle? (Aqaio & ULTRARED - March 7, 2023)
Introducing Novel Technologies for Effective Threat Hunting (EC-Council - March 7, 2023)
Mastering Email Authentication and Slashing Overrides (Microsoft 365 Defender Virtual Ninja Training - March 9, 2023)
Microsoft Sentinel Integration (Microsoft 365 Defender Virtual Ninja Training - March 14, 2023)
Defender Experts for Hunting Overview (Microsoft 365 Defender Virtual Ninja Training - March 16, 2023)
Mobile Threat Defense (Microsoft 365 Defender Virtual Ninja Training - March 20, 2023)
Microsoft Defender for Identity and Defender for Endpoint: Better together (Microsoft 365 Defender Virtual Ninja Training - March 23, 2023)
Get to know the Microsoft Defender Vulnerability Management Premium Capabilities (Microsoft 365 Defender Virtual Ninja Training - March 27, 2023)
Monitoring Threats in All Types of Cloud Environments (EC-Council - March 28, 2023)
Cloud Threats and Vulnerabilities Summit (Cloud Security Alliance - March 28 - 30, 2023):
- Achieve Tip-of-the-Spear Security with Confidential Computing (Anjuna)
- What the Flunk? Failing to Identify Risks and Threats to Enable Business Decisions. A Deeper Look at Top Threats. (CSA)
- Thinking Like an Attacker in the Cloud (Uptycs)
- ChatGPT Security Implications (CSA)
- The Cloud Vulnerability Journey - It s Rocky Terrain (Anchore)
- Defending Against The Cloud Native Adversary: How Threat Actors Weaponize the Cloud for Targeted Attacks (Rapid7)
- Exposing the Future: Leveraging CSA's Global Security Database (CSA)
- Vulnerability Landscape 2022 Year In Review (Qualys)
Securing Cloud Native Applications in 2023: Using visualization, context and guided remediation to eliminate critical risks (Aqaio & Ermetic, March 29, 2023)
Attack disruption (Microsoft 365 Defender Virtual Ninja Training - March 29, 2023)
Identity threat detection and response (Microsoft 365 Defender Virtual Ninja Training - March 30, 2023)
Cybersecurity Meetup (The Demo Forum / CSA - April 4 - 7, 2023):
- Semantic Intelligence for Zero Trust (Concentric)
- Agile Data Security in the Cloud (Laminar Technologies)
-
Executive Overview (Normalyze)
- Flying Blind: The Case for Cloud Data Security (Open Raven)
- Ilumio Flexible Labeling (Illumio)
- Containment Switch aka "Killswitch" (Illumio)
Detect LIVE: Scaling Up Cyber Security Operations (Anomali, April 18, 2023)
Reduce the Noise: How Machine Learning and AI Improves Detection & Response (Cisco Secure - April 18, 2023)
Identity-Driven Security: The Key to Zero Trust (EC-Council - April 19, 2023)
Die dunkle Seite der IT: Methoden moderner Hacker – Update (2023) (Trend Micro - April 20, 2023)
Qualys Technical Series: How TruRisk Helps You Manage Vulnerabilities More Effectively (Qualys - April 20, 2023)
Threat Protection Engagement for Microsoft Partners (The Partner Masters - August 7, 2023)
Integrating Microsoft 365 Defender with Azure Logic Apps (Microsoft Techcommunity - September 18, 2023)
Direktive mit Biss – wie die EU Cybersicherheit neu definiert (Trend Micro - September 28, 2023)
Why SIEM is Difficult (Ultimate Windows Security - September 28, 2023)
Complete Visibility in your Network and reduce your TCO for your SIEM (Aqaio & Corelight - October 5, 2023)
ATT&CKCON 4.0 (MITRE - October 24 - 25, 2023)
Modern SOC & Security Copilot (Nixu & Microsoft - October 24, 2023)
Autumn Online Summit (Infosecurity Magazine - November 14 - 15, 2023)
Shadow IT and Shadow SAAS, what is the Problem and how Axonius can solve it (Aqaio & Axonius - November 15, 2023)
Why SOAR is worth the investment (IBM - November 15, 2023)
EMEA Virtual Workshop: Machine Learning & AI (Splunk - November 16, 2023)
Was gibt es Neues rund um Microsoft Entra (Microsoft Deutschland - December 5, 2023)
Take your Red Teaming to the next level - Cobalt Strike & Outflank (Aqaio & Fortra - December 6, 2023)
Automotive CISO Forum - 4th edition (Google Deutschland - December 6, 2023)
Perspektivwechsel (Azure, Workplace und Security) (glueckkanja - December 7, 2023)
RSAC 365 Virtual Seminar: Operations—Improving Collaboration & Reducing Risk (RCA Conference - December 7, 2023)
Microsoft Security - build an effective infra against Ransomware (Microsoft Reactor - December 7, 2023)
Gaining control of SAP applications security & automatic attack disruption (Microsoft - December 11, 2023)
CYBERsicher WebImpuls: Die NIS-2-Richtlinie (Transferstelle Cybersicherheit im Mittelstand - December 12, 2023)
Microsoft Defender for Endpoint deception (Microsoft Virtual Ninja Show - December 13, 2023)
Cybersecurity Richtlinie NIS2 - Wer ist betroffen und was ist zu tun? (TheUnified - December 14, 2023)
Demystifying Defender for IoT (Microsoft - December 18, 2023)
Protect on-premises resources with MFA via Microsoft Entra Private Access (December 20, 2023)
Azure Community Enthusiasts User Group Episode 7 (December 27, 2023)
QRadar SOAR Training - Day 3 (IBM - January 17, 2024)
NIS-2 im Klartext: Fristen, Pflichten, Übergang (G DATA CyberDefense - January 17, 2024)
Ransomware: Angriff ist die beste Verteidigung (MindBytes - January 17, 2024)
The Role of Generative AI for Security Operations (Mandiant EMEA - January 18, 2024)
There Will Be Lawyers: The Legal Costs of Breach Response (Illumio - January 18, 2024)
Securing Apps in Distributed Environments (F5 - January 18, 2024)
KI erfolgreich nutzen & Cybersecurity (TheUnified - January 25, 2024)
Sichere Datenklassifizierung: FORTRA Suite, DCS Integration & MS Purview (Aqaio - January 25, 2024)
Resilience Talks: Reflections from Davos 2024 (Splunk - January 29, 2024)
Microsoft Discovery Day: Building Cyberthreat Resilience (Microsoft Deutschland - January 30, 2024)
Microsoft Discovery Day: Modernize Your Security Operations Center (Microsoft Deutschland - January 30, 2024)
Microsoft Discovery Day: Protecting Your Data (Microsoft Deutschland - January 30, 2024)
Azure Architects Connect | Entra Suite im Fokus: Innovationen, Entwicklungen und die Secure Service Edge Lösung (Microsoft Deutschland - January 31, 2024)
Microsoft Tech Brief: Comprehensive Threat Protection with XDR and SIEM (Microsoft Deutschland - February 6, 2024)
Microsoft Tech Brief: Modernize Your Security Operations with Microsoft Sentinel (Microsoft Deutschland - February 6, 2024)
Microsoft Tech Brief: Improve Data Security with Microsoft Purview (Microsoft Deutschland - February 6, 2024)
Fortify your Data Security with Microsoft Purview Workshop (Microsoft - February 6, 2024)
2023 Mobile Threat Landscape Overview (Brighttalk / ThreatFabric - February 7, 2024)
Hybrid Active Directory Identity Attacks and Defense (CQURE Academy - February 7, 2024)
EU NIS2 Implementation in EU Countries - OpenKRITIS (Insignals GmbH - February 27, 2024)
Digital Event: Microsoft Secure | Security for all in the age of AI (Microsoft - March 13, 2024)
Bereit für NIS-2? Was die neue EU-Richtlinie bedeutet (WEKA Fachmedien - March 14, 2024)
Mit NIS2 zur Cyberresilienz (Security Insider - March 14, 2024)
Microsoft Security Webinar „Moderne Cybersicherheit“ – Teil 3: SOC-Aufgaben durch Automatisierung und KI beschleunigen (Microsoft Deutschland - March 20, 2024)
Microsoft Security Webinar „Moderne Compliance“ – Teil 3: Insiderrisiken minimieren (Microsoft Deutschland - March 21, 2024)
Security und Copilot (Microsoft Deutschland - March 21, 2024)
Microsoft Defender for Cloud integration into Defender XDR (March 27, 2024)
Navigating the threat landscape with Microsoft Defender for Office 365 lead (April 1, 2024)
Navigating the Security Maze of Distributed SaaS Applications and Devices (BrightTALK / Valence, CrowdStrike and Corelight - April 2, 2024)
Microsoft Security Webinar: Copilot – KI als Ihr persönlicher Assistent für effektivere, schnellere Cyberabwehr (Microsoft Deutschland - April 11, 2024)
Microsoft Security Virtual Training Day – Implement Data Security with Microsoft Purview (Microsoft Deutschland - April 15, 2024)
Netzwerksicherheit: Was passiert hinter Ihrer Firewall und EDR? (The Unified & Vectra AI - April 17, 2024)
Microsoft Discovery Hour: Building Cyberthreat Resilience (Microsoft - April 17, 2024)
Microsoft Fragestunde: Datenschutz & Datensicherheit | Für Unternehmen (Microsoft Deutschland - April 23, 2024)
Azure Architects Connect - Identity Threat Detection and Response (ITDR) (April 25, 2024)
Threat Detection & Hunting in the Era of Security Lakes: Part 1 (SOC Prime and AWS - May 2, 2024)
Get more done with QRadar SIEM...and try it out yourself! (IBM - May 2, 2024)
CISO experience with Copilot for Security (Microsoft - May 8, 2024)
Exploring Quality Prompting Techniques in Copilot for Security (Microsoft - May 13, 2024)
InfoGuard Security Webcast | XDR: Das Zauberwort für eine effiziente Cyberabwehr (InfoGuard - May 16, 2024)
CodeSecDays (GitGuardian - June 26, 2024)
Atomics on a Friday || ShellSweepX Release (August 16, 2024)
Enhancements in Microsoft Defender for multi-tenant & device security mgmt (August 20, 2024)
Microsoft Copilot for Microsoft 365 Training for IT Professionals (August 27, 2024)
Boosting Infrastructure Security: The Top 10 Configuration Must-Dos (CQURE Academy - August 28, 2024)
Migrating your SIEM Solution to Microsoft Sentinel Bootcamp | Day 3 | EMEA (BST) (August 30, 2024)
Deploy and Optimize Microsoft Sentinel Workshop | Day 1 (September 5, 2024)
Network Security Protection with Azure Firewall, Azure WAF, and Azure DDoS (September 5, 2024)
Hybrid SANS & CCB Cloud Security Event (SANS & Centre for Cybersecurity Belgium - September 6, 2024)
Deploy and Optimize Microsoft Sentinel Workshop | Day 2 (September 6, 2024)
Simplifying your Microsoft Sentinel migration experience (September 10, 2024)
Modern Security Operations Partner Bootcamp | Day 2 (September 11, 2024)
Mimecast's September Threat Intelligence (September 12, 2024)
Migrating to an Identity Centric Authorization Strategy (September 12, 2024)
Demystifying correlations in the Unified Security Operations Platform (September 12, 2024)
Discover how Dark Web Intelligence can strengthen your cyber defenses (Secura BV - September 17, 2024)
SANS Healthcare Forum: Tackling Challenges, Building Cyber Resilience (SANS - September 19, 2024)
Context-Based Detection Engineering (SOC Prime - September 19, 2024)
CISA's Logging Made Easy Webinar (CISA - September 19, 2024)
Microsoft Fragestunde: Datenschutz & Datensicherheit | Für Unternehmen (September 24, 2024)
Effizientes Schwachstellen- und Patchmanagement im Gesundheitswesen (IntraConnect GmbH - September 25, 2024)
Ransomware stoppen, bevor es zu spät ist - On-Premises-MFA und Service Accounts im Fokus (Silverfort LTD - September 26, 2024)
Beyond the Traditional SIEM: from legacy to Splunk Enterprise Security (Splunk EMEA - September 26, 2024)
Defending operational technology environments with Microsoft Defender XDR (September 26, 2024)
Microsoft Security Virtual Training Day – Configure Security Operations Using Microsoft Sentinel (September 30, 2024)
Microsoft Security Virtual Training Day: Defend Against Threats with Extended Detection and Response (September 30, 2024)
Proactive Protection with Microsoft Security Exposure Management: Part 1 (October 1)
Atomics on a Friday: Unveiling LOLRMM - A New Dawn in Cyber Defense (October 4, 2024)
Splunk Threat Briefing: So wehren Sie gängige TTPs ab, die auf M365-Umgebungen abzielen (October 8, 2024)
NIS-2 für die Wirtschaft: Was wir schon sagen können (October 8, 2024)
Promptbooks in Copilot for Security (October 8, 2024)
Mimecast's October Threat Intelligence (October 10, 2024)
Defender for Office 365: In-depth defense with dual-use scenario (October 10, 2024)
From Tech Expert to Cybersecurity Leader: Navigating the Transition (SANS - October 10, 2024)
QRadar User Group Deep Dive (35): Logs - API oder REST; Maximo Integration (October 16, 2024)
How Generative AI Can Transform Security Tools: Innovations Ahead (Forrester - October 17, 2024)
Cyber Resilience Awareness Day Virtual Summit (ISSA Cyber Resilience SIG - October 17, 2024)
Novuna automatisiert die Bedrohungsanalyse mit Splunk Attack Analyzer (October 22, 2024)
Service Provider Special: Proven Strategies for MDR Excellence (SOC Prime - October 22, 2024)
MITRE ATT&CKcon 5.0 (October 22-23, 2024)
Atomics on a Pre-Halloween Friday || The Haunting of Cyber Defenses (October 25, 2024)
Attack Analyzer: Die automatisierte Standalone-Lösung für effektive Cyberabwehr (October 30, 2024)
Cybersecurity Resilience and Market Conference (ENISA - October 31, 2024)
SANS Threat Analysis with Katie Nickels (October 31, 2024)
Fall Cyber Solutions Fest 2024: Detection (SANS - November 7, 2024)
Confidential Computing Workshop for AWS Nitro Enclaves (November 7, 2024)
The Future of SIEM: A Discussion featuring Allie Mellen - Revolutionizing the Analyst Experience (Splunk - November 7, 2024)
Wie Ihr Secrets Management wirklich sicher wird (Security Insider - November 12, 2024)
Storm⚡️Watch | JA4+ Creator Reveals All & Why NIST is Playing Catch-up (November 19, 2024)
Resilience Talks with Somerford: The State of Observability 2024 (November 20, 2024)
Introducing Splunk Enterprise Security 8.0! (November 20, 2024)
Resilience Talks: Lagebericht Observability 2024 (November 21, 2024)
Cloud Forensics Investigations: A Practical Guide to Digital Forensics (November 21, 2024)
CyberArk and Wiz – Securing Identity at the Scale and Speed of Cloud Development (November 21, 2024)
Splunk Federated Analytics for Amazon Security Lake (November 21, 2024)
Cloud Security: First Principles and Future Opportunities Part 2 of 5 - Secure by Design: Elevating Security Beyond Defaults
Azure Architects Connect - Better together: Microsoft Sentinel und Einbindung von Copilot for Security (November 26, 2024)
Microsoft Defender for Identity for Entra Connect (November 26, 2024)
Defender XDR’s Data Security Context with Insider Risk Management (November 27, 2024)
Die Realität der Cloud-Sicherheitsrisiken! (Security Insider - November 28, 2024)
Microsoft Security Connection: NIS2 (November 28, 2024)
NIS2 challenge: how to manage large numbers of suppliers (Secura - November 28, 2024)
Empowering Business Resilience in the digital world: Navigating NIS2 and the Critical Entities Resilience Directive (PWC - December 3, 2024)
Trend Micro Webinar: Cybersecurity-Risikomanagement verstehen: Die NIS 2-Richtlinie und ihre Herausforderungen (December 3, 2024)
Unlocking Advanced Cloud Detection & Response capabilities for containers (December 3, 2024)
Improving security posture management with Copilot for Security innovations (December 4, 2024)
LIVE AMA: Defender XDR’s Data Security Context with Insider Risk Management (December 4, 2024)