"Think Before U Click!" #ThinkB4UClick

Past events

  • 2021-09-26T22:00:00+00:00
  • 2021-12-30T23:00:00+00:00
September 26 Sunday

Sep 26, 2021 10:00 PM to Dec 30, 2021 11:00 PM

Most attacks start on the endpoint. Time to embrace the threat and brush up on your defense skills. Join the Attack & Defend Virtual War Room Experience to watch and learn as White Hat hackers Len Noe and Andy Thompson battle head-to-head in a real-world endpoint hacking and defense simulation. During this virtual attack simulation, you’ll walk away with a better understanding of: Cryptojacking: what to look for and to it can be prevented How dynamic ransomware propagates throughout a network, leaving behind untraceable financial transactions and data leakage The combination of security controls that can complete disarm a ransomware attack Embrace the perspective of an attacker to learn how to stay one step ahead.

  • 2021-09-26T22:00:00+00:00
  • 2021-12-30T23:00:00+00:00
September 26 Sunday

Sep 26, 2021 10:00 PM to Dec 30, 2021 11:00 PM

Three 20-minute virtual training sessions for security professionals that want to become more effective DevOps partners Securing DevOps pipelines and cloud native apps are one of the top priorities for security professionals in 2021. But DevSecOps is not something that will happen on its own – Security needs to bring its expertise to the development team. But, how? Participate in our DevSecOps Boot Camp to learn how to transform into true DevSecOps partners. And increase and improve your skills and knowledge in the DevOps field overall.

  • 2021-09-26T22:00:00+00:00
  • 2021-12-30T23:00:00+00:00
September 26 Sunday

Sep 26, 2021 10:00 PM to Dec 30, 2021 11:00 PM

Modern threats and recent incidents, such as the SolarWinds digital supply chain attack, are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy. In this panel discussion, we bring together three leading executives, who have decades of experience in this field, to provide CISOs and security executives with lessons learned and recommendations on Zero Trust models. Topics covered will include: How the risks around privileged access are changing as users and resources are increasingly outside the corporate network What techniques attackers are using to try to gain privileged access How organizations can adopt a Zero Trust approach by moving toward comprehensive Identity Security

  • 2021-09-26T22:00:00+00:00
  • 2021-12-30T23:00:00+00:00
September 26 Sunday

Sep 26, 2021 10:00 PM to Dec 30, 2021 11:00 PM

TO DEFEND AGAINST A CYBERCRIMINAL, YOU MUST FIRST THINK LIKE ONE. The Think Like an Attacker Bootcamp series offers four 20-minute on-demand virtual episodes that will take you inside the dark place that is the cybercriminals mind. As a technology vendor and services provider, we at CyberArk also adopt the “Think like an Attacker” mindset. Hear directly from our own Red Team, Threat Research Labs experts, and resident White Hat Hacker as they shed light into how they uncover gaps and weakness, highlight common TTPs seen in real-world engagements, and discuss the future of the attack vector. Adopting this mindset will enable you to secure you organization and stay one step ahead of the threat actors.

  • 2021-09-24T22:00:00+00:00
  • 2021-09-24T22:00:00+00:00
September 24 Friday

Sep 24, 2021 from 10:00 PM to 10:00 PM

RomHack is a community-driven security conference held in Rome, gathering each year security experts and enthusiasts The fourth edition will take place in Rome on saturday 25th of September 2021 and speakers can be either local or remote

  • 2021-09-23T21:00:00+00:00
  • 2021-10-23T21:00:00+00:00
September 23 Thursday

Sep 23, 2021 09:00 PM to Oct 23, 2021 09:00 PM

Τα ηλεκτρονικά εγκλήματα ή απάτες αποτελούν ουσιαστικά τους τρόπους με τους οποίους κάποιοι κακόβουλα επιδιώκουν να αποκομίσουν χρήματα από ανυποψίαστους ιδιώτες ή επιχειρήσεις. Πολλοί πέφτουν σε αυτή την παγίδα, αφού η βασική τακτική που χρησιμοποιείται είναι η συλλογή πληροφοριών μέσω μηχανισμών που λειτουργούν από ξεχωριστά άτομα και όχι από αυτοματοποιημένα συστήματα. Αυτού του είδους οι απάτες αποτελούν κλασικά παραδείγματα για το πως οι απατεώνες μπορούν εύκολα να παίξουν με την ψυχολογία αλλά και την προσέγγιση των ατόμων για διάφορα θέματα. Οι πιο κάτω συμβουλές στοχεύουν στο να βοηθήσουν το κοινό να προστατεύσει τον εαυτό του. Η γνώση αποτελεί την καλύτερη μορφή άμυνας από ψηφιακές απάτες και εγκλήματα.

  • 2021-09-22T22:00:00+00:00
  • 2021-10-12T22:00:00+00:00
September 22 Wednesday

Sep 22, 2021 10:00 PM to Oct 12, 2021 10:00 PM

The Danish Agency for Digitisation is hosting a common public ISO bootcamp for the fourth year in a row. The focus will be the on the coming revision of ISO 27002 and ISO 27001, and how it will affect the daily work with information security. The ISO bootcamps will take place in Aarhus, Odense and Copenhagen.

  • 2021-09-22T21:00:00+00:00
  • 2021-09-22T21:00:00+00:00
September 22 Wednesday

Sep 22, 2021 from 09:00 PM to 09:00 PM

Join our free webinar “Protection of sensitive data in the cloud with the Intel®️ SGX Technology” with speakers from Scontain, Intel and G-Core Labs: https://bit.ly/Event-Data-Protection  We’ll discuss how to effectively tackle the challenges in the field of information security with our brilliant speakers: 👉 Dr. Markus Leberecht, Senior Cloud Solutions Architect at Intel Confidential Computing through Intel®️ SGX technology as a foundation enabling digitization in healthcare, financial, retail sectors and beyond 👉 Vsevolod Vayner, Cloud Platform Department Head at G-Core Labs Infrastructure services with Intel®️ SGX enabled option: an overview. The first case studies, including Aggregion 👉 Prof. Christof Fetzer, Chief Operations Officer at Scontain Step-by-step creation of confidential application in Intel®️ SGX enclave The event will be moderated by Dmitry Karaulov, G-Core Labs, Pre-Sale Engineer. 📍Stay tuned! The webinar recording will definitely appear in your inbox :) 📍Online, September 23 📍Free, start at 3 PM (CET) Registration: https://bit.ly/Event-Data-Protection 

  • 2021-09-21T22:00:00+00:00
  • 2021-09-21T22:00:00+00:00
September 21 Tuesday

Sep 21, 2021 from 10:00 PM to 10:00 PM

Good advice on how to make your home office cyber secure.

  • 2021-09-20T21:00:00+00:00
  • 2021-09-22T21:00:00+00:00
September 20 Monday

Sep 20, 2021 09:00 PM to Sep 22, 2021 09:00 PM

While the fight against the COVID-19 pandemic is not yet won, with some vaccines in sight, we see that a new reality is coming. This is the NEXT NORMAL companies and the society are preparing for. After a massively stressful 2020, the 2021 came with huge challenges to accelerate digital business transformation while increasing agility and resiliency. The pandemic has dramatically increased the speed at which digital is fundamentally changing business. The future will belong to companies that put technology on top of their agenda. The role of Chief Information Officers (CIOs) has transformed in the wake of the pandemic, focusing more on business models than technology and becoming a key player within C-suite. Technology is the best ally for the CIOs. Companies accelerated their migration to Cloud while building an Edge Computing Strategy and distributed infrastructure. 5G, IoT and Analytics are the new game changers while Artificial Intelligence becomes more applied. But ransomware and the huge increase of cyberattacks are the digital party breakers. CIOs and companies put cybersecurity on top of their agendas building Digital Cyber Resiliency and zero trust architectures. Data privacy is a major cultural change and an important topic on European agenda. Data control and Digital Sovereignty impose a new open digital ecosystem. It is a great time to be a CIO!! Main topics: Digital trends for 2022. Embrace a brilliant technological future. Building an Edge Computing Strategy. Distributed infrastructure. How to build a Cloud and infrastructure strategy. Artificial Intelligence is only just beginning. Applied AI Business Intelligence and Advanced Analytics Future of connectivity. 5G and IoT connectivity Ransomware the new form of commercial terrorism Zero trust architecture. Data privacy a major cultural change Security by design. Industrial Control Systems vulnerabilities. European Digital Agenda. GAIA-X, Digital Markets Act. How to avoid vendor lock-in and unfair practices. Delivering the future of work. The digital work force. Driving a culture of customer centricity Day 1: TRENDS AND TECHNOLOGY Day 2: CYBERSECURITY RESILIENCE Day 3: ACCELERATED DIGITAL TRANSFORMATION