Contact us
Request demo →
Contact us

Webinar | Log4j vulnerability

In this webinar, our CEO talks about the the log4j vulnerability. It’s used in thousands of different applications, leading to systems at risk on a largely unprecedented scale.

Watch on-demand

Webinar | The threat of open directories

In this webinar, we talk about the threats of open directories, our research and how to protect your organisation.

Watch on-demand


Cybercriminelen dringen volautomatisch jouw IT systemen binnen via zwakke plekken of via jouw leveranciers. Hoe bereid je je hierop voor? Experts delen hun inzichten 

Kijk on-demand

On-Demand webinar | CEO chat: reflections & predictions

The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021. 

Watch on-demand

Patrolling the seas for cyber-pirates, while the leak is in your boat

We can be so preoccupied looking for incoming threats and attacks, we forget to lock the back door - or don’t even know of the door’s existence. When the bigger picture of your attack surface is incomplete, how can you tell what is most at risk? What should you secure first?

Watch on-demand

Webinar: Ransomware Submarine

In this on-demand webinar, Intel471 and Cybersprint take you down into the depths of enterprise ransomware. What can you do to protect your organisation? 

Watch Webinar


Cyber criminals use the wealth of information on your organisation to plan their attack. The MITRE PRE-ATT&CK provides the tactics to understand and detect those activities, helping you to prevent attacks before they happen.

Watch the webinar

Webinar Mitigating 3rd Party Risk

A solid mitigation strategy is vital when protecting your organisation from third-party risk. How can you regain control over your third-party risks, and what are the key components of an effective mitigation strategy?

Watch the webinar

Webinar From Practice to Preventing

Hear how misuse of the supply chain worked as stepping stones into an organisation. What's the story behind the attack on critical infrastructure that compromised the network of a nuclear power plant? And what is the evolution of Business Email Compromise? 

Watch the webinar

Do you have a question?

Our experts have the answers

Contact us