<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us
German website


Cybercriminelen dringen volautomatisch jouw IT systemen binnen via zwakke plekken of via jouw leveranciers. Hoe bereid je je hierop voor? Experts delen hun inzichten 

Kijk on-demand

On-Demand webinar | CEO chat: reflections & predictions

The CEOs of Silobreaker, Intel471, and Cybersprint sit together to discuss what they've learnt from last year's events - and what we can expect in 2021. 

Watch on-demand

Patrolling the seas for cyber-pirates, while the leak is in your boat

We can be so preoccupied looking for incoming threats and attacks, we forget to lock the back door - or don’t even know of the door’s existence. When the bigger picture of your attack surface is incomplete, how can you tell what is most at risk? What should you secure first?

Watch on-demand

Webinar: Ransomware Submarine

In this on-demand webinar, Intel471 and Cybersprint take you down into the depths of enterprise ransomware. What can you do to protect your organisation? 

Watch Webinar


Cyber criminals use the wealth of information on your organisation to plan their attack. The MITRE PRE-ATT&CK provides the tactics to understand and detect those activities, helping you to prevent attacks before they happen.

Watch the webinar

Webinar Mitigating 3rd Party Risk

A solid mitigation strategy is vital when protecting your organisation from third-party risk. How can you regain control over your third-party risks, and what are the key components of an effective mitigation strategy?

Watch the webinar

Webinar From Practice to Preventing

Hear how misuse of the supply chain worked as stepping stones into an organisation. What's the story behind the attack on critical infrastructure that compromised the network of a nuclear power plant? And what is the evolution of Business Email Compromise? 

Watch the webinar

Webinar Third-Party Risk

Gain insights into the most common and impactful risks of your suppliers, based on our research and case studies. Regain control over the assets in your online footprint, both your own as well as your suppliers’.Financial institutions and other organisations outsource parts of their IT infrastructure. Though it brings many opportunities, it also increases the digital attack surface of your own organisation. Your own cyber-resilience may be up to par, but is your suppliers’ too?

Watch the webinar

Do you have a question?

Our experts have the answers

Contact us