Levelling up Cyber Security

Technologies like IoT or Machine Learning are emerging, accompanied by new security challenges and targets for attacks. One way to meet these is sharing knowledge and raising awareness. Join this series of Spike Reply sessions as part of the EU Cyber Security Month.

Join Live Webinars!

Webinar Series

English
Silent Explosion: Dynamite Phishing Attacks
October 8, 2020
2:00 PM ‐ 3:00 PM CEST
Spike Reply presents methods, tools, and techniques used by attackers when performing so-called "dynamite phishing" attacks, such as Emotet. The experts summarize the threats of phishing attacks and outline how the attack pattern changed over the years.
English
Serverless Computing Security
October 16, 2020
11:00 AM ‐ 12:00 PM CEST
In this talk, Spike Reply goes through a brief introduction to Serverless Computing, followed by a deep dive into its security. The experts analyze how security differs in serverless compared to classical architecture.
English
Reply IoT Security Test Lab: Demo Hacking
October 22, 2020
2:00 PM ‐ 3:00 PM CEST
Reply has developed an IoT Security Lab, that helps to demonstrate and test possible attacks in order to support the ability to quickly react to security issues and reduce risks of production outages. Get an understanding of IoT value chain and the potential security risks in this environments. Unterstand how a typical attack is executed and get an overview of the different security measures to protect your environment.
English
Automating Security Testing
October 30, 2020
11:00 AM ‐ 12:00 PM CET
In this session Reply Cybersecurity provides an overview about AI based breach and attack simulation including leveraging threat intelligence. Learn about the benefits of a blend of professional services and managed services to reduce attack surface.
English
Zero Trust
November 24, 2020
11:00 AM ‐ 12:00 PM CET
Reply Cybersecurity and CheckPoint introduces you to Zero Trust Architecture to understand the concept and building blocks behind it. The experts show some practical approaches and solutions  (CheckPoint Infinity) for creating a Zero Trust Architecture.