Technologies like IoT or Machine Learning are emerging, accompanied by new security challenges and targets for attacks. One way to meet these is sharing knowledge and raising awareness. Join this series of Spike Reply sessions as part of the EU Cyber Security Month.
Spike Reply presents methods, tools, and techniques used by attackers when performing so-called "dynamite phishing" attacks, such as Emotet. The experts summarize the threats of phishing attacks and outline how the attack pattern changed over the years.
In this talk, Spike Reply goes through a brief introduction to Serverless Computing, followed by a deep dive into its security. The experts analyze how security differs in serverless compared to classical architecture.
Reply has developed an IoT Security Lab, that helps to demonstrate and test possible attacks in order to support the ability to quickly react to security issues and reduce risks of production outages. Get an understanding of IoT value chain and the potential security risks in this environments. Unterstand how a typical attack is executed and get an overview of the different security measures to protect your environment.
In this session Reply Cybersecurity provides an overview about AI based breach and attack simulation including leveraging threat intelligence. Learn about the benefits of a blend of professional services and managed services to reduce attack surface.
Reply Cybersecurity and CheckPoint introduces you to Zero Trust Architecture to understand the concept and building blocks behind it. The experts show some practical approaches and solutions (CheckPoint Infinity) for creating a Zero Trust Architecture.