Webinarserie NIS2 og andre aktuelle cybersikkerhedsemner
Kommende events:
8. juni, 10:00 - 11.00 CEST | Usikre identiteter
Både virksomheder og offentlige organisationer risikerer, mere end nogensinde før, at blive udsat for et alvorligt cyberangreb. Sandsynligheden for, at I allerede har været det, er faktisk forholdsvis stor. Ressourcestærke internationale cyberkriminelle organisationer er nemlig mere aktive end hidtil – og den udvikling forventes at fortsætte.
Derfor er det afgørende, at du som it- eller sikkerhedsansvarlig ved, hvordan I kan håndtere de stigende antal trusler.
Trifork Security og Crowdstrike inviterer til en række spændende webinars, hvor vi belyser forskellige aspekter af cybersikkerhed.
Eventdetaljer
30. marts 2023, 11.00-12.00
NIS2 direktivet – seneste opdateringer og hvad det betyder for dig (On-Demand)
NIS2-direktivet får stor betydning for, hvordan mange danske virksomheder og offentlige institutioner skal håndtere cyber- og informationssikkerhed i fremtiden – især hvis I varetager samfundskritiske funktioner. I slutningen af 2022 blev NIS2-direktivets tekst offentliggjort og nedtællingen for implementering er begyndt.
Er du i tvivl om, hvad NIS2 betyder for jeres organisation, og hvordan I skal forholde jer til de nye regler, så tilmeld dig vores gratis webinar.
På blot én time vil erhvervsjuridisk rådgiver og partner, Emil Bisgaard fra Poul Schmith/Kammeradvokaten gennemgå sikkerhedskrav, anvendelsesområder, styring af risici, tilsyn, påbud og bøder for overtrædelse af direktivet. Kort sagt – give dig overblik over alt, du som it-sikkerhedsansvarlig skal vide om NIS2. På webinaret får du også mulighed for at stille spørgsmål til Emil Bisgaard.
Taler: Emil Bisgaard, erhvervsjuridisk rådgiver og partner, Poul Schmith/Kammeradvokaten
Moderator: Henrik Skovfoged, Business Unit Manager, Trifork Security A/S
16. maj 2023, 10.00-11.00
’State of the art’-sikkerhed er mere end bare værktøjer (On-Demand)
Cyberkriminelle og statslige aktører udvikler sig konstant og får hele tiden adgang til mere avancerede værktøjer, hvilket får trusselsbilledet til at ændre sig kontinuerligt. For at sikre sig mod cyberangreb skal man kende til angriberen og dennes motiv, for det er vigtigt hele tiden at være et skridt foran angriberen. Hør mere om CrowdStrikes tilgang til at bekæmpe cyberangreb og hvordan vi hjælper virksomheder over hele verden med at beskytte deres data.
Taler: Mikkel Planck, Senior Cybersecurity Specialist, Crowdstrike
8. juni 2023, 10.00-11.00
Usikre identiteter
I forlængelse af den konstante udvikling i trusselsbilledet, gør aktører ofte brug af legitime identiteter i organisationer. CrowdStrike fortæller, at 80% af alle sikkerhedsbrud har relation til kompromitterede identiteter. I dette webinar vil Trifork Security fortælle om de udfordringer, der kan opstå med håndtering af identiteter. Vi vil give eksempler fra virkeligheden og fortælle om de værktøjer, der kan hjælpe med at give et overblik over dette emne og forbedre jeres sikkerhed.
Taler: Christian Bech Henriksen, Cyber Security Consultant, Trifork Security
TILMELD DIG
Venligst fravælg webinars du ikke ønsker at deltage i.
THE Forrester WaveTM
Enterprise Detection & Response, Q1 2020
Get Forrester’s evaluation of the 12 most significant EDR vendors
Try It FREE
CROWDSTRIKE EXECUTIVE SPEAKERS
Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.

Download this report to learn:
- The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
- What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
- Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Related Resources

Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download
2020 Global Threat Report
Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.
Download
Case Study: Financial Services Comp...
See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.
Download
Case Study: Greenhill & Co.
Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.
Download
Data Sheet: CrowdStrike Falcon For...
See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
Download
Forrester Wave: Enterprise Detecti...
Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.
DownloadRelated Resources
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
DownloadCase Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Download

Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
-
Highly Targeted
Financial services is the #1 targeted industry by cybercriminals.
-
Regulatory Compliance
Financial services companies must achieve compliance or risk heavy fines and loss of business.
-
Sophisticated & Persistent Attacks
Financial institutions are required to protect customer data regardless of where it is located.
Text
Text


Andy Ozment, Goldman Sachs CISO
Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.
SEE HOW CROWDSTRIKE STACKS UP
Try it free
FALCON PREVENT
FOR HOME USE
Enable employees who use a home system to access corporate resources to work safely and productively. To learn more, visit the Falcon Prevent for Home Use FAQ.
Get Falcon PreventFalcon Firewall Management: Host Firewall
Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies
Start Free TrialBlack Hat USA
August 6-11, 2022
Location: Mandalay Bay Convention Center, Las Vegas
Schedule
Friday
August 6
Saturday
August 7
Sunday
August 8
Monday
August 9
Tuesday
August 10
Wednesday
August 11
SPONSORSHIPS
PROUDLY SPONSORED BY OUR ALLIANCE PARTNERS










Related Resources Points
Related Resources Sub Points
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.
Case Study: Oak Hill Advisors
Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Stuart Wiggins
Senior Strategic Threat intelligence Advisor, CrowdStrike
Stuart has spent over 13 years working in cyber intelligence and is passionate about using threat intelligence to improve cyber defences and reduce the impact of malicious cyber activity. His focus is to help guide clients through all aspects of threat intelligence. Prior to CrowdStrike, Stuart started his career as an intelligence analyst in the UK Civil Service and has worked in a variety of operational and strategic roles covering a variety of national security and cyber security related topics, including a three year posting the to the United States where he worked with various U.S. Federal Government agencies.

Alistair Thomson
Head of Product Development and Innovation, Adarma
Alistair heads up product development and innovation at Adarma. Specialising in cyber threat detection and investigations, Alistair develops leading-edge defence and intelligence capabilities for large enterprises. While at Adarma Alistair has been the driving force behind the development and standardisation of the Adarma portfolio, with a particular passion for how we operationalise threat intelligence for our customers.
Show All