Webinar series: Staying ahead of emerging cyber threats

The cyber landscape is changing fast – and the pressure on organizations is growing. With AI-driven attacks, compromised identities, and increasingly complex digital environments, cybersecurity can no longer be treated as a series of isolated measures. What’s needed is a cohesive strategy that can address threats before they escalate.

That’s why, together with CrowdStrike, we’re launching a new webinar series with four short and focused sessions. Each session will spotlight current challenges within threat hunting, cloud security, exposure management, and identity protection – and show how you can strengthen security in practice.

The webinars are designed for anyone working with IT security, risk management, or digital development who wants concrete methods and recommendations that can be applied directly in day-to-day operations.

Read more about each session below and sign up via the link on the left.

We look forward to welcoming you from September 23.

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Webinar 1 | Threat hunting 2025: Insights from the frontline
23 September, 10:00–10:30

Cyber threats are evolving faster than most organizations can keep up. This webinar covers highlights from CrowdStrike’s Threat Hunting Report 2025, with a focus on real-world incidents, trends, and tactics from the past year.

Webinar 2 | Cloud security: Protecting data and operations
21 October, 10:00–10:30

The cloud offers flexibility – but also new demands for security and visibility. We’ll look at how to safeguard data and applications across diverse cloud environments.

Webinar 3 | Exposure management: Staying ahead of risk
25 November, 10:00–10:30

What does your attack surface look like – and how do you prioritize risks? This session focuses on exposure management as a discipline and how you can stay ahead of attackers in an AI-driven reality.

Webinar 4 | Identity protection: Identities under pressure
20 January, 10:00–10:30

Identities are among the most targeted entry points for attackers. This webinar explores methods and technologies to protect users, credentials, and access rights – and to detect misuse before it’s too late.