Channel Avatar

SecuraBV @UC_c88SOQJMQR2Z9vcp8r_yg@youtube.com

0 subscribers - no pronouns :c

More from this channel (soon)


16:26
Cybersecurity in action: Using resilience data during crises
01:57
How do you make sure your staff behaves securely?
01:30
How to bring your cyber crisis management to the next level
00:57
Total panic... Can you handle a cyber attack?
01:42
How to stay one step ahead of cyber criminals: reduce your attack surface
01:42
Stolen or leaked credentials? We can help you find them before criminals use them against you
01:55
How to choose the right pentesting partner?
00:51
For sys admins: the Hands-on Hardening Workshop
01:32
How to reach UNECE compliance for automotive manufacturers
04:23
How to extract Azure secrets - GUI
46:32
Quantifying Human Risk In Cybersecurity
44:39
Navigating Maritime Cybersecurity
35:49
How to Master Cybersecurity Like Big Banks - Webinar Replay
00:36
Vishing Demo: 49% share their password within 3 minutes
36:42
Secura Webinar on Demand | Red Teaming in OT at Enexis
41:52
Webinar Replay | How to achieve Cybersecurity Compliance as an Automotive Supplier | ISO 21434
45:55
[Webinar Replay] Defend Your Domain - Securing Your External Attack Surface
20:50
Why you need External Attack Surface Monitoring
01:50
Who the Hack Are You? | Meet Secura's Team! Ep.2
40:27
Red Teaming bij RDW - Lessons learned uit realistische hacksimulatie
48:10
NIS2: Perspectives of a Regulator | Secura Webinar
46:17
The NIS2 Directive: Raising Your Cyber Resilience | Secura & Bureau Veritas Webinar
01:15
Who the Hack Are You? | Meet the Secura team!
25:32
02_Hacking Hospitals | Hackers Pod
28:39
01_Cracking Crypto | Hackers Pod
52:06
Raising Resilience against Ransomware Attacks
02:59
Amphia Hospital x Red Teaming | Secura Case Video
47:19
Psychology Addressing the Human Factor in Cybersecurity
42:31
UNECE Cybersecurity (R155) Regulation for Automotive Suppliers
36:47
A Practical Approach to Risk Assessment in the Automotive Sector
43:09
UNECE Cybersecurity R155 Regulation for Vehicle Manufacturers
46:44
Raising Resilience against Ransomware Attacks
00:22
Secura Webinar | Raising Resilience Against Ransomware Attacks
42:32
Cybersecurity of Industrial Equipment - IEC 62443
39:29
Trends in Operational Technology Security
43:02
Cybersecurity in the Automotive Sector - Intro to UNECE
50:16
Log4j, Latest Insights, and How to Stay Secure! - Update 6th of January 2022
45:20
Secura Webinar | Log4j, Latest Insights and How to Stay Secure!
38:53
Secura Webinar | Presenting OTCAD, the Operational Technology Cyber Attack Database
47:56
Secura Webinar | Evaluating OT Cyber Resilience Through Red Teaming
39:40
Secura Webinar | Securing Containers: Tips & Tricks
41:43
Secura Webinar | Psychology Addressing the Human Factor in Cybersecurity
44:56
Secura presents 'OT Security Risks How to Assess and Address ' 2
01:02:13
Emerging Issues in Cybersecurity A Quickstart Guide to ISO:UNECE Standards within Automotive
44:52
Secura presents 'Protecting Crown Jewels Red Teaming in Operational Technology' 3
03:38
Cloud CI CD Backdoor
48:51
Trinity DS & Secura present 'OT Security Risks Remote Access & Maintenance'
43:54
Secura webinar 'Water Sector Threats as seen through the lens of MITRE's ATT&CK Framework for ICS'
45:10
UNECE Cybersecurity & Software Updates Regulation: The Calm Before the Storm | SecurAcademy Webinar
44:08
Crystal Box Assessments in Cloud Finding Common Misconfigurations and How to Fix Them
41:47
Ransomware in de Zorg: Voorkomen is beter dan genezen! | SecurAcademy Webinar
44:11
IoT Products Certification: What are your Options | SecurAcademy Webinar
36:24
Industrial Products Certification: What are your Options | SecurAcademy Webinar
42:05
Informatieveiligheid in de Zorg: Nulmeting NEN 7510 & Gedragslijn Audit | SecurAcademy Webinar
43:34
Shifting Left: How to Develop Software Securely Secure SDLC Explained | SecurAcademy Webinar
45:06
Common Criteria for Embedded Software Products: The Ultimate Security Recognition | SecurAcademy
43:53
Webinar In Control of Water Sector Cybersecurity Threats
40:34
Ransomware in het publieke domein: Hoe voorkomt u het? | SecurAcademy Webinar
46:48
Security Challenges of a Cloud Migration | SecurAcademy Webinar
45:27
How to Get the Most Out of Your Pentest? | SecurAcademy Webinar