Select your country

Not finding what you are looking for, select your country from our regional selector:

Search

picture of booth on cybersec 2025

Cybersec Europe | Thank you

Thank you for connecting!

We appreciate your interest in our cybersecurity initiatives. Your engagement is a vital step toward navigating the complexities of today’s digital landscape with confidence and resilience. As we continue to explore the unknown together, we invite you to deepen your understanding through our insights and live demonstrations.

Next steps

  • Book a tailor made demo. [here]
  • Download the persentations. [here]
  • Stay connected for updates on upcoming events and cybersecurity news. [here]

Thank you for your interest. We look forward to supporting your cybersecurity journey!

picture of booth on cybersec 2025

CERT Demo

Step into the shoes of a CISO facing a crisis. In this interactive CERT experience, you’ll be thrown into two high-stakes scenarios:

  • A credential leak exploited by cybercriminals

  • A vulnerability exploit threatening to compromise your systems

You’ll need to make critical decisions—under pressure and in real time.

Our CERT experts will be right there with you, unpacking each scenario and demonstrating how we leverage vulnerability intelligence, threat detection, and deep/dark web monitoring to anticipate and neutralize threats before they hit.

Think fast. Act smart. See how it’s done.

CyberSOC Demo

Dive into two live attack scenarios showcasing how skilled cybercriminals exploit vulnerabilities, navigate laterally, and steal sensitive data.

  • The Access Broker: Explore how attackers use phishing emails and vulnerabilities to gain access, escalate privileges and exfiltrate critical information. This simulation highlights the tactics of Initial Access Brokers who sell access to ransomware groups and other malicious actors.
  • Cloud Credential Heist: See how attackers infiltrate a domain controller, inject malicious code into Azure AD Connect, and intercept cloud authentication credentials. This scenario demonstrates the risks of lateral movement, privilege escalation, and credential theft in cloud environments.

You'll see how CyberSOC experts detect, analyze, and respond to these attacks in real-time, leveraging tools like Microsoft 365 Defender, Palo Alto Cortex XDR, and SIEM to turn cyber chaos into control.

You gotta fight for your right to third party!

50% of security incidents are now linked to third parties. It's crucial to urgently reevaluate your third-party risk management strategy.

This break-out session addresses the following key questions:

  • Which security standards should organisations and third parties follow?
  • Why is it critical to know where your data is stored and who can access it?
  • Why must incident response plans include suppliers?
  • Why are regular audits and clear evidence essential?

Third-party relationships are growing as companies outsource services to boost performance. With rising regulations, compliance must shift from a burden to an opportunity for improvement. Success depends on a unified risk framework, strong processes, and resilient infrastructure.

This presentation brings risk management to life with pop culture, music, and video, turning it into a chore you might genuinely enjoy in the future. ;-) A talk by Mathew Caplan, Head of International Professional Services at Orange Cyberdefense.

Download the presentation

In the absence of rules, strategy becomes everything.

Europe finds itself caught between a fragile dependency on American threat intelligence and mistrust of China, where visibility into cyber threats is virtually nonexistent. We've noticed cybersecurity trust is shifting, and some old rules no longer apply.

But that doesn’t mean we’re powerless. This keynote takes a stoic view of what we can control: reducing our attack surface, defining and living by a risk standard, and preparing for attacks that, once they hit our turf, do follow our rules.

No drama. Just clarity, pragmatism, and strategy in the face of chaos. A talk by Charl van der Walt, Head of the Security Research Center at Orange Cyberdefense. 

Download the presentation
charl as an astronaut

Incident Response Hotline

Facing cyber incidents right now?

Contact our 24/7/365 world wide service incident response hotline.