Webinar January 28th 17:00-18:30 CET

Secure your Applications

Days
Hours
Minutes
Seconds

Event hosted by Forefront Consulting & foreseeti

During the first part of the webinar we’ll listen to Erik Odlinder Haubos experience of implementing Keycloak for secure payments at Coop. He cover how to create authentication solutions with Keycloak and how to implement it on mission-critical services and applications.

During our second session Erik Ringdahl, Foreseeti’s Product Director, will cover the topic of automated threat modeling and attack simulations. These two capacities empower IT decision makers with insight to their cyber risk exposure and resilience of their IT architectures, uncovering critical paths to high value assets so that proactive actions can be taken where they really matter. In this session Erik will showcase how this works in practice, with a specific focus on showcasing the capabilities for serverless environments.

Speakers

Erik Haubo
Forefront Consulting
erik ringdahl foreseeti product director
Erik Ringdahl
foreseeti

Save your Spot

Thank you for signing up!

DATE & TIME
Thursday January 28th 17:00 – 18:30 CET

Capability PROFESSIONAL VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

Capability VANGUARD ENTERPRISE
Automated model generation

SDK/APIs

Manual model creation & editing

Attack Simulations

Risk levels, Attack Paths & Chokepoints

Threat Summary & Suggested Mitigations

Multiple attack scenarios & comparisons

Advanced Analysis, Reporting & Progress tracking

Multiple projects and models

Multiple Environments (On-prem, cloud, custom)

Multi-user collaboration

WEBINAR NOVEMBER 19TH 17:00-18:30 CET

Automate Cyber Security in Cloud and DevOps Environments

We warmly welcome You to this webinar where our experts present leading security trends in using open-source software, hacker-powered knowledge, and attack simulations – automated in your pipelines!

detectify_outlined_logo_RBG
cropped-Debricked_LogoTransparentwhite (1)