Threat Talks

Breaking the Bank

Breaking the Bank

Breaking the bank Financial sector cybersecurity threats  In this episode, our special guest and renowned cybersecurity expert Jayson E. Street shares his experiences on how he ethically "robs" banks to reveal security weaknesses. By exploiting human vulnerabilities...

Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition

Threat Talks on Tour – Cyber Guardians: Anti-DDoS Coalition

Cyber Guardians: Anti-DDoS Coalition This special episode is a discussion on the importance of defending against DDoS attacks, particularly for businesses that rely on online tools and websites. The host, Lieuwe Jan Koning from ON2IT and special guests Remco Poortinga...

Zero Trust with John Kindervag – Threat Talks on tour: Part 2

Zero Trust with John Kindervag – Threat Talks on tour: Part 2

Threat Talks on Tour - Live from the RSA | Part 2 Zero Trust with John Kindervag   Lieuwe Jan Koning, speaking from the RSA Conference in San Francisco, welcomes John Kindervag to delve into the concept of Zero Trust in cybersecurity. This episode is a sequel to...

Healthcare: Responsibilities, regulations and legacies

Healthcare: Responsibilities, regulations and legacies

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO, ON2ITRob Maas Field CTO, ON2ITSina Yazdanmehr Founder and Managing Director, Aplite GmbHHealthcare: Responsibilities, regulations and legacies The episode discusses the...

Supply Chain: Business as usual?

Supply Chain: Business as usual?

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITMatthijs Zwart CIO and CISO Vitens Supply chain: Business as usual?  As reliance on third-party and open-source software grows,...

The Authentication Apocalypse

The Authentication Apocalypse

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITHarald Bosman Senior endpoint engineer AMS-IXThe Authentication Apocalypse Word of data breaches and stolen credentials reaches...

Does remote work?

Does remote work?

Listen to The Threat Talks on:Your cybersecurity expertsRob Maas Field CTO ON2ITLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITDoes remote work? Allowing remote access, is required for almost all enterprises. But enablling remote...

Can’t deny DDoS in 2024?

Can’t deny DDoS in 2024?

Listen to The Threat Talks on:Your cybersecurity expertsPeter van Burgel CEO AMS-IXLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITCan't deny DDoS in 2024? DDoS attacks are becoming increasingly more frequent, and there...

Deep Dives

Deep Dive – Bangladesh Bank SWIFT attack

Deep Dive – Bangladesh Bank SWIFT attack

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO...

Deep Dive – Ivanti EPM

Deep Dive – Ivanti EPM

Listen to The Threat Talks on:Your PresentorsLieuwe Jan Koning Co-Founder and CTO ON2IT GroupLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITIvanti EPM - SQL...

Deep Dive – Google OAuth bypass

Deep Dive – Google OAuth bypass

Listen to The Threat Talks on:Your cybersecurity expertsLieuwe Jan Koning Co-Founder and CTO ON2ITLuca Cipriano Threat Intel Specialist ON2ITRob Maas Field CTO ON2ITGoogle OAuth...