48:27Reducing Application Risk What Technology Can & Can’t Protect AgainstBureau Veritas Cybersecurity11 views·1 week ago
1:02:01Threat Modeling – Locking the Door on VulnerabilitiesBureau Veritas Cybersecurity2 views·1 week ago
55:51IoT Security – Debunking the “We Aren’t THAT Connected” MythBureau Veritas Cybersecurity10 views·1 week ago
1:00:27Creating an Effective Application Privacy PolicyBureau Veritas Cybersecurity3 views·1 week ago
1:05Veilig onderwijs cybersecuritydiensten voor de onderwijssectorBureau Veritas Cybersecurity43 views·1 year ago
16:26Cybersecurity in action Using resilience data during crisesBureau Veritas Cybersecurity147 views·1 year ago
1:30How to bring your cyber crisis management to the next levelBureau Veritas Cybersecurity150 views·1 year ago
1:42How to stay one step ahead of cyber criminals reduce your attack surfaceBureau Veritas Cybersecurity193 views·1 year ago
1:42Stolen or leaked credentials We can help you find them before criminals use them against youBureau Veritas Cybersecurity114 views·1 year ago
1:32How to reach UNECE compliance for automotive manufacturersBureau Veritas Cybersecurity230 views·1 year ago
35:49How to Master Cybersecurity Like Big Banks - Webinar ReplayBureau Veritas Cybersecurity157 views·2 years ago