Todor Majti

Todor Majti

Demystifying The MacOS Attack Chain

MacOS Attack Chain

Demystifying The MacOS Attack Chain Learn about the macOS attack chain, clients’ roles in a cloud-based digital world, and tools hackers use to compromise organisations. Demystifying The MacOS Attack Chain As more businesses rely on macOS devices, the question of…

Cyber Threats: Breaking the Attack Chain

Breaking the Attack Chain

Cyber Threats: Breaking the Attack Chain Protect your organisation from cyber attacks by breaking the attack chain. Learn how PAM can help ensure project success. Cyber Threats: Breaking the Attack Chain Cybersecurity is a never-ending battle, and staying one step…

Brett Johnson – From Cybercriminal To Security Expert

Nordic IT conference speaker - Brett Johnson, Former United States Most Wanted

Brett Johnson – From Cybercriminal To Security Expert Discover the story of Brett Johnson, once dubbed the “Original Internet Godfather,” who went from a notorious cybercriminal to a respected security consultant. Brett Johnson – From Cybercriminal To Security Expert Brett…

Do You Have Your Most Privileged Users Under Control?

Do You Have Your Most Privileged Users Under Control? Learn about the importance of Privileged Access Management (PAM) in governing your most sensitive IT accesses and securing your organisation’s data. Do You Have Your Most Privileged Users Under Control? Privileged…

Free Subscription

The most comprehensive Cybersecurity agenda for leading industry executives

Connect and share niched and unique knowledge

Meet our 15-year experience in addressing international cybersecurity challenges

Register for The Conference
25th of May 2023