Resources

Webinars

Dig deep into our webinars, designed to help you get to know vulnerability management. Register for an upcoming session or watch our on-demand webinars.

WEBINAR

Why developing a vulnerability management process is crucial for data security

Learn the most important elements to consider when it comes to adopting a vulnerability management process and why it is a crucial element in protecting your data against cyber-attacks.

WEBINAR

Nutidens stora cybersäkerhetsutmaningar för svensk offentlig sektor

Ta del av detta webbinarium för att lära dig mer om nutidens största cybersäkerhetsutmaningar för svensk offentlig sektor.

WEBINAR

Vulnerability management & risk mitigation

Together with our UK partner Protecture, we talk about the importance of vulnerability management. Learn how working proactively with automated and continuous vulnerability management can lessen the effects of cyber threats. Learn how smart investments can help you to stay in control and increase your awareness and learn more about the ever-growing cyber threats.

WEBINAR

How to detect & remediate the Log4j (Log4Shell) vulnerability

The Log4j zero-day vulnerability (CVE-2021-44228) is a Remote Code Execution (RCE) vulnerability impacting software using Log4j version 2. Log4j is a common open-source logging library for Java-based applications which can be implemented by anyone who chooses to do it. It is considered a critical flaw, with a base CVSS score of 10, the highest possible severity rating.

WEBINAR

Spring4Shell: Zero-Day Vulnerability in Spring Framework

WEBINAR

Accelerate your business with vulnerability management

Want to know how a partnership with Holm Security can help accelerate your business and at the same time improve your customers' cyber security defense? Watch this webinar to learn more.

WEBINAR

Introducing agent-based vulnerability management

Watch our recorded webinar, to understand how your organization can benefit from extending your vulnerability management program with a lightweight endpoint agent for systems, computers, and your remote workforce.

WEBINAR

5 Steps to Successful Vulnerability Management

Vulnerability Management is the cornerstone in modern cyber security defense. In this webinar, we'll talk about 5 important steps that will help you build a successful Vulnerability Management strategy. This webinar discussed how to adopt a risk-based approach when working with automated and continuous Vulnerability Management.

WEBINAR

The new era of transferring data - with Max Schrems

Transferring personal data to the US under the EU-US Privacy Shield was disqualified based on the Schrems II ruling. But what about other sensitive data? Join and listen to Max Schrems live in this webinar together with our CEO Stefan Thelberg and Peter Ekmark, CEO at Internet Vikings.

WEBINAR

DevSecOps & security automation

Webinar with cyber security and automation expert Henrik Holmboe. Learn how DevSecOps fits with the security landscape and how to take advantage of the use of automation with the Holm Security Platform API. Erik Torlén, CTO at Holm Security, will share how you can use the Platform API to automate vulnerability assessment scanning.

WEBINAR

In the mind of a hacker

A very interesting webinar about how hackers attack your IT environment. The webinar is 40 minutes and provides useful information for anyone who works with IT regardless of the level of knowledge within IT security.

WEBINAR

The anatomy of social engineering & ransomware

A live demonstration of a simulated ransomware attack by IT security expert Jonas Lejon. Learn how Holm Security can help you increase resilience against social engineering and ransomware by doing simulated email attacks and tailored and automated education