{"id":6321,"date":"2021-11-17T18:25:46","date_gmt":"2021-11-17T16:25:46","guid":{"rendered":"https:\/\/heliview.com\/er-security-experience\/?p=6321"},"modified":"2021-12-01T11:05:52","modified_gmt":"2021-12-01T09:05:52","slug":"threat-research","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/","title":{"rendered":"Threat Research for CISO&#8217;s: maak kennis met CyberRes Galaxy"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Wereldwijd zitten we in een tijdperk van een hyperdigitale groei en daarmee gepaard gaand een steeds sneller toenemend volume van security dreigingen. Voor veel CISO&#8217;s voelt het als dweilen met de kraan open om maar op de hoogte te blijven van de nieuwste bedreigingen en te bepalen wat de impact daarvan is op hun organisatie. Precies daarom is CyberRes Galaxy ontwikkeld. Het is een immersive \ud835\udc2d\ud835\udc21\ud835\udc2b\ud835\udc1e\ud835\udc1a\ud835\udc2d \ud835\udc2b\ud835\udc1e\ud835\udc2c\ud835\udc1e\ud835\udc1a\ud835\udc2b\ud835\udc1c\ud835\udc21 \ud835\udc29\ud835\udc25\ud835\udc1a\ud835\udc2d\ud835\udc1f\ud835\udc28\ud835\udc2b\ud835\udc26 dat op continue intelligente wijze de relevante en actuele wereldwijde security bedreigen eenvoudig weergeeft aan securitymanagers.<\/p>\n<p>Op 7 december, tijdens een LinkedIn live event maakt u kennis met Galaxy en ziet u hoe u vanuit een overzichtelijk dashboard snel rapportages kunt maken van bedreigingen; dit kunt visualiseren inclusief de impact hiervan kunt vaststellen voor uw branche of regio; \u00e9n wat u aan deze potenti\u00eble risico\u2019s kunt doen.[\/vc_column_text][vc_single_image image=&#8221;6324&#8243; img_size=&#8221;&#8221;][vc_single_image image=&#8221;6327&#8243; img_size=&#8221;&#8221;][vc_single_image image=&#8221;6328&#8243; img_size=&#8221;&#8221;]<div class=\"lgx-brand-btn-area text-left\">\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand3\" href=\"https:\/\/www.linkedin.com\/events\/6863561471775784960\/\" target=\"_self\"><span>Meld u aan voor het LinkedIn event<\/span><\/a>\r\n                    <a class=\"lgx-btn btn-df  lgx-btn-brand\" href=\"\/cyber-security-experience\/tickets\" target=\"_blank\"><span>Meld u aan voor Cyber Securty Experience<\/span><\/a>\r\n               \r\n                <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts title=&#8221;Ander nieuws&#8221; number=&#8221;3&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Wereldwijd zitten we in een tijdperk van een hyperdigitale groei en daarmee gepaard gaand een steeds sneller toenemend volume van security dreigingen. Voor veel CISO's voelt het als dweilen met de kraan open om maar op de hoogte te blijven van de nieuwste bedreigingen en te bepalen wat de impact daarvan is op hun organisatie. [...]","protected":false},"author":7,"featured_media":6322,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-6321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Threat Research for CISO&#039;s: maak kennis met CyberRes Galaxy - Cyber Security Experience<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Threat Research for CISO&#039;s: maak kennis met CyberRes Galaxy - Cyber Security Experience\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Security Experience\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-11-17T16:25:46+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-12-01T09:05:52+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"siham\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"siham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuut\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/\",\"name\":\"Threat Research for CISO's: maak kennis met CyberRes Galaxy - Cyber Security Experience\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg\",\"datePublished\":\"2021-11-17T16:25:46+00:00\",\"dateModified\":\"2021-12-01T09:05:52+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-security-experience\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Research for CISO&#8217;s: maak kennis met CyberRes Galaxy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-security-experience\/\",\"name\":\"Cyber Security Experience\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\",\"name\":\"siham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"caption\":\"siham\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Research for CISO's: maak kennis met CyberRes Galaxy - Cyber Security Experience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/","og_locale":"nl_NL","og_type":"article","og_title":"Threat Research for CISO's: maak kennis met CyberRes Galaxy - Cyber Security Experience","og_url":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/","og_site_name":"Cyber Security Experience","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2021-11-17T16:25:46+00:00","article_modified_time":"2021-12-01T09:05:52+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg","type":"image\/jpeg"}],"author":"siham","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Geschreven door":"siham","Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/","url":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/","name":"Threat Research for CISO's: maak kennis met CyberRes Galaxy - Cyber Security Experience","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg","datePublished":"2021-11-17T16:25:46+00:00","dateModified":"2021-12-01T09:05:52+00:00","author":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0"},"breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-security-experience\/threat-research\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#primaryimage","url":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg","contentUrl":"https:\/\/heliview.com\/cyber-security-experience\/wp-content\/uploads\/sites\/42\/2021\/11\/Blog-Micro-Focus.jpg","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-security-experience\/threat-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-security-experience\/"},{"@type":"ListItem","position":2,"name":"Threat Research for CISO&#8217;s: maak kennis met CyberRes Galaxy"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-security-experience\/#website","url":"https:\/\/heliview.com\/cyber-security-experience\/","name":"Cyber Security Experience","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-security-experience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Person","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0","name":"siham","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/heliview.com\/cyber-security-experience\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","caption":"siham"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/6321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/comments?post=6321"}],"version-history":[{"count":5,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/6321\/revisions"}],"predecessor-version":[{"id":6330,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/posts\/6321\/revisions\/6330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media\/6322"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/media?parent=6321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/categories?post=6321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-security-experience\/wp-json\/wp\/v2\/tags?post=6321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}