Menu
Solutions
Back
Solutions
Data Center and Cloud
Read more
Business Continuity
Read more
Data Center Automation and Management
Read more
Private Cloud Design and Data Center Transformation
Read more
Public and Hybrid Cloud
Read more
Networking
Read more
Building and Deploying NetDevOps Environments and Processes
Read more
Core/Edge Network Optimization
Read more
Data Center, Cloud Networking and SDN
Read more
IPv4 / IPv6 and Ethernet Architecture
Read more
Network Function Virtualization
Read more
Network Migration for Service Providers
Read more
Network Service Orchestration
Read more
Optical Transport
Read more
SD-WAN Design and Deployment Services
Read more
Secure SD-WAN as a Service
Read more
IT Security
Read more
Advanced Malware Protection (AMP)
Read more
Cloud Security
Read more
Incident Response
Read more
Industrial Cyber Defense and Protection
Read more
Network Infrastructure and Security Audit
Read more
Risk and Security Assessment
Read more
Managed Security Operations Center (SOC) Services
Read more
Secure and Compliant Collaboration
Read more
Secure Mobility
Read more
Security Operations Center (SOC) Building Services
Read more
Zero Trust Architecture
Read more
Workspace
Read more
Contact Center in the Cloud
Read more
Desktop and Application Virtualization
Read more
Enterprise Collaboration
Read more
Enterprise Mobility
Read more
Hybrid Cloud Collaboration Migration and Deployment
Read more
Interconnecting Collaboration Tools and Platforms
Read more
IT-as-a-Service
Read more
Services
Back
Services
NIS-2 Overview and Recommendations
Read more
Cybersecurity Maturity Assessment
Read more
Consulting
Read more
Content Development
Read more
Education
Read more
Implementation
Read more
Project Scoping
Read more
Support and Operations
Read more
System Design
Read more
Knowledge
Back
Knowledge
Blogs
Read more
Success Stories
Read more
Videos
Read more
Whitepapers
Read more
Latest Video
Cisco Cyber Vision in Action: How to Secure Your OT Network
Learn how you can use Cisco Cyber Vision to improve the security of your OT…
Read more
Events
Careers
About
Back
About
About NIL
Read more
Company
Read more
Leadership
Read more
Sustainability and social responsibility
Read more
Press
Read more
Latest News
Cisco Training Schedule 2025 (PDF) available
Download the brochure and find out more about which Cisco courses you can take in…
Read more
NIL Learning
NIL Learning
Search for:
Select your local Conscia office:
Go to
Global
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Go to
Global/English
Belgium/Dutch
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Sweden/Swedish
UK/English
Search for:
Search
NIL Learning
NIL Learning
Contact
Blogs
Home
»
Managed Detection & Response
Show all
Success Stories
Events
Blogs
Videos
News
Press releases
Whitepapers
David Kasabji
Principal Threat Intelligence Engineer
Blog
Offensive Security and Cyber Threat Intelligence: The Dynamic Duo Against Adversaries
19. Dec 2024
In an age where cyber threats evolve faster than ever, traditional approaches to security often fall short. Firewalls, automated vulnerability scans, and endpoint defenses are essential, but they lack the...
Read more
Jan Bervar
Security Architect
Video
4 Things MDR/SOC Providers Don’t Like Talking About
Whether you’re re-evaluating your current MDR/SOC provider or searching for a new one, this webinar recording will offer...
Read more
Jan Bervar
Security Architect
Event
4 Things MDR/SOC Providers Don’t Like Talking About
24. Oct 2024
Whether you’re re-evaluating your current MDR/SOC provider or searching for a new one, this webinar will offer the...
Read more
Blog
DFVU Data Breach: A Comprehensive Analysis and Preventive Strategies
29. Jan 2024
In a significant cybersecurity incident, Slovenian retailer DFVU, which operates brands such as S-mania, Layoners, Mazzaci, and RedLynx,...
Read more
Benjamin Kic
Systems Engineer
Video
Secure Remote Work with Cisco Umbrella
Learn how Cisco Umbrella reduces cyber risks for your distributed workforce and helps you easily establish a consistent...
Read more
Video
Ensure a flawless digital experience and business impact with Cisco FSO
In the Ensure a flawless digital experience and business impact with Cisco FSO webinar, we highlighted key use...
Read more
Event
Ensure a flawless digital experience and business impact with Cisco FSO
6. Dec 2022
In this live webinar, we will highlight some of the key use cases for Cisco Full-Stack Observability and...
Read more
Ewan Hubac
Cybersecurity Product Manager, Conscia Group
Video
Cyber Threat Intelligence: A Better Way to Do Vulnerability Management
Why is vulnerability management hard and how can you improve it? Watch the recording and learn about better...
Read more
Ewan Hubac
Cybersecurity Product Manager, Conscia Group
Event
Cyber Threat Intelligence: A Better Way to Do Vulnerability Management
13. Oct 2022
Why is vulnerability management hard and how can you improve it? Join the webinar and learn about better...
Read more
Case
Conscia’s expertise enhances BDO’s security work
With Conscia Cyber Defense, the auditing firm BDO has gained access to the right security expertise - and...
Read more
Page
Consulting
Helping You Ask the Right Questions and Find the Answers Are you making your competitors nervous? Do you...
Read more
Page
Services
Consulting We help you ask the right questions and find the answers to tackle technology-related decisions. We understand...
Read more
Page
Building Security Baselines and Infrastructure Hardening
Secure by default Modern IT systems are built as a complex web of software and hardware interdependencies, where...
Read more
Page
Industrial Cyber Defense and Protection
Minimizing cyber-security risks in industry 4.0 and IoT environments The security of industrial control systems (ICS) like SCADA...
Read more
Page
Advanced Malware Protection (AMP)
Do you still think you are not a target? While the most serious malware attacks are targeted against...
Read more
Page
Solutions
Secure Industry Solutions for complex IT Infrastructures Deployed correctly, IT becomes a strategic tool leading to that decisive...
Read more