BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Nomasis EN - ECPv6.16.0//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://nomasis.ch/en
X-WR-CALDESC:Events for Nomasis EN
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Berlin
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20250330T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20251026T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20260329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20261025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20270328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20271031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20260416T101500
DTEND;TZID=Europe/Berlin:20260416T104500
DTSTAMP:20260513T090405
CREATED:20260206T121854Z
LAST-MODIFIED:20260206T121854Z
UID:4050-1776334500-1776336300@nomasis.ch
SUMMARY:Nomasis webinar: They don't hack in. They log in
DESCRIPTION:Identity based attacks and vishing are among the most serious threats in mondern IT Security.  Instead of exploiting technical vulnerabilities\, attackers now focus on stolen identities and social engineering. As a result\, they gain legitimate access to systems without triggering traditional defenses. \nIn this webinar\, hosted in collaboration with Lookout\, you will learn how identity-based attacks and vishing work in practice. Moreover\, you will understand why attackers no longer hack in but log in—and how organisations can effectively protect the human and identity layer. \nIdentity abuse in IT security: What can you expect from the webinar?\n\nIn this webinar\, we examine current attack scenarios across the human and identity-based attack surface. You will gain a thorough understanding of how modern login attacks are prepared\, executed and successfully exploited. In addition\, we show how these attacks impact security\, infrastructure and operations teams. \nYou will learn: \n\nVishing as a gateway for identity attacks: You will gain in-depth insight into current vishing methods and learn how attackers use AI\, deepfakes and targeted conversation techniques to persuade employees to disclose access data\, MFA codes or internal information.\nThe human layer in modern IT environments: We analyse why humans currently represent the largest attack surface and how hybrid working models\, cloud identities and mobile devices further increase the complexity for security and operations teams.\nPractical case studies from real environments: Using specific incident scenarios\, Lookout shows how login-based attacks work\, which security controls are bypassed and why a single successful call is often enough to gain access to critical systems.\nStrategies for strengthening the human security line: You will learn how technical controls\, awareness measures and modern mobile security approaches can be combined effectively to detect identity misuse at an early stage and reduce risk in the long term.\n\nYour benefits:\n\nProtection at the human and identity level\nComprehensive mobile threat defence\nTransparency about real risks\nSeamless integration into existing IT architectures\nReduction of operational effort\n\nProtect your business – quickly\, effectively and future-proof. \nWhy you should participate\nWhen attackers work with valid access data\, traditional perimeter and network protection mechanisms fall short. This webinar shows you how current threats are developing at the identity and human level and which measures are crucial today. \nRegistration\n\n\n                \n                        \n                             \n							"*" indicates required fields \n                        \n                        Name*\n                            \n                            \n                                                    \n                                                    Firstname\n                                                \n                            \n                            \n                                                    \n                                                    Lastname\n                                                \n                            \n                        Company*Job title*Email*\n                            \n                        CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nStay informed via our news portal or follow us on LinkedIn for updates.
URL:https://nomasis.ch/en/events/identity-based-attacks-and-vishing-webinar/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://nomasis.ch/en/wp-content/uploads/sites/3/2026/02/Mobile-Security.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Berlin:20260416T150000
DTEND;TZID=Europe/Berlin:20260416T153000
DTSTAMP:20260513T090405
CREATED:20260223T105318Z
LAST-MODIFIED:20260223T105318Z
UID:4068-1776351600-1776353400@nomasis.ch
SUMMARY:Nomasis webinar: Cyber threat situation in Switzerland in 2026 – understanding risks\, strengthening resilience
DESCRIPTION:How well protected is your company really?\nSwitzerland is increasingly becoming a target for international cybercriminals. Organisations across a wide range of industries are facing more and more targeted attacks – from sophisticated phishing campaigns and ransomware to complex social engineering and advanced persistent threat (APT) attacks.\n \nBut what exactly is the current threat landscape?\nAnd above all: how resilient is your company really today? \nIn this exclusive webinar\, the cybersecurity experts at Arctic Wolf will show you how the threat situation in Switzerland is developing and what concrete measures companies should take now to strengthen their cyber resilience in the long term. \nWhat can you expect from the webinar?\n\nCurrent cyber threat situation in Switzerland: trends\, attack scenarios and real incidents\nWhy organisations with complex IT and cloud environments are particularly targeted\nTypical attack patterns on hybrid\, distributed enterprise infrastructures\nLimitations of traditional SOC and SIEM approaches in dynamic IT landscapes\nThe role of Managed Detection & Response (MDR) as a strategic component of modern security architectures\nSpecific recommendations for action to reduce risks\, detect attacks early and respond effectively\n\nWhy Arctic Wolf?\nArctic Wolf is one of the world’s leading providers of Managed Detection & Response (MDR) and helps organisations detect cyber threats early\, respond to them in a targeted manner and reduce security risks in the long term.\n \nRegister now\nTake this opportunity to gain realistic insight into the current threat landscape and learn specific approaches for taking your company’s security strategy to the next level. \n\n                \n                        \n                             \n							"*" indicates required fields \n                        \n                        Name*\n                            \n                            \n                                                    \n                                                    Firstname\n                                                \n                            \n                            \n                                                    \n                                                    Lastname\n                                                \n                            \n                        Company*Job title*Email*\n                            \n                        CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nBleibt informiert über unser News-Portal oder folgt uns auf LinkedIn für Updates.
URL:https://nomasis.ch/en/events/nomasis-webinar-cyber-threat-situation-in-switzerland-in-2026-understanding-risks-strengthening-resilience/
CATEGORIES:Webinar
ATTACH;FMTTYPE=image/png:https://nomasis.ch/en/wp-content/uploads/sites/3/2026/02/Bedrohungslage-Schweiz-Symbolbild.png
END:VEVENT
END:VCALENDAR