{"id":6738,"date":"2024-10-03T09:25:47","date_gmt":"2024-10-03T07:25:47","guid":{"rendered":"https:\/\/warpnet.nl\/?page_id=6738"},"modified":"2024-10-25T09:24:33","modified_gmt":"2024-10-25T07:24:33","slug":"security-pizza","status":"publish","type":"page","link":"https:\/\/warpnet.nl\/en\/security-pizza\/","title":{"rendered":"Security &amp; Pizza"},"content":{"rendered":"<p class=\"has-medium-font-size\">Op donderdag 28 november staat er een pizzasessie op de planning! Deze avond staat compleet in het teken van <strong>security<\/strong>!<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:55%\">\n<p>Tijdens deze avond zullen verschillende experts en nieuwkomers talks houden over&#xA0;cybersecurity. Allemaal onder het genot van heerlijke pizza! Bekijk de video hiernaast voor een impressie van de afgelopen pizzasessie!<\/p>\n\n\n\n<p>Aanmelden kan via onderstaande formulier. Wil jij jouw kennis en idee&#xEB;n ook delen? Dat kan! Er is ruimte voor een lightning talk van 5 &#xE0; 10 minuten of een volwaardige presentatie van 30 &#xE0; 45 minuten.<\/p>\n\n\n\n<div style=\"height:17px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<figure class=\"wp-block-video\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" controls src=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/Pizzasessie-security-en-compliance-4.mp4\"><\/video><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Planning<\/h2>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/Johain.jpeg\" alt=\"\" class=\"wp-image-6763\" style=\"width:139px;height:auto\" srcset=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/Johain.jpeg 800w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/Johain-300x300.jpeg 300w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/Johain-150x150.jpeg 150w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/Johain-768x768.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:85%\">\n<h4 class=\"wp-block-heading\">Redteaming, Hacking and Pentesting<\/h4>\n\n\n\n<p>Spreker:<strong>&#xA0;<\/strong><a href=\"https:\/\/www.linkedin.com\/in\/johanaikema\/\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/johanaikema\/\" target=\"_blank\" rel=\"noopener\">Johan Aikema<\/a>, Security &amp; Policy Advisor at KPN CISO<br><br><em>You all know how to do it, but do you ever wonder why you do it? In this presentation we will try to discuss the merits of pentesting and its value to an organization.<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\">\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"802\" src=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/06\/171802894580125475.png\" alt=\"\" class=\"wp-image-6138\" style=\"width:139px;height:auto\" srcset=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/06\/171802894580125475.png 839w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/06\/171802894580125475-300x287.png 300w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/06\/171802894580125475-768x734.png 768w\" sizes=\"(max-width: 839px) 100vw, 839px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:85%\">\n<h4 class=\"wp-block-heading\">Intro to Azure Pentesting<\/h4>\n\n\n\n<p>Spreker:<strong>&#xA0;<\/strong><a href=\"https:\/\/www.linkedin.com\/in\/nikhil21john\/\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/nikhil21john\/\" target=\"_blank\" rel=\"noopener\">Nikhil John Thomas<\/a>, Penetration Tester at Warpnet<br><br><em>Migrating to the cloud doesn&#x2019;t always guarantee safety. In this presentation, we will explore how pentesters can target an organization&#x2019;s Azure environment and examine the most commonly used Azure services that can be abused.<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\">\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:15%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/foto-jorian.jpeg\" alt=\"\" class=\"wp-image-6809\" style=\"width:139px;height:auto\" srcset=\"https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/foto-jorian.jpeg 800w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/foto-jorian-300x300.jpeg 300w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/foto-jorian-150x150.jpeg 150w, https:\/\/warpnet.nl\/wp-content\/uploads\/2024\/10\/foto-jorian-768x768.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:85%\">\n<h4 class=\"wp-block-heading\">Learning Hacking by Capturing Flags (CTF)<\/h4>\n\n\n\n<p>Spreker:<strong>&#xA0;<\/strong><a href=\"https:\/\/www.linkedin.com\/in\/jorian-woltjer\/\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/jorian-woltjer\/\" target=\"_blank\" rel=\"noopener\">Jorian Woltjer<\/a>,&nbsp;Security Researcher, Pentester &amp; CTF-player at Warpnet<br><br><em>I think the best way to learn the deep technical details of hacking is by playing Capture The Flag events. Learn not only the tricks themselves, but also how to find unique exploits and techniques in the real world.<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:28px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Waar en wanneer?<\/h2>\n\n\n\n<div style=\"height:5px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Locatie:<\/strong> Rijksstraatweg 217, 9752 CA Haren<br><strong>Datum &amp; tijdstip<\/strong>: donderdag 28 november, 17.00 uur<br><strong>Kosten<\/strong>: Gratis<br><strong>Parkeren<\/strong>: Parkeren is mogelijk achter de slagboom<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Aanmelden<\/h2>\n\n\n\n<div class=\"wp-block-contact-form-7-contact-form-selector\">[contact-form-7 id=&rdquo;3a91018&Prime; title=&rdquo;Security &amp; Pizza&rdquo;]<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Op donderdag 28 november staat er een pizzasessie op de planning! Deze avond staat compleet in het teken van security!&#x2026;<\/p>","protected":false},"author":17,"featured_media":6757,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-6738","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/pages\/6738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/comments?post=6738"}],"version-history":[{"count":37,"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/pages\/6738\/revisions"}],"predecessor-version":[{"id":6964,"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/pages\/6738\/revisions\/6964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/media\/6757"}],"wp:attachment":[{"href":"https:\/\/warpnet.nl\/en\/wp-json\/wp\/v2\/media?parent=6738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}