<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Webinaires Dattak</title>
    <link>https://www.dattak.io/en/webinaires</link>
    <description>Replays et prochaines sessions consacrés à la gestion des risques technologiques, aux cyberattaques et aux bonnes pratiques de prévention.</description>
    <language>en</language>
    <pubDate>Thu, 23 Apr 2026 13:36:40 GMT</pubDate>
    <dc:date>2026-04-23T13:36:40Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Waiting period or waiting period? A decisive choice</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-delai-carence-vs-attente</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-delai-carence-vs-attente?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-24-9424-PM.jpg" alt="Waiting period or waiting period? A decisive choice" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Maxime Vioulac, Cyber and Professional Liability Underwriting Manager, explains how these two types of time deductibles have a direct impact on compensation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-delai-carence-vs-attente?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-24-9424-PM.jpg" alt="Waiting period or waiting period? A decisive choice" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Maxime Vioulac, Cyber and Professional Liability Underwriting Manager, explains how these two types of time deductibles have a direct impact on compensation.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-delai-carence-vs-attente&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:36:40 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-delai-carence-vs-attente</guid>
      <dc:date>2026-04-23T13:36:40Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Essential steps to take in the event of a cyber incident</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-gestes-essentiels-incident-cyber</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-gestes-essentiels-incident-cyber?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-22-8038-PM.jpg" alt="Essential steps to take in the event of a cyber incident" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Charles D., our Cybersecurity Director &amp;amp; Head of CERT, shares the key actions to take immediately in the event of a cyber incident.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-gestes-essentiels-incident-cyber?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-22-8038-PM.jpg" alt="Essential steps to take in the event of a cyber incident" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Charles D., our Cybersecurity Director &amp;amp; Head of CERT, shares the key actions to take immediately in the event of a cyber incident.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-gestes-essentiels-incident-cyber&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:36:14 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-gestes-essentiels-incident-cyber</guid>
      <dc:date>2026-04-23T13:36:14Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Dattak Decodes - Episode 10 - PenTests</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-episode-10-pentests</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-10-pentests?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-19-5925-PM.jpg" alt="Dattak Decodes - Episode 10 - PenTests" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A system may seem secure, until a vulnerability appears. PenTests simulate an attack in a secure environment to identify vulnerabilities before an attack occurs.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-10-pentests?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-19-5925-PM.jpg" alt="Dattak Decodes - Episode 10 - PenTests" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A system may seem secure, until a vulnerability appears. PenTests simulate an attack in a secure environment to identify vulnerabilities before an attack occurs.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-episode-10-pentests&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:35:48 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-episode-10-pentests</guid>
      <dc:date>2026-04-23T13:35:48Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Webinar Scan Report</title>
      <link>https://www.dattak.io/en/webinaires/webinaire-rapport-de-scan</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/webinaire-rapport-de-scan?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault.jpg" alt="Webinar Scan Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity Engineer Kévin Gouasbault presents the scan report and its crucial importance in protecting companies against cyberattacks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/webinaire-rapport-de-scan?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault.jpg" alt="Webinar Scan Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity Engineer Kévin Gouasbault presents the scan report and its crucial importance in protecting companies against cyberattacks.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fwebinaire-rapport-de-scan&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinaire</category>
      <pubDate>Thu, 23 Apr 2026 13:35:21 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/webinaire-rapport-de-scan</guid>
      <dc:date>2026-04-23T13:35:21Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Dattak Decode - Episode 9 - Passwords</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-episode-9-mots-de-passe</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-9-mots-de-passe?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-27-0575-PM.jpg" alt="Dattak Decode - Episode 9 - Passwords" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A good password is your first line of defense. In 2025, the majority of cyber attacks will exploit weak, reused or compromised passwords. But a strong, unique and well-managed password makes all the difference.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-9-mots-de-passe?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-27-0575-PM.jpg" alt="Dattak Decode - Episode 9 - Passwords" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A good password is your first line of defense. In 2025, the majority of cyber attacks will exploit weak, reused or compromised passwords. But a strong, unique and well-managed password makes all the difference.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-episode-9-mots-de-passe&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:34:56 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-episode-9-mots-de-passe</guid>
      <dc:date>2026-04-23T13:34:56Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Dattak Decodes - Episode 8 - Typosquatting</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-episode-8-typosquatting</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-8-typosquatting?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-2.jpg" alt="Dattak Decodes - Episode 8 - Typosquatting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A single typo can be enough to trigger a cyberattack. This is what typosquatting is all about, a method that is as discreet as it is effective. An Internet user types "gooogle.com" instead of "google.com"... and ends up on a malicious site.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-8-typosquatting?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-2.jpg" alt="Dattak Decodes - Episode 8 - Typosquatting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A single typo can be enough to trigger a cyberattack. This is what typosquatting is all about, a method that is as discreet as it is effective. An Internet user types "gooogle.com" instead of "google.com"... and ends up on a malicious site.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-episode-8-typosquatting&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:34:31 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-episode-8-typosquatting</guid>
      <dc:date>2026-04-23T13:34:31Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Dattak Decodes - Episode 5 - The NIS 2 directive</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-episode-5-directive-nis-2</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-5-directive-nis-2?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-21-7001-PM.jpg" alt="Dattak Decodes - Episode 5 - The NIS 2 directive" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The European NIS 2 directive has turned the rules of the game in cybersecurity on their head. It imposes new obligations on thousands of companies, far beyond just large infrastructures.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-episode-5-directive-nis-2?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-21-7001-PM.jpg" alt="Dattak Decodes - Episode 5 - The NIS 2 directive" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The European NIS 2 directive has turned the rules of the game in cybersecurity on their head. It imposes new obligations on thousands of companies, far beyond just large infrastructures.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-episode-5-directive-nis-2&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:34:00 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-episode-5-directive-nis-2</guid>
      <dc:date>2026-04-23T13:34:00Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Webinar NIS 2: Dattak &amp;amp; Qiub, a co-constructed offer</title>
      <link>https://www.dattak.io/en/webinaires/webinaire-nis-2-dattak-qiub</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/webinaire-nis-2-dattak-qiub?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-28-1430-PM.jpg" alt="Webinar NIS 2: Dattak &amp;amp;amp; Qiub, a co-constructed offer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Dattak and Qiub have co-constructed a unique packaged offer, combining diagnostics, operational support and insurance coverage to anticipate NIS 2!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/webinaire-nis-2-dattak-qiub?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-Mar-26-2026-09-10-28-1430-PM.jpg" alt="Webinar NIS 2: Dattak &amp;amp;amp; Qiub, a co-constructed offer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Dattak and Qiub have co-constructed a unique packaged offer, combining diagnostics, operational support and insurance coverage to anticipate NIS 2!&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fwebinaire-nis-2-dattak-qiub&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinaire</category>
      <pubDate>Thu, 23 Apr 2026 13:33:28 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/webinaire-nis-2-dattak-qiub</guid>
      <dc:date>2026-04-23T13:33:28Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Deciphering the cyber challenges facing large and mid-sized companies</title>
      <link>https://www.dattak.io/en/webinaires/webinaire-enjeux-cyber-eti-grandes-entreprises</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/webinaire-enjeux-cyber-eti-grandes-entreprises?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-1.jpg" alt="Deciphering the cyber challenges facing large and mid-sized companies" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Dattak and Sompo experts decipher the cyber challenges facing small and medium-sized businesses and large corporations!&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/webinaire-enjeux-cyber-eti-grandes-entreprises?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-1.jpg" alt="Deciphering the cyber challenges facing large and mid-sized companies" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Dattak and Sompo experts decipher the cyber challenges facing small and medium-sized businesses and large corporations!&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fwebinaire-enjeux-cyber-eti-grandes-entreprises&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Webinaire</category>
      <pubDate>Thu, 23 Apr 2026 13:32:59 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/webinaire-enjeux-cyber-eti-grandes-entreprises</guid>
      <dc:date>2026-04-23T13:32:59Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Cyber risk continues to transform in 2025</title>
      <link>https://www.dattak.io/en/webinaires/dattak-decode-risque-cyber-2025-chiffres-cles</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-risque-cyber-2025-chiffres-cles?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-4.jpg" alt="Cyber risk continues to transform in 2025" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Chadi H., Actuary &amp;amp; Data Scientist at Dattak, looks back at the key figures observed in the field throughout 2025.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.dattak.io/en/webinaires/dattak-decode-risque-cyber-2025-chiffres-cles?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.dattak.io/hubfs/Imported_Blog_Media/maxresdefault-4.jpg" alt="Cyber risk continues to transform in 2025" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Chadi H., Actuary &amp;amp; Data Scientist at Dattak, looks back at the key figures observed in the field throughout 2025.&lt;/p&gt;  
&lt;img src="https://track-eu1.hubspot.com/__ptq.gif?a=144081717&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.dattak.io%2Fen%2Fwebinaires%2Fdattak-decode-risque-cyber-2025-chiffres-cles&amp;amp;bu=https%253A%252F%252Fwww.dattak.io%252Fen%252Fwebinaires&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Dattak Décode</category>
      <pubDate>Thu, 23 Apr 2026 13:32:10 GMT</pubDate>
      <guid>https://www.dattak.io/en/webinaires/dattak-decode-risque-cyber-2025-chiffres-cles</guid>
      <dc:date>2026-04-23T13:32:10Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
  </channel>
</rss>
