• Redshift
      Redshift
      Discover Redshift

      View details
      Why us?

      View details
      Redshift Universe

      View details
  • Opportunities
  • Contacts
  • Our offer
      Our offer
      Business areas
      • Cybersecurity Solutions
      • Consulting Services
      • Security Operations
      • Information Management
      • Low Code
      Redshift Partnerships

      The best partnerships for the best results

      View details
      Redshift Technologies

      With your business in mind

      View details
  • EN
      • EN
      • PT
    • Sugestions
      Platform Partnerships
  • Back to news
    Events
    May 2025
    Redshift Cyber Summit presents Active Cybersecurity Doctrine

    On May 20, 2025, Redshift brought together experts, leaders and professionals from the sector for an exclusive event dedicated to transforming the digital security posture in organizations – Redshift Cyber Summit.

    Powered by Redshift Strategic Partners
    Tenable | IBM | Recorded Future | CrowdStrike | Checkmarx

    Event Recap

    Review presentations:

    João Manso, Redshift | Abertura

    José Alegria, Redshift | Doutrina Ativa de Cibersegurança no combate ao Ransomware

    Jose Fernandez de Alarcon, Tenable | Tenable no centro de uma Prevenção Ativa

    Rui Ribeiro, IBM | Proteger as Jóias da Coroa: IBM Guardium

    Sebastian Aguilar, Checkmarx | CxOne and how to fight against Malware from AppSec perspective

    Eduardo Penedos, CrowdStrike | Cross-Domain Detection and Response Endpoint, Identity and Clouds

    Daniel Gillblad, Recorded Future | Actionable Malware Intelligence

    Diogo Carou, Redshift | Red.SOC – Security Monitoring and Incident Response

    João Manso, Redshift | Closing Remarks

    Need more information?

    Whatever your question, our team is available to help.

    Contact us
    Want to work with us?

    Check the available opportunities and join us.

    Opportunities
    More Redshift

    News

    Success Cases

    Insights

    redshift-logo-white
    Building the future every day
    Technology that makes a difference
    Follow us
    Quality Security Policy
    Privacy and Cookie Policy
    Occupational Health and Safety Policy
    Integrated Management System Policy
    Information Security Policy
    Powered by Monday
    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}