Have questions about Identity Threat Detection and Response (ITDR) but are too afraid to ask? Watch now as David unpacked the fundamentals of ITDR, including the role of identity stores, their location, function, and why cybercriminals target them.
All our webinars, all in one place
By applying attackers’ methods to our defensive operations, we can take back the first-more advantage when it comes to incidents. We discuss the ever-changing threat landscape, how to keep up to date with emerging vulnerabilities, and how we can turn this into actionable threat intelligence.
Business books are full of promise and social media is awash with advice. But in reality, it’s hard to make changes and keep the plates spinning. So, how do we ‘get more done’, in our congested, fluid, and fast-moving world? Watch this interactive discussion to uncover practical tips.
The UK Government has cybersecurity guidance for organisations responsible for Critical National Infrastructure and vitally important services, but how can this guidance be applied to all organisations? Watch now to discover how organisations of all sizes can be inspired to improve their security posture and resilience based on the guiding principles of the NCSC’s Cyber Assessment Framework (CAF).
Effective crisis communication is a challenge. There are multiple organisations to contact, various channels to use, and mandatory deadlines to factor in. We discuss how to balance compliance, security, and operations; as well as strategies and tools for efficient plans that minimise disruption.
In light of the recent game-changing SolarWinds charges, we held an emergency briefing to discuss the implications for the wider infosec community. Not only do we need to rethink CISOs’ personal liability, but we must reform cybersecurity governance and risk management at an operational level.
Cybercriminals have shown remarkable adaptability and determination to circumvent security policies, so staying ahead of the curve is essential. This engaging and informative webinar delved into the evolving landscape of ransomware, threat sophistication, and the impact of hardware-assisted security solutions.
Watch now for a fascinating insight into the world of hacking and breaches from a red teamer who has never been caught. Discover real-world exercises, key skills for successful breaches, lessons CISOs and CSOs should learn, high assurance tips, and some of the biggest mistakes made by organisations.