Learn from the world’s leading memory skills expert! Unlock your mind's memory skills to get more out of networking, improve your professional and personal relationships, and better retain presentations, procedures, and exam/training material. Watch now for an entertaining, educational, and memorable programme with wide appeal.
All our webinars, all in one place
There is massive potential for IoT technology to radically impact and improve our lives as the information age comes to full fruition, so long as we’re prepared. In this final session of the series, we look at the future of IoT, what we can achieve with it, and how we can prepare for the security challenge it poses.
While it’s fair to say that the cybersecurity of operational technology (OT) is not near the maturity of enterprise IT, it’s far beyond that of the IoT world. In this session we examine how we secure OT systems to see what lessons can be learned and applied to IoT devices and networks in the future.
With the prevalence of IoT devices, how do we take on the mammoth challenge of identifying and securing the devices on our networks? Join us to learn how bad actors can use IoT devices to gain access to your network, how to apply ringfencing principles to IoT devices, and how to identify shadow devices with AI techniques.
Maturing technologies mean just about everything can be cheaply connected to the internet, but with a lack of regulation and technology standards, has the security of IoT become a maturity nightmare? We discuss what modern IoT looks like, where it sits on our networks, and what needs to be done to secure it.
How can we use what we have learnt during the pandemic to help build more resilient teams? Join us for a discussion about what organisations’ security awareness strategies look like in the working world going forwards to reduce risk – incorporating the holy trilogy of people, process and technology.
As many of us return to the office, the wellbeing of colleagues at every level must remain a priority if organisations hope to protect their most valuable assets. We attempt to join the dots from handling subcultures to our basic human need for structure and stability in the context of security culture.
Does your security culture strategy factor in colleague wellbeing? If it didn’t before, it certainly should now. Join the experts for a deep dive into insider threat risk as organisations action their plans to re-enter office environments in the next phase of post-pandemic life.