This session explores the methods criminals use to socially engineer their way into our accounts and gain access to our sensitive and valuable information. We share just how easily criminals can take hold of data through social media and espionage, and prove it.
All our webinars, all in one place
More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
With 80% of all attacks utilising phishing and/or stolen credentials, MFA has been a favoured defence. But Lapsus$ and other ransomwares have been successful despite MFA deployment… Watch now for a deep dive into ransomware, MFA, phishing, and protecting your users, and to discover how malicious actors are still successful despite technical ‘safeguards’.
Discover threats and real case studies from a former Head of UK Cyber Warfare Capability Development and Senior Military Advisor to UK Cabinet on Cyber Operations.
Discover how academics, the public, and private sectors are all working in the pioneering new law enforcement effort to combat cybercrime. Every organisation in this country is potentially a target for cybercriminals, but the CRCs are here to show cybersecurity doesn’t need to be expensive or complicated.
Watch this exclusive webinar on this year’s report findings and hear directly from the 2022 responsible analyst. Maddy and Emma explained the different attacks organisations are facing, how they are impacted and how they respond, as well as how the government is using the findings to inform policy.
We examined the findings from the new ‘Cybersecurity solutions for a riskier world’ global benchmarking study, including the top causes of significant breaches. Why do risk-based leaders rate their programmes as more mature? Watch now to find out, and learn how this approach could help you, too.
Our widespread adoption of cloud-services and need to share knowledge rapidly provides endless opportunities for information to end up in the wrong hands. Watch as we assess the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.