Watch now to discover practical ways you can protect your reputation and business for free. Explore simple processes and assess your cyber circle to improve your cybersecurity right away – all advice can be actioned straight away as it requires no technical knowledge or funding.
All our webinars, all in one place
Increasingly complex network infrastructures, bad actors, and threat landscapes mean we need greater vigilance to ensure our cyber defences are monitored and effective. Learn how to run ‘what if’ analysis on network models, check your security posture and gain executive visibility into compliance.
Did you know an employee’s Gmail could endanger your company Salesforce data? We demonstrate how attackers exploit personal email accounts to gain access to corporate clouds and steal highly confidential customer data. Learn how the attack is performed and how to prevent cross-cloud attacks.
Do you know who is responsible for protecting information when someone joins, moves within, or leaves your organisation? Watch to learn about how to leverage encryption to manage access and address the concern of insider threats, particularly during joiners, movers and leavers processes.
Dr Will Priestley shares some of the best practices on working with the toolkit. We discuss why health services need the DSPT and what ambitions you should have in using it to your benefit, the 10 Data Security Standards and how to tackle them, and how to demonstrate you are achieving and sustaining these standards.
Watch our interactive trial as we put Santa on the stand. Do your civic duty and join us as we investigate the privacy practices of one of the North Pole’s most notable residents – Mr S Claus. We will present the evidence. But did you, the jury, find him Guilty or Not Guilty of breaching GDPR?
The recent Supreme Court judgment in this case was a landmark moment in data breach class action law. We examine the implications for large scale data protection, privacy and cybersecurity cases, and why we need to be ready for strong legal consequences after operational failure events.
The dissolving perimeter is forcing us to accelerate our network and security transformations and refocus for today’s cloud and mobile world. Discover why consistent controls and ‘Martini’ security (anytime, anyplace, anywhere) is the answer to better managing risk – because location should never matter.