This session explores the methods criminals use to socially engineer their way into our accounts and gain access to our sensitive and valuable information. We share just how easily criminals can take hold of data through social media and espionage, and prove it.
All our webinars, all in one place
Automation can be applied at every stage of cybersecurity. It can make even the most complex analysis achievable and reduce the time to identify and mitigate threats - reducing your exposure window. Watch now to discover more reasons why a recent benchmarking study identified automation as a best practice.
Watch now for an exclusive sneak peek into key insights from the report’s findings – before its public release. One of the least understood areas of cyber resilience is that of security behaviours and attitudes. See how trends in core behaviours can help us tailor our security awareness efforts.
More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
With 80% of all attacks utilising phishing and/or stolen credentials, MFA has been a favoured defence. But Lapsus$ and other ransomwares have been successful despite MFA deployment… Watch now for a deep dive into ransomware, MFA, phishing, and protecting your users, and to discover how malicious actors are still successful despite technical ‘safeguards’.
Discover threats and real case studies from a former Head of UK Cyber Warfare Capability Development and Senior Military Advisor to UK Cabinet on Cyber Operations.
Discover how academics, the public, and private sectors are all working in the pioneering new law enforcement effort to combat cybercrime. Every organisation in this country is potentially a target for cybercriminals, but the CRCs are here to show cybersecurity doesn’t need to be expensive or complicated.
Watch this exclusive webinar on this year’s report findings and hear directly from the 2022 responsible analyst. Maddy and Emma explained the different attacks organisations are facing, how they are impacted and how they respond, as well as how the government is using the findings to inform policy.