Why legacy data is the biggest barrier to data migration success (and what to do about it)
2020 was the year that saw mass migration to the cloud driven by organisations’ sudden need for digital transformation to cope with the coronavirus pandemic. But migrations can encounter problems if you don’t understand what’s in your data. Join us as we look at legacy data and why you need to clean it up before you try to migrate.
Recorderd on: Wednesday 13th January 2021
The history of cryptography and the modern enigma of digital certificates
With 1.3 billion live and searchable websites, are you sure your internet presence is working for you? Who exactly is responsible for ensuring your internet-facing security is robust, controlled and properly managed so that your organisation is neither targeted nor infiltrated? With 30,000 websites attacked daily, can you afford to make assumptions?
Recorderd on: Tuesday 15th December 2020
How to use information security to drive competitive advantage
The security function is a key strategic tool in driving competitive advantage for businesses. When infosec is responsible for finding and securing the data on the inside of the estate, they can mitigate the hidden risk, and unlock its value too. We explore how businesses can leverage infosec to commercialise their data and strengthen their competitive edge.
Recorderd on: Monday 14th December 2020
A global reset: Cybersecurity predictions 2021
2020 has shaped up in a way that nobody could have expected, making it even more critical we prepare ourselves. Threat intelligence expert Dr Jamie Collier shares upcoming cyber trends and challenges. During the webinar, he will touch on remote working, threat actors, intelligence-led security validation, cloud security, nation-state activity and ransomware.
Recorderd on: Tuesday 17th November 2020
Forestall the fireworks in your data: How to place a value on risk
There are hidden fireworks in every data estate waiting to go ‘bang’ unless they are found and remediated. Many IT professionals are worried that their organisation will be the next data breach. Yet you can’t elevate risk as a board-level business driver if it doesn’t have a value. Join us on Guy Fawkes Day as we explain how you can define value on your risk.
Recorderd on: Thursday 5th November 2020
Cybercrime pays: The rise of ransomware, geopolitics and what it means for you
Ransomware is on the rise - there’s no doubt about that, but who is behind the attacks? And what is their motivation? Join Jared to find out as he takes us on a tour of the major nation-state players in cybercrime and unpicks their motivations and methods, as well as providing mitigations to keep your infrastructure safe - because ransomware isn’t going away.
Recorderd on: Tuesday 3rd November 2020
How the environmental impact affects your bottom line: Things you should consider when choosing your system software
System software - such as anti-malware - may not be the obvious starting point for companies when scrutinising its potential harm to the environment, as well as the impact upon its costs. However, many independent AV testing organisations cite it as a critical consideration. We explore why that is the case and bring system software impacts into your focus.
Recorderd on: Monday 2nd November 2020
The CISO conundrum - legacy environments – it is all about the business risk
Few organisations are immune to the effects of legacy systems, which are often business-critical in their environments. We all know how hard dealing with the standard estate is; let alone legacy, but you cannot just do nothing. We explore how to track and reassess our legacy environments to determine the process needed to make them secure.
Recorderd on: Wednesday 14th October 2020
The establishment of the UK’s Cybersecurity Council
The session covers a history of the Cyber Security Alliance and the UK Cyber Security Council Formation Project. The Council goes live in April 2021 and will provide focus and coherence to the profession, including career and qualification pathways and a route to chartered status for individuals. The session will include a Q&A with Alliance and project members.
Recorderd on: Tuesday 13th October 2020
The skeletons in your unstructured data
Every business faces the same problem: Not knowing what data they’ve got or where it’s stored. There are lumps and bumps under the carpet all over the place, but what do they contain? Are there skeletons that may unexpectedly come to light? We’ll share what’s in a typical organisation’s data estate and how to reduce the risk of finding any nasty surprises.
Recorderd on: Thursday 1st October 2020
Cloud Threats from the Frontlines
Organisations have been moving to the cloud at an increasing pace. However, many are failing to protect their environments against attack effectively. This has resulted in a significant rise in cloud-related breaches by threat actors. We explore lessons learned from and share best practices for organisations protecting their cloud environments from compromise.
Recorderd on: Wednesday 30th September 2020
Solving business email compromise and email account compromise
The rapid rise in email fraud has cost organisations globally billions of dollars, and company boards are noticing. The most recent FBI statistic cites over $26. 2billion in losses and over 166k incidents worldwide due to 'business email compromise'. But this problem impacts far more than just your email. We learn how you can protect you and your organisation.
Recorderd on: Thursday 17th September 2020
Breaches, fines and the dangers of dark data: How to avoid becoming the next negative news story
Every month there's news of another data breach, but what are these headline-grabbing fines really for? What can we learn to avoid being next? Gareth shares Exonar's latest research into GDPR penalties, examining how these breaches happened and what could have been done to prevent them. Exonar also invites SASIG members to assist with these findings.
Recorderd on: Tuesday 15th September 2020
Cyber Resilience for Dummies
There is no single solution offering protection from attack, but Cyber Resilience can provide a multi-layered approach encompassing people, processes and technology. Peter talks about eliminating the gap between IT and the business to present a united front against threats.
Recorderd on: Friday 28th August 2020
The hitchhiker's guide to offensive defence: An effective way to manage digital risks
In the new cybersecurity approach of ‘Offense in Depth’, what exactly are the predictors of Exposure, Warning, and Attack indicators, as we wade through threat intelligence? We explore the value of identifying various data points in cyberspace and leveraging them to pivot from one attack attribute to another, to reduce our chances of becoming a target.