The UK Government has cybersecurity guidance for organisations responsible for Critical National Infrastructure and vitally important services, but how can this guidance be applied to all organisations? Watch now to discover how organisations of all sizes can be inspired to improve their security posture and resilience based on the guiding principles of the NCSC’s Cyber Assessment Framework (CAF).
All our webinars, all in one place
Effective crisis communication is a challenge. There are multiple organisations to contact, various channels to use, and mandatory deadlines to factor in. We discuss how to balance compliance, security, and operations; as well as strategies and tools for efficient plans that minimise disruption.
Cybercriminals have shown remarkable adaptability and determination to circumvent security policies, so staying ahead of the curve is essential. This engaging and informative webinar delved into the evolving landscape of ransomware, threat sophistication, and the impact of hardware-assisted security solutions.
Many organisations have solid recovery plans for their critical applications, but AD is often overlooked. Watch now as we looked at the significance of Active Directory in your business continuity and disaster recovery plan, discussed real-world experiences, and provided practical examples for enhancing resilience.
With ever-growing cyber threats, resilience has become a top priority in major cybersecurity roadmaps. Attacks remain likely, so we must prepare to mitigate the impacts and recover swiftly. Watch now to discover areas of alignment, gaps that need to be addressed, and how to integrate resilience into an overall strategy.
Watch now to examine the current security landscape and notable incidents from 2023, particularly emerging common TTPs. We also considered the valuable lessons we can learn from the past year, and how we can all gain a deeper understanding of the best practices to fortify our cybersecurity posture for the future.
Enterprise networks that extend beyond the traditional perimeter demand more than traditional controls. Using Microsoft security reference architecture as an example, we’ll show how observability can help you make constant improvements to how you monitor your services – especially when you’re drowning in data.
Phishing is a major threat, but simulated campaigns can backfire. We explore why they damage trust, weaken security culture, and fail to reduce phishing risk. As well as discussing how to gather comprehensive metrics, we also look at 'agile phishing' – a new approach that aims to combat the shortfalls of traditional simulations.