Discover threats and real case studies from a former Head of UK Cyber Warfare Capability Development and Senior Military Advisor to UK Cabinet on Cyber Operations.
All our webinars, all in one place
Discover how academics, the public, and private sectors are all working in the pioneering new law enforcement effort to combat cybercrime. Every organisation in this country is potentially a target for cybercriminals, but the CRCs are here to show cybersecurity doesn’t need to be expensive or complicated.
We examined the findings from the new ‘Cybersecurity solutions for a riskier world’ global benchmarking study, including the top causes of significant breaches. Why do risk-based leaders rate their programmes as more mature? Watch now to find out, and learn how this approach could help you, too.
The traditional method of enforcing security at the network perimeter is no longer effective; now is the time to implement the Zero Trust security model. Watch to discover the practical benefits of Zero Trust, the importance of asset management, and practical tips to start putting Zero Trust into practice.
Most cyberattacks still start with or involve email, so stopping threats at this stage can strengthen your entire security strategy. Learn about the latest attack techniques and how developing an advanced strategy for emails can empower you to adapt to evolving threats, reduce costs, and respond sooner.
For most organisations, security and IT operations work in isolation, and potentially even against each other. And yet, how the two interact makes a huge difference in how fast your organisation can mitigate issues. Learn how to unite them so they work together in harmony instead.
With the 4th round of the MITRE Engenuity ATT&CK out, it’s important for us to learn how the evaluation and methodology can be used in our organisations. We look at this year’s results and discover how to apply and integrate the framework into your organisation to assess and improve your cyber strategy.
Misconfigured APIs, over-exposed sensitive data, and shadow admins are just some of the SaaS security challenges organisations face today. Join us as we will take a deep dive into some of the most common attack scenarios and cover steps you can take to secure your SaaS and IaaS environments.