Changing security behaviours isn't easy. For the most part, it's grossly misunderstood: awareness of something doesn't translate to behaviour change. In this webinar CybSafe break down the components, steps, and processes needed to change security behaviours in the workplace.
All our webinars, all in one place
Varonis walked us through the common challenges seen in the field, demonstrated how powerful collaboration features in M365 often result in complexity and pain for IT security, and showed us what truly happens under the hood when users share data in different ways.
More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
Our widespread adoption of cloud-services and need to share knowledge rapidly provides endless opportunities for information to end up in the wrong hands. Watch as we assess the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.
We explore the tech trends, behavioural science, and societal drivers that help us make sense of security awareness in an increasingly virtual world… and office. Watch this webinar if you’re interested in understanding how human cyber risk management is evolving, and why we should all be both excited and nervous.
Security awareness and training has been stagnant for too long. Mercifully, transformational security teams are realising the old ways of approaching the human element aren’t working. We uncover and discuss how to truly manage human cyber risk at work, and share takeaway tips, tricks and pitfalls.
We explore nudge theory in all directions – the history, the inspiration, the application and some real results from different businesses. We’ve all had to become more creative in what we do and how we do it (thanks, Covid), so how is nudge theory helping deliver strong and sustainable results in security awareness programmes?
Did you know an employee’s Gmail could endanger your company Salesforce data? We demonstrate how attackers exploit personal email accounts to gain access to corporate clouds and steal highly confidential customer data. Learn how the attack is performed and how to prevent cross-cloud attacks.