More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
All our webinars, all in one place
Our widespread adoption of cloud-services and need to share knowledge rapidly provides endless opportunities for information to end up in the wrong hands. Watch as we assess the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.
We explore the tech trends, behavioural science, and societal drivers that help us make sense of security awareness in an increasingly virtual world… and office. Watch this webinar if you’re interested in understanding how human cyber risk management is evolving, and why we should all be both excited and nervous.
Security awareness and training has been stagnant for too long. Mercifully, transformational security teams are realising the old ways of approaching the human element aren’t working. We uncover and discuss how to truly manage human cyber risk at work, and share takeaway tips, tricks and pitfalls.
We explore nudge theory in all directions – the history, the inspiration, the application and some real results from different businesses. We’ve all had to become more creative in what we do and how we do it (thanks, Covid), so how is nudge theory helping deliver strong and sustainable results in security awareness programmes?
Did you know an employee’s Gmail could endanger your company Salesforce data? We demonstrate how attackers exploit personal email accounts to gain access to corporate clouds and steal highly confidential customer data. Learn how the attack is performed and how to prevent cross-cloud attacks.
Increasing complexity in security infrastructures and resources that are ever stretched increases the risk of implementing security policies incorrectly. Watch as we show you how to use automation to model changes before provisioning, increase change control accuracy, and avoid the costs of failed audits.
Accounts with ‘always-on’ admin access are increasing your attack surface – they provide the privilege to gain access to sensitive data or resources. Watch to learn why this is your biggest undiscovered security risk, what steps you can take to start removing that risk, and how to reach zero trust.