Adenike Cosgrove gives us an insight into the incidents taking place in the healthcare sector at the moment, together with some genuinely useful hints and tips on what we should all be considering to be more secure.
All our webinars, all in one place
Learn the techniques to keep data un-sensitive, unintelligible and of no value to unauthorised users. We look at the concerns of storing sensitive data, how to meet compliance requirements, and how to maintain integrity in the face of a cloud service outage.
The world could not have survived the pandemic without the internet, and Covid-19 has finally and firmly established cybersecurity as a critical business enabler. In the age of hybrid working, we must now step up to the new challenges both in technology, the threat landscape, and the supervision of our remote-working employees.
Although implemented seemingly overnight, the hybrid workforce has become a long-term reality. Security controls relaxed in the rush now need addressing before they become even more of a security risk. And as we see increased attack surfaces and volumes, this new era is a chance to avoid repeating past mistakes.
The global economy is suffering dramatic skills shortages, especially in digital and soft skills. Discover how certain games and genres are sources of soft skills and other talents that are essential to the future of work, including leadership, collaboration, and logical thinking.
Did you know that 27% of employees state that their financial worries have an impact on their performance at work? We share how embedding a financial wellbeing strategy can reduce insider risk, how Schroders Personal Wealth developed their initiative, and tips for designing and embedding your own strategy.
It’s widely recognised that the human aspect of cybersecurity is critical but not well understood. The empirical evidence is limited. In a first-of-its-kind project, user security behaviours and attitudes have been examined with scientific rigor. Join us to discover and explore the key findings.
With so many people and limited resources, it can be difficult to focus our attention and prioritise the right risks. We discuss the ways to identify users who are imminent targets and those who pose a high risk, and how to address the needs of different groups based on their profile – in a timely fashion.