Recent ransomware attacks have once again highlighted both our dependence on supply chains and our vulnerability to attacks through them. Do we fully understand the risks, or have we become overwhelmed by their complexity? Join us as we explore how to manage supply chain risks and the steps you can take to mitigate them.
Recorded on: Wednesday 21st July 2021
What is threat hunting? Why you need it, and how to make it easy for your analysts
Cybersecurity often feels like a game of cat and mouse. Just as a solution gets close to preventing an attack, the adversaries change their techniques. With threats going undetected by traditional security tools and lurking in networks for months, threat hunting means no more waiting around for that dreaded alert.
Recorded on: Tuesday 6th July 2021
Threat trends: 2021 so far
Join us for a critical look at the eventful start to 2021’s cyber threat landscape. We share observations and thoughts on what to expect for the rest of the year regarding cyber threats and the ever-changing landscape.
Recorded on: Thursday 20th May 2021
Illuminating risk indicators with readily available telemetry data from standard admin tools
Many risk indicators in Incident Response are just below the surface and relatively simple to uncover with standard admin tools. Practical telemetry data is readily available to all organisations and illuminates key risk indicators. This session looks at what telemetry is useful and how to create a no-cost data lake to question, giving you the insight to drive your cyber operational workflows.
Recorded on: Wednesday 3rd February 2021
Using dependency modelling to dynamically visualise and understand business risk
Understanding how interdependent business systems impact risk is challenging. Dependency modelling is a powerful approach that helps visualise risk, aid analysis and lead to more resilient designs. Andy takes us through simple examples of how to quickly model and understand new risks, determine key sensitivities and optimise a design for maximum resilience.
Recorded on: Monday 7th December 2020
How to mitigate insider risk and how regulated firms can stay ahead
Insider risk is a challenge across many industries, particularly within regulated industries, including financial services. It can lead to fraud, financial loss, data leak and regulatory fines. Join us as we explore the main insider threat profiles, why insider threats require more context and how to reduce response time and costs by speeding up investigations.
Recorded on: Tuesday 1st December 2020
From cybersecurity to cyber-maturity – a journey worth taking
The cyber landscape is being squeezed by an increase in risk on one side and an ever more complex business environment on the other. This session unashamedly looks at non-technical approaches to building a robust cyber-maturity strategy. One that is evidential and measurable in its approach to better direct your operational and technical priorities.
Recorded on: Wednesday 25th November 2020
Pragmatic risk-based cybersecurity: How to use threat and risk analysis in your organisation
We are delighted world-renowned security evangelist Peter joins us to look at the challenges of testing your cybersecurity. Our cyber enemies are sophisticated and strategic with clear objectives and lots of resources. To counter their attacks, we need a pragmatic approach to threat and risk analysis to feed our cybersecurity ecosystem and focus on protecting our most important assets.
Recorded on: Wednesday 19th August 2020
35 Views of cyber risk
As the pace of change has accelerated, so has the need for our understanding of the world we live in. This creates a challenge in aiming for clarity and is the problem in understanding cyber risks. But while we may never fully know the cyber world, we can better understand it by combining knowledge from several fields - combinative thinking. John brings together 35 views as he navigates around the cyber risk environment and gives us some food for thought along the way.