Have questions about Identity Threat Detection and Response (ITDR) but are too afraid to ask? Watch now as David unpacked the fundamentals of ITDR, including the role of identity stores, their location, function, and why cybercriminals target them.
All our webinars, all in one place
By applying attackers’ methods to our defensive operations, we can take back the first-more advantage when it comes to incidents. We discuss the ever-changing threat landscape, how to keep up to date with emerging vulnerabilities, and how we can turn this into actionable threat intelligence.
The UK Government has cybersecurity guidance for organisations responsible for Critical National Infrastructure and vitally important services, but how can this guidance be applied to all organisations? Watch now to discover how organisations of all sizes can be inspired to improve their security posture and resilience based on the guiding principles of the NCSC’s Cyber Assessment Framework (CAF).
Cybercriminals have shown remarkable adaptability and determination to circumvent security policies, so staying ahead of the curve is essential. This engaging and informative webinar delved into the evolving landscape of ransomware, threat sophistication, and the impact of hardware-assisted security solutions.
Unlike automated security measures, threat hunting involves skilled human analysts who identify even subtle threats. Watch now to discover how they use analytics, behavioural analysis, and contextual understanding of an environment to uncover anomalies, vulnerabilities, and signs of compromise, to identify and neutralise threats before they escalate.
Many organisations have solid recovery plans for their critical applications, but AD is often overlooked. Watch now as we looked at the significance of Active Directory in your business continuity and disaster recovery plan, discussed real-world experiences, and provided practical examples for enhancing resilience.
With ever-growing cyber threats, resilience has become a top priority in major cybersecurity roadmaps. Attacks remain likely, so we must prepare to mitigate the impacts and recover swiftly. Watch now to discover areas of alignment, gaps that need to be addressed, and how to integrate resilience into an overall strategy.
Discover how organisations are consolidating their tech stacks and SEGs. Hear how it can help with DLP challenges as well as saving time and money, and how to communicate this to non-technical budget holders. We also discussed how much consolidation is too much, and gave some actionable takeaways.