This session explores the methods criminals use to socially engineer their way into our accounts and gain access to our sensitive and valuable information. We share just how easily criminals can take hold of data through social media and espionage, and prove it.
All our webinars, all in one place
With 80% of all attacks utilising phishing and/or stolen credentials, MFA has been a favoured defence. But Lapsus$ and other ransomwares have been successful despite MFA deployment… Watch now for a deep dive into ransomware, MFA, phishing, and protecting your users, and to discover how malicious actors are still successful despite technical ‘safeguards’.
Discover threats and real case studies from a former Head of UK Cyber Warfare Capability Development and Senior Military Advisor to UK Cabinet on Cyber Operations.
Discover how academics, the public, and private sectors are all working in the pioneering new law enforcement effort to combat cybercrime. Every organisation in this country is potentially a target for cybercriminals, but the CRCs are here to show cybersecurity doesn’t need to be expensive or complicated.
Watch this exclusive webinar on this year’s report findings and hear directly from the 2022 responsible analyst. Maddy and Emma explained the different attacks organisations are facing, how they are impacted and how they respond, as well as how the government is using the findings to inform policy.
Watch now to discover practical ways you can protect your reputation and business for free. Explore simple processes and assess your cyber circle to improve your cybersecurity right away – all advice can be actioned straight away as it requires no technical knowledge or funding.
We examined the findings from the new ‘Cybersecurity solutions for a riskier world’ global benchmarking study, including the top causes of significant breaches. Why do risk-based leaders rate their programmes as more mature? Watch now to find out, and learn how this approach could help you, too.
Our widespread adoption of cloud-services and need to share knowledge rapidly provides endless opportunities for information to end up in the wrong hands. Watch as we assess the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.