How many of your data breaches are due to your own people, whether by accident or on purpose? Watch now to navigate the fact and fiction around insider threat with a light-hearted look at this serious risk topic.
All our webinars, all in one place
Like many organisations, Computershare has been on a journey from compliance-based security to behaviour-based security awareness. Hear about their successes, struggles and solutions over the past three years, the benefits (both expected and unexpected), and what they hope to achieve next.
This talk gives an overview of GovAssure, and delve into how to systematically approach the scoping, self-assessment and outcomes in a practical and useful way. The overall outcome for this talk is to help organisations understand how to approach GovAssure and achieve compliance in the long term.
Our industry has long overlooked how and why people form habits. But when we ignore the psychology behind effective habit-building, we create a clash between habit and intention in routine tasks. In this webinar, we discuss the science, why cues and context are so important, and how to replace existing habits.
We discussed how the control and manipulation of information is becoming an existential threat to our society, freedoms, and security. We are bombarded with so much information, it can be difficult to objectively assess if what we are presented with is true or even real. Is AI helping lead us to an Orwellian reality?
How many tactics are you using to drive security awareness engagement? If you can count them on one hand, watch now us to learn about more than 30 scientifically researched and categorised new approaches that you can use to reduce user-related security incidents without compromising compliance.
Security awareness teaches things. Metrics measure things. But we often struggle to get useful metrics from our awareness programmes. Re-evaluate the measurements you really want and need, then discover how to generate reliable, useful, and meaningful metrics that answer the questions we can’t ask.
Hackers don't hack in, they log in. Once a bad actor has admin-level access to your network, often through social engineering, they effectively own everything on that network. Watch now to learn how and why this happens, the techniques attackers use, and how to minimise your risk by reducing your attack surface at every layer.