More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
All our webinars, all in one place
Modern slavery is all around us and covers a wide range of abuse. Anyone could be a victim, often without realising. We must all take steps to prevent modern slavery in our own organisations and our supply chains. Watch now to explore types and signs of modern slavery, legislation, and available resources.
With the 4th round of the MITRE Engenuity ATT&CK out, it’s important for us to learn how the evaluation and methodology can be used in our organisations. We look at this year’s results and discover how to apply and integrate the framework into your organisation to assess and improve your cyber strategy.
There's a lot more to blockchain than cryptocurrencies and ‘a distributed ledger of transactions’. Much of its potential is yet to be realised, so watch as we examine the incredible benefits blockchain technology could have for logistics tracking, smart contracts and the availability and integrity of data.
When critical infrastructure relies so heavily on operational technology, why do we still allow them to rely on industrial control systems with weak or even non-existent security measures? Watch now to learn about OT and ICS security challenges, why they are vulnerable, who is attacking them, and how to protect them.
Third-party and supply chain risks are nothing new. They are problems faced by most organisations – from multi-national corporations to small businesses. Weaknesses in risk and control management have led to significant and damaging breaches on critical national infrastructure and ecosystems with businesses around the world. Headlines over the last few years have included the Colonial Pipeline, JBS Foods, German Electricity grid attacks. It seems criminal gangs, organised crime, and even nation states have shifted their attack focus onto the supply chain. And why not, when they can bypass our defences by disrupting our easier to target partners, yet still achieve their end goal? Our panel of experts discuss this ever-increasing issue that the user community needs to deal with collectively. We will look at how to combat third-party risk in the supply chain, and whether we have no choice but to adopt a zero-trust model for all.
Although their budgets may be increasing, CISOs are often stuck between the organisational pressures to do ‘something’ to improve resilience, and the pressurised sales tactics of service and solutions providers. So how can we choose the best provider for our needs? We explore how to choose the right provider for you and your organisation, in an efficient way.
Martin Smith MBE and Adam Wild welcome and introduce the day, followed by the opening keynote where Phil Huggins and John Noble CBE give a summary preview of the cybersecurity strategy for health and social care to be published in April 2022. They also describe the important new cybersecurity guide developed and published for NEDs of NHS trusts that is relevant to many other organisations.