Martin Smith MBE and Adam Wild welcome and introduce the day, followed by the opening keynote where Phil Huggins and John Noble CBE give a summary preview of the cybersecurity strategy for health and social care to be published in April 2022. They also describe the important new cybersecurity guide developed and published for NEDs of NHS trusts that is relevant to many other organisations.
All our webinars, all in one place
Dr Will Priestley shares some of the best practices on working with the toolkit. We discuss why health services need the DSPT and what ambitions you should have in using it to your benefit, the 10 Data Security Standards and how to tackle them, and how to demonstrate you are achieving and sustaining these standards.
The Government recently consulted UK plc on the cybersecurity challenges organisations face with their digital supply chains. DCMS explains how we can all enhance the security of our supply chains and third-party IT services, as it outlines the Government's next steps in helping businesses become more resilient to supply chain incidents.
A rare chance to hear first-hand about the Department for Work and Pensions’ supply chain security journey over the last few years. They tell us about the challenges they faced and how they overcame them, as well as give advice on good starting points for others embarking on this journey.
Cybercriminals profile your organisation in detail by mapping your external attack surface. Do you know what and how much they can see? Or the data points of your digital presence they could use? This webinar provides an in-depth understanding of external attack surface management (EASM) and how best to derive measurable value.
Supply chain attacks have increased in frequency and severity in recent years and even months, but what makes these attacks different from other cyber attacks? And what do they mean for our businesses? Learn how to manage your supply chain risks and the precautions corporations can take.
Attackers will always choose the easiest path most likely to succeed. And which is a target more likely to open – the unknown email with an attachment, or an invoice from a known and trusted supplier? We analyse some of the most prominent recent supply chain attacks and share how to combat them.
Recent ransomware attacks have once again highlighted both our dependence on supply chains and our vulnerability to attacks through them. Do we fully understand the risks, or have we become overwhelmed by their complexity? Join us as we explore how to manage supply chain risks and the steps you can take to mitigate them.