NEWS

   

EVENTS

Conferences

Cyber Security Global Summit

CYBER SECURITY GLOBAL SUMMIT

May 13-14, 2021
Offline events are gone for some time, but the tech world doesn't slow down. The Cyber Security community needs the platform to share the latest updates and use cases to improve coding skills and get architectural insights. We aim to provide an online event for Cyber Security geeks from all over...

Gulf Information Security Expo & Conference

GULF INFORMATION SECURITY EXPO & CONFERENCE

May 31-02, 2021
Since 2020 - cyber attackers have exploited the fear, panic and uncertainty of a worldwide pandemic and remote working to their best advantage. GISEC 2021 returns to help businesses power through the security challenges and stay ahead in the new realities.

No better time and place to ...

National Cyber Summit

NATIONAL CYBER SUMMIT

June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Cyber Security Festival 2021

CYBER SECURITY FESTIVAL 2021

June 16-30, 2021
With many staff now working remotely, organisations have had to adjust their IT strategies to cope . Cyber strategies have had to adapt too, with new vulnerabilities coming to the fore. According to recent research from Computing , 53 per cent of organisations have suffered social engineering attack...

BSides Oklahoma 2021 - Information Security Conference

BSIDES OKLAHOMA 2021 - INFORMATION SECURITY CONFERENCE

April 28-01, 2021
BSidesOK is an information security conference focused on practical knowledge that is widely available to the community. Our goal is to improve information security skills and awareness through sharing, with inexpensive training classes and a conference for attendees. The conference includes hands-o...

DeSales Cyber Security & Digital Forensics VIRTUAL Conference

DESALES CYBER SECURITY & DIGITAL FORENSICS VIRTUAL CONFERENCE

April 30-30, 2021
Join us for our 4th annual Cyber Security and Digital Forensics Conference at DeSales University! Our conference will now be an online event! We will have exciting presentations about cybersecurity and digital forensics topics.Please check back soon for more details on the presentations that will be...

Tech Leaders Forum: Cyber Security Update

TECH LEADERS FORUM: CYBER SECURITY UPDATE

April 20-20, 2021
80% of businesses consider cyber security to be a high priority. Almost half of businesses (46%) and a quarter of charities (26%) report having cyber security breaches or attacks in the last 12 months, causing significant disruption.

Cyber Security for Critical Assets APAC

CYBER SECURITY FOR CRITICAL ASSETS APAC

January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

 

Webinars

MAY 11, 2021
CYBER SECURITY WEBINAR- WANDSWORTH
The COVID-19 pandemic has seen many businesses across the country adapt to a remote working environment, with some businesses utilising technology for the very first time. But having moved quickly into potentially unfamiliar territory may have unintentionally left data vulnerable due to ho...
MAY 17, 2021 | 9:00 am
WHY IS CYBER SECURITY IMPORTANT FOR BUSINESSES?
This Free Webinar explores how you may be making yourself vulnerable to Cybercriminals and what you can do to prevent this. Cybercriminals are organised and professional individuals, and it's vital to acknowledge the importance of fighting against them with your own Cyber Security team...
MAY 18, 2021 | 6:30 am
CYBER SECURITY WEBINAR- MERTON
The COVID-19 pandemic has seen many businesses across the country adapt to a remote working environment, with some businesses utilising technology for the very first time. But having moved quickly into potentially unfamiliar territory may have unintentionally left data vulnerable due to ho...
MAY 19, 2021 | 02:00 PM
REGISTER FOR HOW WHITBREAD EXTEND WEBSITE SECURITY TO PROTECT CUSTOMERS
2020 forced many organisations to rethink their online strategy and how to maintain the sale of goods or services effectively in the online world, absent of traditional routes to market.
JUN 03, 2021 | 6:30 am
CYBER SECURITY WEBINAR- HARINGEY
The Police Digital Security Centre and Metropolitan Police are hosting a FREE Cyber Security Webinar for Haringey businesses on Thursday 3rd June 2021. The COVID-19 pandemic has seen many businesses across the country adapt to a remote working environment, with some businesses utilising te...
JUN 09, 2021 | 11:00 am
WEB HACKING - WEBINAR
Join Pratik from NotSoSecure, part of Claranet Cyber Security, on their introduction into Web Hacking Webinar. We will touch on current hacking techniques used to compromise web applications, APIs and associated end-points and discuss: The webinar is ideal for web developers, SOC analysts,...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
ENSURING SECURITY VALUE THROUGH OUTCOME-BASED MDR
Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection agains...
TRENDS IN PRIVACY AND DATA SECURITY
Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a sp...
THE VALUE OF DIVERSITY AND INCLUSION FOR LAW DEPARTMENTS
The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories ...
THE NEW INTELLIGENT EDGE
AI. 5G. CLOUD. THE WORLD IS DIGITALLY TRANSFORMING. ARE YOU READY FOR THE NEW INTELLIGENT EDGE? Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success. By 2025, an estimated 41 billion connected devices wil...
DEVOPS WITH SIMULATION
Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster t...

RESOURCES

On their road to recovery from the pandemic, businesses face unique dilemmas. This includes substantial and entirely necessary investments in digital transformation, however tight budgets are making s...

There is a saying, ‘you can fool all the people some of the time and some of the people all the time.’ Given the fact that there is no such thing as 100% security and human nature being tr...

For years, we have been told that cyber-attacks happen due to human-errors. Almost every person has stressed about training to prevent cyber-attacks from taking place. We have always been on the alert...

The ongoing pandemic has forced organizations across the globe to install work-from-home policies. A majority of the workforce in various industries, especially IT, have already adapting to working re...

There are several reasons to choose Linux over other operating systems such as Windows and macOS. Linux is an open-source, secure, and very lightweight operating system consuming minimal system resour...

Just about every single day, somewhere in the world, a company falls victim to cyber attackers, even with millions spent on cybersecurity.Every company is a target because they have da...

There are three significant and disruptive cybersecurity threats that are catching organizations of all types and sizes by surprise:Ransomware;Cloud misconfigura...

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. T...

What’s more, organisations should also keep in mind that prevention alone is not enough; according to IBM, the average breach detection and containment times currently sits in the region of 280 ...