Cyber Essentials webinar

Cyber Essentials is a cyber security certification scheme that addresses five key security controls and sets out a good baseline of cyber security suitable for all organisations in all sectors. With Cyber Essentials, organisations can focus on core business objectives, drive business efficiency and improve productivity through streamlining processes, while being secure in their strategies for protection from a majority of common cyber attacks. This webinar from IT Governance focuses on providing a thorough overview of Cyber Essentials, including coverage of certification standards and deadlines, and highlighting its benefits within the Cyber Resilience Strategy for Scotland and the rest of the UK.
Watch Now

Spotlight

This document provides you with an understanding of common cybersecurity tests and assessments organizations can use to evaluate their security posture and the distinctions between them. It will help you more accurately determine which assessment may be appropriate for your organization's needs.


OTHER ON-DEMAND WEBINARS

Phishing Readiness: Is your team ready?

Symantec

Phishing continues to be one of the most prevalent and effective threats to organizations. Combating hackers that are determined to compromise your users requires a unique blend of tools, strategy and training.Join our webinar to learn about: How to train your users to recognize these attacks more effectively and reduce your organization’s risk.

Here Phishy, Phishy, Phishy!

Zimperium

Definitionally, phishing is a social engineering attack that tricks users into clicking on a link that takes them to a site that either a) delivers a malicious payload to compromise a device, or b) further tricks them into divulging their credentials. While the former immediately weaponizes the device, the latter often provides the reused passwords that lead to compromise and penetration of the corporate network and resources.

The Future of Phishing: It’s all about your customers

SEGASEC

While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most current detection tools. Todays phishing attacks are no longer performed by scruffy hoodie covered villains, but by sophisticated, risk-calculating, online marketing experts who take social engineering to new heights. By constantly using A/B testing to improve their technology with each attack, they know how to tell a convincing story that would trick even the savviest users, causing irreversible reputational and financial damages to brands worldwide.

"How E-Signatures Enable Online Permitting at USDA"

How E-Signatures Enable Online Permitting at USDA