"Cyber Essentials – what is it and why do you need it?"

"Cyber Essentials was launched in June 2014 as part of the UK Government's National Cyber Security Strategy. The Cyber Essentials scheme sets a baseline for UK cyber security and provides an independent assessment of the essential security controls that organisations need to have in place to mitigate risks from the most common forms of internet-borne threats.
CREST was engaged by CESG, the information security arm of GCHQ, to develop the assessment framework that supports the Government's Cyber Essentials scheme. In this webinar, Ian Glover will discuss why we need Cyber Essentials; who it is for, what it is (and what it isn’t); and how it works. He will also review how it has been received by industry more than a year since its launch and what the future holds for the scheme."
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Solving for Compliance and Zero Trust with Istio Ambient Mesh

Istio ambient mesh uses a sidecar-less data plane that focuses on ease of operations, incremental adoption, and separation of security boundaries for applications and mesh infrastructure.
Watch Now

Ask an expert: How to start and advance your cybersecurity career

InfoSec Institute

Ever wish you had a cybersecurity expert on-call to answer your career questions? Here’s your chance! In this open Q&A webinar, Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, will answer anything and everything related to getting started in cybersecurity and helping take your career to the next level. Submit your questions before the webinar for your chance to win a year’s subscription to Infosec Skills, our new on-demand training platform. Or simply join us on June 28 at 11 a.m. Central see what’s on the minds of your fellow infosec professionals.
Watch Now

The Path Forward for Cybersecurity's AI: Not All AI Are Created Equal

Bank information security

For decades, IT professionals have been fighting malware, hackers, and other threats. Data protection, confidentiality, integrity and availability have long been threatened not only by amateur hackers, but by profit-oriented, well-organised criminals. Victims can usually only react because many of the usual methods for detecting malware require knowledge about specific attack techniques, about the behavior or about signatures of specific malware families.
Watch Now

How to Establish Visibility, Governance and a Security Culture for Multi-Cloud

Dimension Data

Is cloud security your top priority, or it is languishing somewhere on a never-ending to do list? A user-driven cloud revolution has left IT and security professionals struggling to establish visibility of data and services, and unable to regain control of the risks associated with dispersed data and multiple cloud identities. So how should organizations regain control and begin putting the “frogs back into the box” for multi-cloud security? In this webinar, we will look at how to get ahead with cloud, build a ‘cloud culture’ into your business, underpinned by a platform approach to avoid further complicating the picture to get the most from the cloud, whilst also managing the challenges of data everywhere, multiple cloud identities, mobile connections and global compliance.
Watch Now