Cyber Security 101 – adding value to your business

We're at a critical point in cyber defence - our webinar will cut through the hype and scare mongering about Cyber Security - arming you with a practical guide to cyber security best practices and sharing practical tips and advice around:- Who is attacking you and how to recognise different types of attack?  Evaluating different approaches to create a strong cyber security posture – the relative costs and value  5 simple actions every company can take today to mitigate risk  How to ensure your business partners and other 3rd parties don’t become a cyber risk As a government accredited company, we help UK organisations of all sizes build cyber security capabilities and maintain compliance through practical consulting and managed services.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cyber Security for Ports and Terminals Webinar

ABS Advanced Solutions

With the recent increase in cyber-attacks on maritime ports and terminals worldwide, more focus is being placed on strategies to reduce cyber risk at maritime facilities. So what does a U.S. Coast Guard compliant cyber security Facility Security Plan (FSP) look like? In 30-minute On-Demand webinars, Captain Dave Nichols, USCG (ret.) Director, Business Development ABS Advanced Solutions ans Cris DeWitt Senior Technical Advisor ABS will provide an overview on maritime facilities with a particular focus on ISPS Regulated Facilities and how the various policies, guidance, and regulations are interconnected. Specific areas being discussed are what the expectations should be for ISPS Regulated Facilities and how proper Cyber Risk.
Watch Now

Attack Tactics 6! Return of the Blue Team

Black Hills Information Security

In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.
Watch Now

HIPAA Compliance – Are You Staying Healthy?

Alert Logic

The medical/healthcare industry accounted for more than 23 percent of total cybersecurity breaches*. But, keeping up-to-date with HIPAA requirements to help protect data can be difficult. And selecting technologies so your organization can implement HIPAA security controls to comply with HIPAA regulations can be overwhelming. We can help you break it down. In this webinar we will walk through: The current state of HIPAA compliance, and how businesses are stacking up. Top reasons for HIPAA compliance failures and how to avoid them.
Watch Now

A Modern & Secure Approach for Cyber Security Operation Centers

With 17,000 new cyber security threats discovered every week, finding a solution that improves flexibility, workflows, and the consolidation of data — while maintaining highly efficient monitoring and management capabilities is a must. This roundtable webinar brings Subject Matter Experts from Userful and Swimlane. The panel will discuss the importance of flexible solutions for Cyber Security Operations Centers, improvements for how your SOC manages and monitors critical security applications, and will recommend ways to improve the exchange of real-time data and collaboration between operators.
Watch Now