"Expect the Unexpected"

"We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.

In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Data Centers Are Migrating To the Cloud – Is Your OT Security Infrastructure Ready?

To lower costs and improve efficiencies, enterprises are moving some or all of their data and applications from on-prem to the public cloud, or even SaaS. And, as OT and IT convergence accelerates, OT teams are evaluating their options as they look to the future. Unfortunately, organizations often fail to ensure that their security infrastructure is ready before migrating.
Watch Now

Getting started in digital forensics

InfoSec Institute

Digital forensics is the backbone of investigating cybercrime. It includes identifying, preserving, extracting, analyzing and reporting evidence across computers, mobile devices and networks. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, for this on-demand webinar as we discuss: The difference between computer, mobile and network forensics. How a forensics certification can progress your career.
Watch Now

Understanding and complying with RBI’s New Email Cybersecurity guidelines 2019

Mithi

In this Value-packed webinar, where Mithi, with a decade+ of experience in meeting email compliance requirements for all of its BFSI customers, Shared key elements of the recently released. "Email security guidelines 2019, by RBI" For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Watch Now

Practical Risk Management Steps for the Threat Hunter

Simplilearn

What is threat hunting and why is this field gaining popularity among security organizations? Threat hunting emphasizes on a proactive approach to security and encourages organizations to anticipate and manage potential security breaches and hacks. Join Dr. James Stanger, Sr Director of Products at CompTIA, in a live webinar as he walks us through the critical areas of threat hunting and how this can enhance current cyber security measures for organizations.
Watch Now