"Making staff part of the solution, not the problem"

wadiff consulting

The security policies are in place, defences have been tightened, audits and reviews are being done. Now you need to get the staff on board. The webinar looks at ways to raise staff awareness of security issues and encouraging them to suggest improvements.
Watch Now

Spotlight

Like the poor in the famous Biblical verse, malware will always be with us. Here's a 33-year history from Elk Cloner to Cryptolocker. What will be next? Only six years after the first personal computer was introduced in 1975, the world was introduced to its first computer virus. Here’s a look back at the inception of malware.


OTHER ON-DEMAND WEBINARS

Understanding - and Stopping - Data Breaches

"Over a billion records were leaked last year in online cyberattacks. While the specifics of each breach vary, in-depth analysis of successful attacks reveals a common thread – the compromise of privileged users and the thousands of accounts and credentials they rely on to manage increasingly complex hybrid enterprises. In this webcast, we’ll examine several of the highest profile breaches of the last few years, reveal the steps attackers took to gain access – and how cybersecurity teams can leverage privileged identity management to defend their environment and stop breaches. Join us to learn: -Who are privileged users? -How attackers exploit and compromise privileged users to gain access to sensitive systems and data -How to prevent attacks from succeeding through privileged identity management "
Watch Now

How To Bridge The Cyber Skills Gap In Your Organisation

QA Ltd

There is a high demand for Cyber Security Technologists. Hardly a day goes by without a cyber-attack being reported. With this ever-increasing threat there is a growing need for all organisations to be able to detect, deter and defend against these attacks as part of their every-day business. With a large majority of breaches being the result of technological compromise as well as human error (social engineering, phishing, etc.), today’s modern businesses need to ensure they have both the right technology solutions and cyber skills across their organisation. QA are pioneers in digital and cyber security apprenticeships and will share insight from their learnings in this arena, talk through how cyber security apprentices have helped their public and private sector clients. They will also talk through the process; how can organisations get cyber security apprentices to work for them, where does the training takes place and who funds it. As a group QA supplies technical and business skills training for professionals from entry level to C Level executives, and provide talent (apprentices and graduates) to around 80% of FTSE 250 organisations and the public sector. They are a Microsoft Gold Partner and have unique learning programmes accredited by the BCS.
Watch Now

Determining Information Security Risk from Cyber Attack Data

Cyberlytic

This webinar covers a risk assessment methodology developed to analyse cyber attacks within the context of an individual business. Today, businesses face an increasing array of cyber threats, where the attacker is intent on compromising the network for criminal or political gain. The corporate value of the information stored within the network will differ across stores, depending on a number of factors including monetary value or the potential damage to reputation. The cyber threats that businesses face, together with vulnerabilities that exist and the impact that the organisation could face from a potential breach or denial attack, are combined and analysed to provide each business with a rich picture of their risk profile, delivered in real-time.
Watch Now

Your Resolution for 2018: Five Principles For Securing DevOps

Veracode

Organizations in today’s market must strike a balance between competitive differentiation and meeting evolving compliance standards-particularly related to software security. They need to obtain faster release and deployment cycles, improved collaboration between business stakeholders and application development and operations teams, and automation tools. DevOps, an innovative organizational and cultural way of organizing development and IT operations work, is addressing this challenge – driven by mounting evidence of its benefits to the business. However reaping these gains requires rethinking application security to deliver more secure code at DevOps speed.
Watch Now

Spotlight

Like the poor in the famous Biblical verse, malware will always be with us. Here's a 33-year history from Elk Cloner to Cryptolocker. What will be next? Only six years after the first personal computer was introduced in 1975, the world was introduced to its first computer virus. Here’s a look back at the inception of malware.

resources