Thursday , 16 August 2018
Home » Webinar of the Week

Webinar of the Week

The Blind Spot – getting over the skills shortage

There are a great deal of “cyber” skilled professionals within the industry, as opposed to what is claimed by the world governments. The term “cyber” itself has lead to the discrimination of valuable professionals who do not feature cyber certifications in their CVs, as recruiters operate on the basis of scanning systems that filter out CVs that do not mention ... Read More »

Getting to Grips with Cyber-Security

Bob Tarzey,
Quocirca

Presented by Bob Tarzey, Analyst and Director, Quocirca Ltd Watch HERE The majority of organisations across Europe and UK now accept that targeted attacks are a serious problem. Quocirca’s presentation reviews recent research into the perception of cyber-threats, the impact they can have and the before, during and after measures organisations are putting in place to protect themselves against them. ... Read More »

The Advanced Persistent Threat: How to explain it to your family and what to do

“Advanced Persistent Threat” is a buzzword phrase in the industry, often used along with lots of promises to prevent it if you buy a product. But what is it really, and why is it so powerful? And how can you make sense of the bewildering array of products that all claim to prevent it? While we can’t promise to make ... Read More »

Protecting Your Sensitive Data Does Not Have to Impact Business Operations

The risks to sensitive data are everywhere, and your organisation is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protect PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments. Find out how you can protect PII throughout ... Read More »

Inside the paradigm-shift underway in risk mitigation

Josh Goldfarb,
FireEye

When? 28th January 2016 – International Data Privacy Day Free registration HERE Over the years, risk mitigation efforts have been focused primarily on preventive measures. Although prevention is a necessary component of a mature security program, it is no longer sufficient. The modern attacker is persistent, motivated, well-funded and adept at findings ways into an organization and taking that organization’s ... Read More »

Understanding ‘Man in the Cloud’ Attacks

Already widely adopted by enterprises, use of cloud file sharing services such as Office 365, OneDrive, Dropbox, Box and Google Drive is on the rise. As adoption increases, so does the motivation for attack. The Imperva Application Defense Center (ADC) recently announced new research on a new type of attack we call “Man in the Cloud” (MITC). These attacks rely ... Read More »

The Top Ten Phishing Lures of 2015

PRESENTERS: Mike Smart and Richard Davis, Proofpoint. Phishing is without a doubt one of the biggest security threats to business today and cybercriminals are constantly modifying these threats in a bid to make them harder for humans and technology to detect. In this webinar, Proofpoint will be looking at the top 10 phishing lures of 2015 and the tricks hackers ... Read More »

The Next Generation of Incident Response

Ondrej Krehel,
Lifars LLC

Join Ondrej Krehel of LIFARS LLC as we examine in detail the process of data breach response from the perspective of an elite IR team member. It will cover the steps taken to properly respond to a breach caused by a sophisticated hacker and go over some real-world case studies. This webinar was hosted as part of Security Serious Week 2015 ... Read More »

Talking To The Board: How To Improve Your Board’s Cyber Security Literacy

Boards of Directors have an inescapable legal responsibility to protect their organisation’s assets and shareholder value against risks. Where does cybersecurity fit in the agenda? Many boards lack the knowledge, awareness and confidence to connect security to the business. In this webcast, moderator Paul Edon, Director of Customer Services at Tripwire, will provide a variety of perspectives from experienced professionals ... Read More »

You’re the Weakest Link, Goodbye!

Darren Argyle,
Markit

The use of third parties is unavoidable in today’s global economy. The growing use of third party suppliers and business partners, whilst bringing significant business advantages, also exposes organisations to substantial risk, such as financial loss, reputational damage, regulatory prosecution and fines from major breaches of security. In the last few years we’ve witnessed many of these risks being realised; ... Read More »