Your cyber intelligence source

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image
Register

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

image image
HL
Register

SC UK Congress: Autumn 2024

image
Register

Expert reports

When you need a background briefing on a topic, or a more in-depth update on a particular issue that is causing you a problem, there is sure to be an SC Whitepaper to meet your needs. SC Whitepapers extend from wide-ranging overviews to in-depth analysis of specific issues of interest to cyber-security professionals. Our Whitepapers are written by authoritative acknowledged experts in their fields and range from Access to Zero days, with insider threats, ransomware, DDoS, breaches, planning, remediation, behavioural analysis, regulation (including GDPR) and updates on specific threats among topics covered. We work in cooperation with selected commercial partners, ensuring that the information provided is independent, unbiased and authoritative.

Webinars

Our Webinars are truly informative, so that you will come away knowing more about the topic than you did before, and ideally with actionable information that you can apply in your organisation. Editorially independent moderators will quiz expert presenters and panellists, as well as asking questions from listeners to tease out the answers that you need to improve your performance. Listen today, engage with the experts, ask a question, and improve your understanding of the issues that matter to you.

Upcoming

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image
HL

SC UK Congress: Autumn 2024

A full day of content addressing the key issues driving cybersecurity in 2024.

image

Past

On Demand Webinar: Better Security Via Active Directory Risk Assessments

Join ManageEngine and learn why your enterprise needs identity risk assessments to pinpoint and prioritize security risks. In this on-demand webinar you will learn how to use identity threat detection and response tools to detect and respond to identity-related threats faster.

SC Annual Digital Congress

Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.

SC Bytesize

For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.

Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.