Master AI or Fall Behind

Your cyber intelligence source

Library

A new report suggests criminalising the paying of ransom demands might change everything – but could it result in mutual assured destruction as cyber security goes nuclear? Organised crime researcher, lecturer and consultant Chris Allen takes a look

Watch

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant. 

  • image
    Bhavna Sondhi Principal Security Consultant, Coalfire
  • image
    Trevor Morgan Head of Product Marketing, comforte AG
  • image
    Kathryn Cave Associate editor, SC Media (host)

It’s been a month since the Chartered Institute of Information Security (CIISec) released its damning research into the state of gender equality and balance in cybersecurity.  How did the sector react to the findings? What, if anything, has actually happened as a result – and one month later, what exactly have we learned?

Richard Forrest, senior associate at one of the UK’s leading data breach solicitors Hayes Connor, provides five tips to reduce your risk of a data breach…

Watch

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.

  • image
    Ashton D'Cruz Director - CAO, CGO & CISO, NatWest Markets (India)
  • image
    Mitesh Chauhan Global Product Director, Cloud & Security Services, Entrust Data Protection Solutions
  • image
    Niamh Vianney Muldoon Global Data Protection Officer , OneLogin
  • image
    Simon Newman Head of Cyber and Business Services, Police Crime Prevention Initiatives
  • image
    Edward Craig Acting Commissioning Editor, SC Media (host)

Online and offline criminals are mimicking big businesses, setting up corporate structures and offices to make operations more efficient and to act as cover. Organised crime researcher, lecturer and consultant Chris Allen explains that this level of sophistication means we all need to be wary

Watch

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.

In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations. 

  • image
    Meera Rao Senior Director of Product Management, Synopsys
  • image
    Adam Brown Managing Consultant , Synopsys
  • image
    Dan Raywood Information Security journalist, (Host)

Increasing the variety of minds and people in our sector is not simply a nice-to-have: it’s an operational imperative. Owanate Bestman is a cybersecurity specialist recruiter with first-hand experience of creating gender-balanced security departments. Here’s how he does it…

Master AI or Fall Behind