UNLOCKS: FINANCIAL CYBERSECURITY RISK
How to change the fix-it-later culture: making DevOps teams careCloud Security
Thanks to GDPR, getting DevOps teams to care about security is no longer a nice to have – it's a legal obligation. In this webinar, in partnership with comforte AG, we explore how agile environments can help developers and other DevOps professionals think about security and risk as they are focusing on the user experience and consumer benefit
Making detection-and-response a business priority (and how to explain the value to the board)Data Breach
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
How to overcome compliance roadblocks to digital innovationData Security
Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant.
Building security into a cloud-first strategyNetwork Security
In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
How banks and CISOs can achieve cyber resilience in a post-pandemic worldBanking & Finance Cyber Crime
Join this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.
DevSecOps challenges and how to overcome themInterviews
How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.
In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations.
Optimising defensive readiness through cyber range, blue team and red team exercises
The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too?
What are the security implications of a cloud-first environment?
This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.
Prioritising Network Security Investments During Covid & Beyond
Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next.
Understanding this year's biggest adversaries – and how to combat them
Nation-state activity, versatile, slippery strategies and Big Game Hunting – the threats are real, dangerous and ever-changing. And speed is the defining factor. This is cyber-security in 2019.
How Zero Trust can help protect financial services networks
Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join our webinar to find out
Interview - Email security: How can we protect ourselves by leveraging AI?Artificial Intelligence Cyber Crime Defence Endpoint Security Interviews
Some cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...
Interview - Global threat report 2019: Why it's time to stop treating security as an afterthought
2018 appeared to be a good year for cyber security defenders. There was an absence of high-profile events that were observed in 2017, such as WannaCry and NotPetya. But why? Are the defenders winning the battle in the cyber arms race?
Office 365 Cyber Resilience: Avoiding the Icarus Effect
Automating and orchestrating your threat intelligence programme
Threat intelligence comes from a variety of disparate sources, with organisations need to pull them together to get a unified picture of the threat landscape; increasingly this can be achieved using automation and AI to maximise usage of scarce expert human resources for decision making and response.
Phishing, a phact of life - how to minimise its impactCyber Crime Hacking/Hackers/Penetration testers Vulnerabilities and Flaws
Phishing has been around almost as long as the internet, but its still going strong and getting more sophisticated. Why? Because it works.
Threat Intelligence – What does a lean enterprise need to know around CTI?Insider threats
Every vendor is pushing a threat intelligence feed, program, and/or product. How does a lean organisation separate the hype from the actual value that threat intelligence can bring to a lean security team?
Data security breaches: who are the main culprits?
Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk in terms of data breaches to organisations and their brands?
Threat Intelligence Platforms: Open Source vs. Commercial
As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like MISP or buy a TIP from one of many vendors offering solutions.
GDPR: How Europe’s new privacy law is reshaping data securityPolicies
Organisations around the globe have been quietly preparing to meet the GDPR requirements for the May 25th deadline. Many important changes such as incorporating the concept of “data protection by design” and focusing on accountability and operational controls are happening behind the scenes.
Cyberattacks: how to defend faster and reduce risk more effectivelyCyber Crime
Cyberattacks pose a serious threat for modern businesses. But many companies are learning the hard way: during an incident, how could they have been better prepared to halt the threat or reduce the damage?
GDPR takes a village: Practical advice to help you achieve complianceRegulation, Laws, Guidance
The GDPR compliance deadline signals a big shift for organisations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organisation uses and protects information.
Zero Trust Security: Never trust, always verify!
It's time to get serious about cracking down on data breachesData Breach Defence Endpoint Security
Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.
Is it safe? How to embrace Cloud efficiency without compromising data security
Enabling digital transformation strategies to embrace Cloud efficiency and data security
“Digital transformation” means many things to different industries, and deploying a cloud environment hosting sensitive data can appear a daunting decision to take.
Masterclass: how to apply security best practices to DevOps
Move beyond traditional security measures in DevOps
The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need a new approach to application security
How application security can help you stand out
Rise above your competitors with fast and flexible protections
Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes. How do you ensure that your software is created securely, and how can it be used by the go-to-market teams as a competitive differentiator?
Before you spend another penny on cyber-security – have you got your foundations right?
In order to build a solid and secure business, you need to start with strong foundations
If you don't establish a solid base to build your cyber-security from, your efforts may not yield the positive results you anticipated.
Identifying the unknown
Spotting Malicious Activity When Everything Else Fails
It is no exaggeration that enterprises can run in average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.
We can’t “hold on a sec”
Why we need DevSecOps from day 1
A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1.
Taking charge of the GDPR
It’s not just for lawyers and compliance geeksBusiness/Corporate Government Policies Regulation, Laws, Guidance
The EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again.
2017 state of cybercrime report webcast
Exposing the threats, techniques and markets that fuel the economy of cybercriminalsCyber Crime Data Breach
One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.
Ever changing endpoint security
It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works.
Is your email system offering an easy route into your network for Ransomware?Cyber Crime Vulnerabilities and Flaws
Your email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering via email. How can you close this backdoor to your systems and avoid becoming a victim? Listen to our webinar to identify your weakspots – and discover how to strengthen them.
An error occurred trying to play the stream. Please reload the page and try again.Close
Sign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence