Master AI or Fall Behind

Your cyber intelligence source

Events

Upcoming Webinars

No events found.

On Demand Webinars

SC Annual Digital Congress

Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.

SC Bytesize

For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.

Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.

SC Unlocks: Financial Cybersecurity Risk

SC Unlocks: Financial Cybersecurity Risk, will bring together senior stakeholders from across the industry to discuss how the mounting pressure on financial institutions, along with the need to adapt to the new and growing requirements of the market, has resulted in the evolution of ever more complex threats.

SC Unlocks: Insurance & Assurance

SC Unlocks: Insurance & Assurance aims to provide delegates with practical and business critical tools on how cybersecurity within the Insurance space works. The briefing will explore the unique challenges of the insurance sector, including how cybersecurity insurance (aka cyber liability insurance) can help reduce liability, strategies for risk management/ transfer, regulatory oversight and cyber asset valuations.

SC Unlocks: Zero Trust

SC Unlocks: Zero Trust will bring cybersecurity professionals together to learn more around how to implement a zero trust model, and its benefits. The conference will show how a Zero Trust approach puts security at the heart of everything, and look to both ask/answer whether this the way forward for all businesses and can we ever eliminate risk.

SC Unlocks: Ransomware

SC Unlocks: Ransomware will be a platform for cybersecurity professionals to learn more about the magnitude and depth of recent attacks and how to deal with them as and when they happen to you. The conference will cover how malicious software continues to extort money from businesses and their staff, and we will discuss when/if ever it is appropriate to pay the ransom.

SC Annual Digital Congress

Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.

SC WOMEN IN CYBERSECURITY

Women in Cybersecurity is an opportunity to recognise leading women in cybersecurity, learn from their stories and host discussions that look to inspire better gender diversity in the cybersecurity sector.

This event will help you discover the true value of gender diversity within cybersecurity.

SC Unlocks: Healthcare Cybersecurity Risk

Healthcare cybersecurity threats continue to cast a dark shadow on our already overburdened healthcare system. Phishing, ransomware, third-party risks, and medical device security attacks were just some of the rising threats affecting the sector in 2021, and they will likely continue to rise in 2022.

SC Unlocks: Healthcare Cybersecurity Risk, will give you the industry leading insights you need to combat these persistent attacks, and mitigate risk to protect your business in the future.

09 Dec

Securing source code:

How to get dev ops on side (without them even noticing)

image image
Find out more keyboard_arrow_right
15 Jul

How retailer Clarks launched a detection-and-response journey

One of the UK’s leading high-street names has undergone a new D&R journey. This is their story.

image image image
Find out more keyboard_arrow_right
01 Jul

Making detection-and-response a business priority (and how to explain the value to the board)

Data Breach

As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…

image image image image image image
Find out more keyboard_arrow_right
09 Jun

How to overcome compliance roadblocks to digital innovation

Data Security

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant. 

image image image
Find out more keyboard_arrow_right
12 May

Building security into a cloud-first strategy

Network Security

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.

image image image image image
Find out more keyboard_arrow_right
31 Mar

How banks and CISOs can achieve cyber resilience in a post-pandemic world

Banking & FinanceCyber Crime

Join this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.

image image image image
Find out more keyboard_arrow_right
18 Mar

DevSecOps challenges and how to overcome them

Interviews

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.

In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations. 

image image image
Find out more keyboard_arrow_right
17 Dec

Incident response best practices

Business/CorporateCyber CrimeNetwork Security

In this webinar, in partnership with Sophos, the experts' choice for cyber security, we look at common mistakes and how to build an effective incident response plan

image image
Find out more keyboard_arrow_right
24 Nov

Optimising defensive readiness through cyber range, blue team and red team exercises

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too? 

image image image
Find out more keyboard_arrow_right
27 Oct

What are the security implications of a cloud-first environment?

This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.

image image
Find out more keyboard_arrow_right
22 Sep

Prioritising Network Security Investments During Covid & Beyond

Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next. 

image image
Find out more keyboard_arrow_right
18 Aug

How to maintain cyber hygiene while using Microsoft Office 365

In this webinar, brought to you in partnership with Mimecast, we'll be talking about mitigating cyber risks specific to Office 365

image image
Find out more keyboard_arrow_right
30 Jun

How security automation can improve efficiency in your organisation

Learn about security automation best practices in this webinar, produced in collaboration with Swimlane

image image image
Find out more keyboard_arrow_right
17 Jun

Decreasing Cyber Risk Through Enterprise Compliance

Regulation, Laws, Guidance

Discover how to build a sustainable compliance programme for your organisation

image image
Find out more keyboard_arrow_right
11 Jun

Context is king: how better cyber security comes from an in-context approach

Business/Corporate

Join the discussion during this webinar, brought to you in collaboration with Bridewell Consulting

image
JP
image
Find out more keyboard_arrow_right
09 Jun

DMARC: Learn how to stop attackers using your email domain and protect your brand

Join this webinar, produced in collaboration with Mimecast, to learn how to effectively implement a DMARC solution that is right for your organisation. 

image image image image
Find out more keyboard_arrow_right
27 May

Remote working’s long-term value and the shift to an identity-based, zero-trust model

image image
Find out more keyboard_arrow_right
25 Mar

How to detect and respond to insider threats using SOAR

Insider threats

Join this SC Media UK webinar, brought to you in partnership with Swimlane, to get up to speed on preventing and handling insider threats to your organisation 

image image image
Find out more keyboard_arrow_right
19 Mar

What you can learn from three of 2019’s biggest data breaches

Join this webinar, produced in collaboration with OpenText, to learn how you can overcome the barrage of security events and the lack of resources

image image image
Find out more keyboard_arrow_right
04 Dec

How to secure open banking APIs

Software

Join this SC Media UK webinar, produced in partnership with F5 and WWT, to learn how you can achieve full API lifecycle management.

image image image
Find out more keyboard_arrow_right
18 Nov

Debunking six common PAM myths

Data BreachDefence

Join this SC Media UK webinar, in partnership with BeyondTrust, to discover that six popular beliefs about Privileged Access Management (PAM) are, in fact, wrong. 

image image
Find out more keyboard_arrow_right
05 Nov

Why you should be using Privileged Access Management as a Service

image image image
Find out more keyboard_arrow_right
13 Aug

Kill the password and implement zero trust with intelligent MFA & digital identity

image image image
Find out more keyboard_arrow_right
01 Jul

Interview - How to succeed at threat hunting & IR: Think differently about data

image image
Find out more keyboard_arrow_right
28 Jun

Take the ACID test: How AI-driven behavioural models are the answer to identity-based attacks

Cyber EspionageData BreachVulnerabilities and FlawsCyber CrimeArtificial Intelligence
image image
Find out more keyboard_arrow_right
27 Jun

Why organisations fail to fill the threat intelligence gap in their cybersecurity strategy

image image
Find out more keyboard_arrow_right
25 Jun

The changing face of data threats and data security across Europe

image image image
Find out more keyboard_arrow_right
20 Jun

Interview - Secure email cloud: how to stay ahead of fast evolving cyber threats

Insider threatsNetwork SecurityVulnerabilities and Flaws
image image
Find out more keyboard_arrow_right
29 May

Interview - Everyone has an Achilles heel: The new security paradigm

image image
Find out more keyboard_arrow_right
08 May

Understanding this year's biggest adversaries – and how to combat them

Nation-state activity, versatile, slippery strategies and Big Game Hunting – the threats are real, dangerous and ever-changing. And speed is the defining factor. This is cyber-security in 2019.

image image
Find out more keyboard_arrow_right
11 Apr

How Zero Trust can help protect financial services networks

Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join our webinar to find out

image image image image
Find out more keyboard_arrow_right
10 Apr

Interview - Email security: How can we protect ourselves by leveraging AI?

Artificial IntelligenceCyber CrimeDefenceEndpoint SecurityInterviews

Some cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...

Find out more keyboard_arrow_right
27 Mar

Lost in the fog: the threats of multi-environment networks

And how to make your business visible and safe in the cloud

image image image
Find out more keyboard_arrow_right
01 Mar

Interview - Global threat report 2019: Why it's time to stop treating security as an afterthought

2018 appeared to be a good year for cyber security defenders. There was an absence of high-profile events that were observed in 2017, such as WannaCry and NotPetya. But why? Are the defenders winning the battle in the cyber arms race?

image
Find out more keyboard_arrow_right
31 Jan

How to prepare your business for multi-phased attacks

Heading into 2019, the volume—and sophistication—of email threats is growing.

image
Find out more keyboard_arrow_right
21 Nov

The dummies' guide to cyber awareness in the age of GDPR

A practical risk-based approach to implementing GDPR and building a security-aware culture in your organisation

image image
Find out more keyboard_arrow_right
19 Nov

Office 365 Cyber Resilience: Avoiding the Icarus Effect

image image
Find out more keyboard_arrow_right
26 Sep

Automating and orchestrating your threat intelligence programme

Threat intelligence comes from a variety of disparate sources, with organisations need to pull them together to get a unified picture of the threat landscape; increasingly this can be achieved using automation and AI to maximise usage of scarce expert human resources for decision making and response.

image image image
Find out more keyboard_arrow_right
18 Jul

Phishing, a phact of life - how to minimise its impact

Cyber CrimeHacking/Hackers/Penetration testersVulnerabilities and Flaws

Phishing has been around almost as long as the internet, but its still going strong and getting more sophisticated.  Why? Because it works.

image image
Find out more keyboard_arrow_right
05 Jul

Threat Intelligence – What does a lean enterprise need to know around CTI?

Insider threats

Every vendor is pushing a threat intelligence feed, program, and/or product. How does a lean organisation separate the hype from the actual value that threat intelligence can bring to a lean security team?

image image
Find out more keyboard_arrow_right
27 Jun

Data security breaches: who are the main culprits?

Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk in terms of data breaches to organisations and their brands? 

image image
Find out more keyboard_arrow_right
21 Jun

Threat Intelligence Platforms: Open Source vs. Commercial

As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like MISP or buy a TIP from one of many vendors offering solutions.

image image
Find out more keyboard_arrow_right
23 May

From stolen identity to full blown data breach: How to reduce risk and respond

80% of breaches involve a compromised credential. As the pace, scope, and cost of cyber-attacks increase, it becomes critical to have an incident response plan in place.

image image
Find out more keyboard_arrow_right
03 May

GDPR: How Europe’s new privacy law is reshaping data security

Policies

Organisations around the globe have been quietly preparing to meet the GDPR requirements for the May 25th deadline. Many important changes such as incorporating the concept of “data protection by design” and focusing on accountability and operational controls are happening behind the scenes.

image image image
Find out more keyboard_arrow_right
30 Apr

Cyberattacks: how to defend faster and reduce risk more effectively

Cyber Crime

Cyberattacks pose a serious threat for modern businesses. But many companies are learning the hard way: during an incident, how could they have been better prepared to halt the threat or reduce the damage?

image
MW
Find out more keyboard_arrow_right
10 Apr

GDPR takes a village: Practical advice to help you achieve compliance

Regulation, Laws, Guidance

The GDPR compliance deadline signals a big shift for organisations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organisation uses and protects information.

image image
Find out more keyboard_arrow_right
29 Mar

Zero Trust Security: Never trust, always verify!

It's time to get serious about cracking down on data breaches

Data BreachDefenceEndpoint Security

Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.

image
Find out more keyboard_arrow_right
22 Mar

Is it safe? How to embrace Cloud efficiency without compromising data security

Enabling digital transformation strategies to embrace Cloud efficiency and data security

“Digital transformation” means many things to different industries, and deploying a cloud environment hosting sensitive data can appear a daunting decision to take.

image image
Find out more keyboard_arrow_right
15 Mar

Masterclass: how to apply security best practices to DevOps

Move beyond traditional security measures in DevOps

The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need a new approach to application security

image
Find out more keyboard_arrow_right
07 Mar

How application security can help you stand out

Rise above your competitors with fast and flexible protections

Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes. How do you ensure that your software is created securely, and how can it be used by the go-to-market teams as a competitive differentiator?

image
Find out more keyboard_arrow_right
07 Dec

Before you spend another penny on cyber-security – have you got your foundations right?

In order to build a solid and secure business, you need to start with strong foundations

If you don't establish a solid base to build your cyber-security from, your efforts may not yield the positive results you anticipated.

image image
Find out more keyboard_arrow_right
29 Nov

Identifying the unknown

Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run in average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.

image image
Find out more keyboard_arrow_right
23 Nov

We can’t “hold on a sec”

Why we need DevSecOps from day 1

A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1.

image
Find out more keyboard_arrow_right
16 Nov

Taking charge of the GDPR

It’s not just for lawyers and compliance geeks

Business/CorporateGovernmentPoliciesRegulation, Laws, Guidance

The EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again.

image image
Find out more keyboard_arrow_right
02 Nov

2017 state of cybercrime report webcast

Exposing the threats, techniques and markets that fuel the economy of cybercriminals

Cyber CrimeData Breach

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

MM
Find out more keyboard_arrow_right
11 Oct

Simplify PKI certificate management or best practice certificate management

Internet of Things (IOT)
image
Find out more keyboard_arrow_right
26 Sep

Ever changing endpoint security

It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works. 

image
Find out more keyboard_arrow_right
21 Sep

Rethink security to follow identity

Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default or stolen passwords.

image image
Find out more keyboard_arrow_right
07 Sep

Is your email system offering an easy route into your network for Ransomware?

Vulnerabilities and FlawsCyber Crime

Your email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering  via email.  How can you close this backdoor to your systems and avoid becoming a victim? Listen to our webinar to identify your weakspots – and discover how to strengthen them.

image
Find out more keyboard_arrow_right

Interview: How to protect your data while meeting compliance obligations

DefenceInterviews

SC Media UK editor Tony Morbin interviews Ezat Dayeh, Systems Engineering Manager UK & Ireland at Cohesity, about how to keep data, in all its forms, secure

image image
Find out more keyboard_arrow_right
Master AI or Fall Behind