Events
Upcoming Webinars
On Demand Webinars
Securing Data in the Cloud: Advanced Strategies for Cloud Application Security
Discussing the current trends in cloud security, focusing on the challenges of hybrid environments
In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.
How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions
Streamlining the lifecycle of joiners, movers, and leavers using no-code automation
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.
- Understanding the importance of securing the joiners, movers and leavers process
- Exploring successful attacks that occurred due to errors in managing these transitions
- Discover which advanced controls can be utilized
On Demand Webinar: Better Security Via Active Directory Risk Assessments
Join ManageEngine and learn why your enterprise needs identity risk assessments to pinpoint and prioritize security risks. In this on-demand webinar you will learn how to use identity threat detection and response tools to detect and respond to identity-related threats faster.
SC Annual Digital Congress
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
SC Bytesize
For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.
Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.
SC Unlocks: Financial Cybersecurity Risk
SC Unlocks: Financial Cybersecurity Risk, will bring together senior stakeholders from across the industry to discuss how the mounting pressure on financial institutions, along with the need to adapt to the new and growing requirements of the market, has resulted in the evolution of ever more complex threats.
SC Unlocks: Insurance & Assurance
SC Unlocks: Insurance & Assurance aims to provide delegates with practical and business critical tools on how cybersecurity within the Insurance space works. The briefing will explore the unique challenges of the insurance sector, including how cybersecurity insurance (aka cyber liability insurance) can help reduce liability, strategies for risk management/ transfer, regulatory oversight and cyber asset valuations.
SC Unlocks: Zero Trust
SC Unlocks: Zero Trust will bring cybersecurity professionals together to learn more around how to implement a zero trust model, and its benefits. The conference will show how a Zero Trust approach puts security at the heart of everything, and look to both ask/answer whether this the way forward for all businesses and can we ever eliminate risk.
SC Unlocks: Ransomware
SC Unlocks: Ransomware will be a platform for cybersecurity professionals to learn more about the magnitude and depth of recent attacks and how to deal with them as and when they happen to you. The conference will cover how malicious software continues to extort money from businesses and their staff, and we will discuss when/if ever it is appropriate to pay the ransom.
SC Annual Digital Congress
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
SC WOMEN IN CYBERSECURITY
Women in Cybersecurity is an opportunity to recognise leading women in cybersecurity, learn from their stories and host discussions that look to inspire better gender diversity in the cybersecurity sector.
This event will help you discover the true value of gender diversity within cybersecurity.
SC Unlocks: Healthcare Cybersecurity Risk
Healthcare cybersecurity threats continue to cast a dark shadow on our already overburdened healthcare system. Phishing, ransomware, third-party risks, and medical device security attacks were just some of the rising threats affecting the sector in 2021, and they will likely continue to rise in 2022.
SC Unlocks: Healthcare Cybersecurity Risk, will give you the industry leading insights you need to combat these persistent attacks, and mitigate risk to protect your business in the future.
Securing source code:
How to get dev ops on side (without them even noticing)
How retailer Clarks launched a detection-and-response journey
One of the UK’s leading high-street names has undergone a new D&R journey. This is their story.
Making detection-and-response a business priority (and how to explain the value to the board)
Data BreachAs part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
How to overcome compliance roadblocks to digital innovation
Data SecurityMost organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant.
Building security into a cloud-first strategy
Network SecurityIn this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
How banks and CISOs can achieve cyber resilience in a post-pandemic world
Banking & FinanceCyber CrimeJoin this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.
DevSecOps challenges and how to overcome them
InterviewsHow does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.
In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations.
Incident response best practices
Business/CorporateCyber CrimeNetwork SecurityIn this webinar, in partnership with Sophos, the experts' choice for cyber security, we look at common mistakes and how to build an effective incident response plan
Optimising defensive readiness through cyber range, blue team and red team exercises
The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too?
What are the security implications of a cloud-first environment?
This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.
Prioritising Network Security Investments During Covid & Beyond
Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next.
How to maintain cyber hygiene while using Microsoft Office 365
In this webinar, brought to you in partnership with Mimecast, we'll be talking about mitigating cyber risks specific to Office 365
How security automation can improve efficiency in your organisation
Learn about security automation best practices in this webinar, produced in collaboration with Swimlane
Decreasing Cyber Risk Through Enterprise Compliance
Regulation, Laws, GuidanceDiscover how to build a sustainable compliance programme for your organisation
Context is king: how better cyber security comes from an in-context approach
Business/CorporateJoin the discussion during this webinar, brought to you in collaboration with Bridewell Consulting
DMARC: Learn how to stop attackers using your email domain and protect your brand
Join this webinar, produced in collaboration with Mimecast, to learn how to effectively implement a DMARC solution that is right for your organisation.
Remote working’s long-term value and the shift to an identity-based, zero-trust model
How to detect and respond to insider threats using SOAR
Insider threatsJoin this SC Media UK webinar, brought to you in partnership with Swimlane, to get up to speed on preventing and handling insider threats to your organisation
What you can learn from three of 2019’s biggest data breaches
Join this webinar, produced in collaboration with OpenText, to learn how you can overcome the barrage of security events and the lack of resources
How to secure open banking APIs
SoftwareJoin this SC Media UK webinar, produced in partnership with F5 and WWT, to learn how you can achieve full API lifecycle management.
Debunking six common PAM myths
Data BreachDefenceJoin this SC Media UK webinar, in partnership with BeyondTrust, to discover that six popular beliefs about Privileged Access Management (PAM) are, in fact, wrong.
Why you should be using Privileged Access Management as a Service
Kill the password and implement zero trust with intelligent MFA & digital identity
Interview - How to succeed at threat hunting & IR: Think differently about data
Take the ACID test: How AI-driven behavioural models are the answer to identity-based attacks
Cyber EspionageData BreachVulnerabilities and FlawsCyber CrimeArtificial IntelligenceWhy organisations fail to fill the threat intelligence gap in their cybersecurity strategy
The changing face of data threats and data security across Europe
Interview - Secure email cloud: how to stay ahead of fast evolving cyber threats
Insider threatsNetwork SecurityVulnerabilities and FlawsInterview - Everyone has an Achilles heel: The new security paradigm
Understanding this year's biggest adversaries – and how to combat them
Nation-state activity, versatile, slippery strategies and Big Game Hunting – the threats are real, dangerous and ever-changing. And speed is the defining factor. This is cyber-security in 2019.
How Zero Trust can help protect financial services networks
Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join our webinar to find out
Interview - Email security: How can we protect ourselves by leveraging AI?
Artificial IntelligenceCyber CrimeDefenceEndpoint SecurityInterviewsSome cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...
Lost in the fog: the threats of multi-environment networks
And how to make your business visible and safe in the cloud
Interview - Global threat report 2019: Why it's time to stop treating security as an afterthought
2018 appeared to be a good year for cyber security defenders. There was an absence of high-profile events that were observed in 2017, such as WannaCry and NotPetya. But why? Are the defenders winning the battle in the cyber arms race?
How to prepare your business for multi-phased attacks
Heading into 2019, the volume—and sophistication—of email threats is growing.
The dummies' guide to cyber awareness in the age of GDPR
A practical risk-based approach to implementing GDPR and building a security-aware culture in your organisation
Automating and orchestrating your threat intelligence programme
Threat intelligence comes from a variety of disparate sources, with organisations need to pull them together to get a unified picture of the threat landscape; increasingly this can be achieved using automation and AI to maximise usage of scarce expert human resources for decision making and response.
Phishing, a phact of life - how to minimise its impact
Cyber CrimeHacking/Hackers/Penetration testersVulnerabilities and FlawsPhishing has been around almost as long as the internet, but its still going strong and getting more sophisticated. Why? Because it works.
Threat Intelligence – What does a lean enterprise need to know around CTI?
Insider threatsEvery vendor is pushing a threat intelligence feed, program, and/or product. How does a lean organisation separate the hype from the actual value that threat intelligence can bring to a lean security team?
Data security breaches: who are the main culprits?
Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk in terms of data breaches to organisations and their brands?
Threat Intelligence Platforms: Open Source vs. Commercial
As a member of a maturing security team evaluating threat intelligence platforms (TIPs), you may be asking yourself whether you should use an open source solution like MISP or buy a TIP from one of many vendors offering solutions.
From stolen identity to full blown data breach: How to reduce risk and respond
80% of breaches involve a compromised credential. As the pace, scope, and cost of cyber-attacks increase, it becomes critical to have an incident response plan in place.
GDPR: How Europe’s new privacy law is reshaping data security
PoliciesOrganisations around the globe have been quietly preparing to meet the GDPR requirements for the May 25th deadline. Many important changes such as incorporating the concept of “data protection by design” and focusing on accountability and operational controls are happening behind the scenes.
Cyberattacks: how to defend faster and reduce risk more effectively
Cyber CrimeCyberattacks pose a serious threat for modern businesses. But many companies are learning the hard way: during an incident, how could they have been better prepared to halt the threat or reduce the damage?
GDPR takes a village: Practical advice to help you achieve compliance
Regulation, Laws, GuidanceThe GDPR compliance deadline signals a big shift for organisations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organisation uses and protects information.
Zero Trust Security: Never trust, always verify!
It's time to get serious about cracking down on data breaches
Data BreachDefenceEndpoint SecurityOrganisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.
Is it safe? How to embrace Cloud efficiency without compromising data security
Enabling digital transformation strategies to embrace Cloud efficiency and data security
“Digital transformation” means many things to different industries, and deploying a cloud environment hosting sensitive data can appear a daunting decision to take.
Masterclass: how to apply security best practices to DevOps
Move beyond traditional security measures in DevOps
The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need a new approach to application security
How application security can help you stand out
Rise above your competitors with fast and flexible protections
Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes. How do you ensure that your software is created securely, and how can it be used by the go-to-market teams as a competitive differentiator?
Before you spend another penny on cyber-security – have you got your foundations right?
In order to build a solid and secure business, you need to start with strong foundations
If you don't establish a solid base to build your cyber-security from, your efforts may not yield the positive results you anticipated.
Identifying the unknown
Spotting Malicious Activity When Everything Else Fails
It is no exaggeration that enterprises can run in average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.
We can’t “hold on a sec”
Why we need DevSecOps from day 1
A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1.
Taking charge of the GDPR
It’s not just for lawyers and compliance geeks
Business/CorporateGovernmentPoliciesRegulation, Laws, GuidanceThe EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again.
2017 state of cybercrime report webcast
Exposing the threats, techniques and markets that fuel the economy of cybercriminals
Cyber CrimeData BreachOne way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.
Simplify PKI certificate management or best practice certificate management
Internet of Things (IOT)Ever changing endpoint security
It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works.
Rethink security to follow identity
Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default or stolen passwords.
Is your email system offering an easy route into your network for Ransomware?
Vulnerabilities and FlawsCyber CrimeYour email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering via email. How can you close this backdoor to your systems and avoid becoming a victim? Listen to our webinar to identify your weakspots – and discover how to strengthen them.
Interview: How to protect your data while meeting compliance obligations
DefenceInterviewsSC Media UK editor Tony Morbin interviews Ezat Dayeh, Systems Engineering Manager UK & Ireland at Cohesity, about how to keep data, in all its forms, secure
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence