Webinars
From cyber risk to cyber resilience: cutting the business risks of cyber attacks
Why organisations need to focus on resilience and recovery, not just cyber defence
Cyber attacks are now inevitable. Cybersecurity leaders and their boards have to prepare for when, not if, a breach happens.
This means shifting from a focus on defence to resilience.
In this webcast, we look at the changing cybersecurity threat, and why CISOs are moving to resilience and recovery; the role of incident response, recovery planning, and testing; and the importance of human factors in cyber resilience.
Securing Microsoft 365: it’s more than your data at risk
In this webinar, we will look at the growing threat to Microsoft 365 environments, including from configuration tampering and drift. And we will discuss how organisations can restore both data and tenant configurations after an incident, and apply proper controls and configurations across their Microsoft 365 estates.
Managing Cyber Risks Within a Modern Attack Surface
What makes an effective attack surface management strategy, and how to monitor every potential entry point and attack vector.
In this webinar, we will look at what makes an effective attack surface management strategy. Which tools and tactics work best, and what you should be doing now to best protect your organisations’ crown jewels.
Is SaaS Expanding Your Attack Surface?
In this webinar we will explore how SaaS adoption makes it easier for adversaries to exploit vulnerabilities, and steps to strengthen your SaaS security.
Benchmarking Security Skills and How to Ensure Secure-by-Design in the Enterprise
Consider how to prove the return on investment when implementing a secure-by-design initiative
Securing Data in the Cloud: Advanced Strategies for Cloud Application Security
Discussing the current trends in cloud security, focusing on the challenges of hybrid environments
In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.
How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions
Streamlining the lifecycle of joiners, movers, and leavers using no-code automation
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.
- Understanding the importance of securing the joiners, movers and leavers process
- Exploring successful attacks that occurred due to errors in managing these transitions
- Discover which advanced controls can be utilized
Beyond Cloud Security Posture Management:
Validating Cloud Effectiveness with Attack Simulation
On Demand Webinar: Better Security Via Active Directory Risk Assessments
Join ManageEngine and learn why your enterprise needs identity risk assessments to pinpoint and prioritize security risks. In this on-demand webinar you will learn how to use identity threat detection and response tools to detect and respond to identity-related threats faster.
SC Annual Digital Congress
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
SC Bytesize
For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.
Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.
SC Unlocks: Financial Cybersecurity Risk
SC Unlocks: Financial Cybersecurity Risk, will bring together senior stakeholders from across the industry to discuss how the mounting pressure on financial institutions, along with the need to adapt to the new and growing requirements of the market, has resulted in the evolution of ever more complex threats.
SC Unlocks: Insurance & Assurance
SC Unlocks: Insurance & Assurance aims to provide delegates with practical and business critical tools on how cybersecurity within the Insurance space works. The briefing will explore the unique challenges of the insurance sector, including how cybersecurity insurance (aka cyber liability insurance) can help reduce liability, strategies for risk management/ transfer, regulatory oversight and cyber asset valuations.
SC Unlocks: Zero Trust
SC Unlocks: Zero Trust will bring cybersecurity professionals together to learn more around how to implement a zero trust model, and its benefits. The conference will show how a Zero Trust approach puts security at the heart of everything, and look to both ask/answer whether this the way forward for all businesses and can we ever eliminate risk.
SC Unlocks: Ransomware
SC Unlocks: Ransomware will be a platform for cybersecurity professionals to learn more about the magnitude and depth of recent attacks and how to deal with them as and when they happen to you. The conference will cover how malicious software continues to extort money from businesses and their staff, and we will discuss when/if ever it is appropriate to pay the ransom.
SC Annual Digital Congress
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
SC WOMEN IN CYBERSECURITY
Women in Cybersecurity is an opportunity to recognise leading women in cybersecurity, learn from their stories and host discussions that look to inspire better gender diversity in the cybersecurity sector.
This event will help you discover the true value of gender diversity within cybersecurity.
SC Unlocks: Healthcare Cybersecurity Risk
Healthcare cybersecurity threats continue to cast a dark shadow on our already overburdened healthcare system. Phishing, ransomware, third-party risks, and medical device security attacks were just some of the rising threats affecting the sector in 2021, and they will likely continue to rise in 2022.
SC Unlocks: Healthcare Cybersecurity Risk, will give you the industry leading insights you need to combat these persistent attacks, and mitigate risk to protect your business in the future.
UNLOCKS: FINANCIAL CYBERSECURITY RISK
Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
-
Cheryl Martin Head of Security Consulting, Adarma
-
Joel Barnes Senior Director - EMEA SEs , Tenable
-
Hala ElGhawi Regional Business Information Security Risk Manager, International Banking
-
Johan Bjerke Principal Security Strategist, Splunk
-
Zeki Turedi CTO EMEA, CrowdStrike
-
Kathryn Cave Associate editor, SC Media (host)
Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant.
-
Bhavna Sondhi Principal Security Consultant, Coalfire
-
Trevor Morgan Head of Product Marketing, comforte AG
-
Kathryn Cave Associate editor, SC Media (host)
In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
-
Ashton D'Cruz Director - CAO, CGO & CISO, NatWest Markets (India)
-
Mitesh Chauhan Global Product Director, Cloud & Security Services, Entrust Data Protection Solutions
-
Niamh Vianney Muldoon Global Data Protection Officer , OneLogin
-
Simon Newman Head of Cyber and Business Services, Police Crime Prevention Initiatives
-
Edward Craig Acting Commissioning Editor, SC Media (host)
How banks and CISOs can achieve cyber resilience in a post-pandemic world
Join this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.
-
Ashton D'Cruz Director - CAO, CGO & CISO, NatWest Markets (India)
-
Neil Sinclair National Cyber Lead, Police Digital Security Centre
-
Mark Bloemsma Consulting System Engineer, Forcepoint
-
Kathryn Cave Associate editor, SC Media (host)
How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.
In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations.
-
Meera Rao Senior Director of Product Management, Synopsys
-
Adam Brown Managing Consultant , Synopsys
In this webinar, in partnership with Sophos, the experts' choice for cyber security, we look at common mistakes and how to build an effective incident response plan
-
Greg Iddon Strategist/Manager , Sophos
-
Edward Craig Acting Commissioning Editor, SC Media (host)
The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too?
-
Ben Langrill Director of Product Integrations, RangeForce
-
William Munroe VP of Marketing, RangeForce
-
Rene Millman Freelance writer (host)
This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.
-
Max Linscott Senior Product Marketing Manager, Mimecast
-
Tom Reeve Technology editor & writer
Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next.
-
Roi Alon Senior Product Manager, Tufin
-
Tom Reeve Technology editor & writer
In this webinar, brought to you in partnership with Mimecast, we'll be talking about mitigating cyber risks specific to Office 365
-
J. Peter Bruzzese Strategic Technical Consultant, Mimecast
-
Tom Reeve Technology editor & writer
Learn about security automation best practices in this webinar, produced in collaboration with Swimlane
-
Jay Spann SOAR Evangelist and Technical Product Marketing Manager, Swimlane
-
Lee Rothman VP of Global Sales Engineering, Swimlane
-
Tony Morbin Editor-in-Chief, SC Media UK
Discover how to build a sustainable compliance programme for your organisation
-
Scott Bridgen GRC Consulting Director, OneTrust
-
Tony Morbin Editor-in-Chief, SC Media UK
Join the discussion during this webinar, brought to you in collaboration with Bridewell Consulting
-
Scott Nicholson Delivery Director, Bridewell Consulting
-
Jon Pocock Head of Information Security & Data Protection Officer, AlfaSystemsJP
-
Tony Morbin Editor-in-Chief, SC Media UK
Join this webinar, produced in collaboration with Mimecast, to learn how to effectively implement a DMARC solution that is right for your organisation.
-
Dirk Jan Koekkoek Vice President , Mimecast DMARC
-
Simon King Cyber Security Manager, Electrocomponents Plc.
-
Rick Velthuijsen DMARC Deployment Specialist, Mimecast
-
Tony Morbin Editor-in-Chief, SC Media UK
Join this SC Media UK webinar, brought to you in partnership with Swimlane, to get up to speed on preventing and handling insider threats to your organisation
-
Josh Rickard Security Research Engineer, Swimlane
-
Sarb Sembhi CTO & CISO, Virtually Informed
-
Tony Morbin Editor-in-Chief, SC Media UK
Join this webinar, produced in collaboration with OpenText, to learn how you can overcome the barrage of security events and the lack of resources
-
JJ Cranford Senior Product Marketing Manager, OpenText
-
Francesco Cipollone Head of Application Security, HSBC
-
Edward Craig Head of Content Labs, People Management (Host)
Join this SC Media UK webinar, produced in partnership with F5 and WWT, to learn how you can achieve full API lifecycle management.
-
Vinnit Patel EMEA Cyber-security Lead, WWT
-
Paul Dignan Systems Engineering Manager, F5
-
Tony Morbin Editor-in-Chief, SC Media UK
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence