Thanks to GDPR, getting DevOps teams to care about security is no longer a nice to have – it's a legal obligation. In this webinar, in partnership with comforte AG, we explore how agile environments can help developers and other DevOps professionals think about security and risk as they are focusing on the user experience and consumer benefit
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…
Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge.In this webinar, producedin partnership with comforte AG, we discuss keeping data secure and compliant.
In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.
Join this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.
The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too?
This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.
Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next.