Your cyber intelligence source

Webinars

Watch

Thanks to GDPR, getting DevOps teams to care about security is no longer a nice to have – it's a legal obligation. In this webinar, in partnership with comforte AG, we explore how agile environments can help developers and other DevOps professionals think about security and risk as they are focusing on the user experience and consumer benefit

  • image
    Felix Rosbach Product Manager, comforte AG
  • image
    Laurent Bugnion Senior Cloud Developer Advocate, Microsoft
  • image
    Tom Geraghty Transformation Lead, Red Hat Open Innovation Labs
  • image
    Kathryn Cave Associate editor, SC Media (host)
Watch

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant. 

  • image
    Bhavna Sondhi Principal Security Consultant, Coalfire
  • image
    Trevor Morgan Head of Product Marketing, comforte AG
  • image
    Kathryn Cave Associate editor, SC Media (host)
Watch

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.

  • image
    Ashton D'Cruz Director - CAO, CGO & CISO, NatWest Markets (India)
  • image
    Mitesh Chauhan Global Product Director, Cloud & Security Services, Entrust Data Protection Solutions
  • image
    Niamh Vianney Muldoon Global Data Protection Officer , OneLogin
  • image
    Simon Newman Head of Cyber and Business Services, Police Crime Prevention Initiatives
  • image
    Edward Craig Acting Commissioning Editor, SC Media (host)
Watch

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.

In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations. 

  • image
    Meera Rao Senior Director of Product Management, Synopsys
  • image
    Adam Brown Managing Consultant , Synopsys
  • image
    Dan Raywood Information Security journalist, (Host)
Watch

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too? 

  • image
    Ben Langrill Director of Product Integrations, RangeForce
  • image
    William Munroe VP of Marketing, RangeForce
  • image
    Rene Millman Freelance writer (host)
Watch

This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.

  • image
    Max Linscott Senior Product Marketing Manager, Mimecast
  • image
    Tom Reeve Technology editor & writer
Watch

Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next. 

  • image
    Roi Alon Senior Product Manager, Tufin
  • image
    Tom Reeve Technology editor & writer