Webinars

Watch

Threat intelligence comes from a variety of disparate sources, with organisations need to pull them together to get a unified picture of the threat landscape; increasingly this can be achieved using automation and AI to maximise usage of scarce expert human resources for decision making and response.

  • image
    John Hurd Senior Threat Intelligence Research Engineer, ThreatConnect
  • image
    Tony Morbin Editor-in-Chief, SC Media UK
  • image
    Mike Loginov Interim Group Chief Information Security Officer
Watch

Organisations around the globe have been quietly preparing to meet the GDPR requirements for the May 25th deadline. Many important changes such as incorporating the concept of “data protection by design” and focusing on accountability and operational controls are happening behind the scenes.

  • image
    Stephen Twynam Senior Sales Engineer, Citrix
  • image
    Florin Lazurca Senior technical marketing manager, security, Citrix
  • image
    Tony Morbin Editor-in-Chief, SC Media UK
Watch

Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.

  • image
    Barry Scott CTO – EMEA, Centrify
Watch

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

  • image
    Mike McLellan Senior Security Researcher, Secureworks Counter Threat Unit™ (CTU)

ARCHIVE WEBCASTS