Webinars

Making detection-and-response a business priority (and how to explain the value to the board)
As part of our Minimising the impact of a breach series with Adarma (see the podcasts here), this session looks at key decisions needed when dealing with a breach and how to limit the consequences of future ones…

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant.

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.

How banks and CISOs can achieve cyber resilience in a post-pandemic world
Join this webinar, produced in partnership with Forcepoint, as a panel of experts discuss how the future will see an increased role for cloud services and what this means for the next generation of CISOs.

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.
In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations.

In this webinar, in partnership with Sophos, the experts' choice for cyber security, we look at common mistakes and how to build an effective incident response plan

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too?

This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.

Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next.

In this webinar, brought to you in partnership with Mimecast, we'll be talking about mitigating cyber risks specific to Office 365

Learn about security automation best practices in this webinar, produced in collaboration with Swimlane

Discover how to build a sustainable compliance programme for your organisation
Join the discussion during this webinar, brought to you in collaboration with Bridewell Consulting
-
-
JP
-

Join this webinar, produced in collaboration with Mimecast, to learn how to effectively implement a DMARC solution that is right for your organisation.

Join this SC Media UK webinar, brought to you in partnership with Swimlane, to get up to speed on preventing and handling insider threats to your organisation

Join this webinar, produced in collaboration with OpenText, to learn how you can overcome the barrage of security events and the lack of resources

Join this SC Media UK webinar, produced in partnership with F5 and WWT, to learn how you can achieve full API lifecycle management.
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence