Your cyber intelligence source

Webinars

schedule 60 Mins | 24 October 2024

Securing Data in the Cloud: Advanced Strategies for Cloud Application Security

Discussing the current trends in cloud security, focusing on the challenges of hybrid environments

In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.

image image image
schedule 60 Mins | 8 August 2024

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image
schedule 60 Mins | 11 July 2024

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image
schedule 60 Mins | 22 May 2024

On Demand Webinar: Better Security Via Active Directory Risk Assessments

Join ManageEngine and learn why your enterprise needs identity risk assessments to pinpoint and prioritize security risks. In this on-demand webinar you will learn how to use identity threat detection and response tools to detect and respond to identity-related threats faster.

schedule 28 June 2023

SC Annual Digital Congress

Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.

schedule 14 June 2023

SC Bytesize

For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.

Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.

schedule 7 March 2023

SC Unlocks: Financial Cybersecurity Risk

SC Unlocks: Financial Cybersecurity Risk, will bring together senior stakeholders from across the industry to discuss how the mounting pressure on financial institutions, along with the need to adapt to the new and growing requirements of the market, has resulted in the evolution of ever more complex threats.

schedule 27 January 2023

SC Unlocks: Insurance & Assurance

SC Unlocks: Insurance & Assurance aims to provide delegates with practical and business critical tools on how cybersecurity within the Insurance space works. The briefing will explore the unique challenges of the insurance sector, including how cybersecurity insurance (aka cyber liability insurance) can help reduce liability, strategies for risk management/ transfer, regulatory oversight and cyber asset valuations.

schedule 22 November 2022

SC Unlocks: Zero Trust

SC Unlocks: Zero Trust will bring cybersecurity professionals together to learn more around how to implement a zero trust model, and its benefits. The conference will show how a Zero Trust approach puts security at the heart of everything, and look to both ask/answer whether this the way forward for all businesses and can we ever eliminate risk.

schedule 29 September 2022

SC Unlocks: Ransomware

SC Unlocks: Ransomware will be a platform for cybersecurity professionals to learn more about the magnitude and depth of recent attacks and how to deal with them as and when they happen to you. The conference will cover how malicious software continues to extort money from businesses and their staff, and we will discuss when/if ever it is appropriate to pay the ransom.

schedule 28 June 2022

SC Annual Digital Congress

Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.

schedule 4 May 2022

SC WOMEN IN CYBERSECURITY

Women in Cybersecurity is an opportunity to recognise leading women in cybersecurity, learn from their stories and host discussions that look to inspire better gender diversity in the cybersecurity sector.

This event will help you discover the true value of gender diversity within cybersecurity.

schedule 22 March 2022

SC Unlocks: Healthcare Cybersecurity Risk

Healthcare cybersecurity threats continue to cast a dark shadow on our already overburdened healthcare system. Phishing, ransomware, third-party risks, and medical device security attacks were just some of the rising threats affecting the sector in 2021, and they will likely continue to rise in 2022.

SC Unlocks: Healthcare Cybersecurity Risk, will give you the industry leading insights you need to combat these persistent attacks, and mitigate risk to protect your business in the future.

Watch

Most organisations want to go beyond just modernising their IT infrastructure. Instead, they want their IT investments to underpin true digital innovation, giving them a tangible competitive edge. In this webinar, produced in partnership with comforte AG, we discuss keeping data secure and compliant. 

  • image
    Bhavna Sondhi Principal Security Consultant, Coalfire
  • image
    Trevor Morgan Head of Product Marketing, comforte AG
  • image
    Kathryn Cave Associate editor, SC Media (host)
Watch

In this webinar, we discuss how to embed security successfully into multi-cloud strategies to ensure your cloud and data are secure. The hardware security module (HSM) is a special “trusted” network computer performing a variety of cryptographic operations: key management, key exchange, encryption, etc - and is essential for every organisation.

  • image
    Ashton D'Cruz Director - CAO, CGO & CISO, NatWest Markets (India)
  • image
    Mitesh Chauhan Global Product Director, Cloud & Security Services, Entrust Data Protection Solutions
  • image
    Niamh Vianney Muldoon Global Data Protection Officer , OneLogin
  • image
    Simon Newman Head of Cyber and Business Services, Police Crime Prevention Initiatives
  • image
    Edward Craig Acting Commissioning Editor, SC Media (host)
Watch

How does security fit within DevOps? Most companies are now able to produce their own software, but it is of paramount importance that the software is secure.

In this interview with Meera Rao and Adam Brown from Synopsys, we talk about the strategies for securing the software efficiently and with minimum disruption to the operations. 

  • image
    Meera Rao Senior Director of Product Management, Synopsys
  • image
    Adam Brown Managing Consultant , Synopsys
  • image
    Dan Raywood Information Security journalist, (Host)
Watch

The world may have changed with the vast majority of organisations deploying the work-from-home arrangements as default, but the pressure on cyber security teams to defend the employees from cyber crime is as strong as ever. Has the approach to cyber security training changed to reflect the new way of working too? 

  • image
    Ben Langrill Director of Product Integrations, RangeForce
  • image
    William Munroe VP of Marketing, RangeForce
  • image
    Rene Millman Freelance writer (host)
Watch

This is a question that many security teams are asking, as the shift to remote working has rapidly accelerated the adoption of cloud-based productivity tools. Join this session for practical, applicable advice on steps every organisation should be taking to securely navigate the new security landscape.

  • image
    Max Linscott Senior Product Marketing Manager, Mimecast
  • image
    Tom Reeve Technology editor & writer
Watch

Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organisations from following their standard security processes. Learn how some organisations managed to transform overnight, the implications on their network security risks, the solutions employed, and what’s next. 

  • image
    Roi Alon Senior Product Manager, Tufin
  • image
    Tom Reeve Technology editor & writer