Join this SC Media UK webinar, in partnership with BeyondTrust, to discover that six popular beliefs about Privileged Access Management (PAM) are, in fact, wrong.
Webinars
Securing Data in the Cloud: Advanced Strategies for Cloud Application Security
Discussing the current trends in cloud security, focusing on the challenges of hybrid environments
In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.
How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions
Streamlining the lifecycle of joiners, movers, and leavers using no-code automation
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.
- Understanding the importance of securing the joiners, movers and leavers process
- Exploring successful attacks that occurred due to errors in managing these transitions
- Discover which advanced controls can be utilized
Beyond Cloud Security Posture Management:
Validating Cloud Effectiveness with Attack Simulation
On Demand Webinar: Better Security Via Active Directory Risk Assessments
Join ManageEngine and learn why your enterprise needs identity risk assessments to pinpoint and prioritize security risks. In this on-demand webinar you will learn how to use identity threat detection and response tools to detect and respond to identity-related threats faster.
SC Annual Digital Congress
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
SC Bytesize
For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.
Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.
SC Unlocks: Financial Cybersecurity Risk
SC Unlocks: Financial Cybersecurity Risk, will bring together senior stakeholders from across the industry to discuss how the mounting pressure on financial institutions, along with the need to adapt to the new and growing requirements of the market, has resulted in the evolution of ever more complex threats.
SC Unlocks: Insurance & Assurance
SC Unlocks: Insurance & Assurance aims to provide delegates with practical and business critical tools on how cybersecurity within the Insurance space works. The briefing will explore the unique challenges of the insurance sector, including how cybersecurity insurance (aka cyber liability insurance) can help reduce liability, strategies for risk management/ transfer, regulatory oversight and cyber asset valuations.
SC Unlocks: Zero Trust
SC Unlocks: Zero Trust will bring cybersecurity professionals together to learn more around how to implement a zero trust model, and its benefits. The conference will show how a Zero Trust approach puts security at the heart of everything, and look to both ask/answer whether this the way forward for all businesses and can we ever eliminate risk.
SC Unlocks: Ransomware
SC Unlocks: Ransomware will be a platform for cybersecurity professionals to learn more about the magnitude and depth of recent attacks and how to deal with them as and when they happen to you. The conference will cover how malicious software continues to extort money from businesses and their staff, and we will discuss when/if ever it is appropriate to pay the ransom.
SC Annual Digital Congress
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
SC WOMEN IN CYBERSECURITY
Women in Cybersecurity is an opportunity to recognise leading women in cybersecurity, learn from their stories and host discussions that look to inspire better gender diversity in the cybersecurity sector.
This event will help you discover the true value of gender diversity within cybersecurity.
SC Unlocks: Healthcare Cybersecurity Risk
Healthcare cybersecurity threats continue to cast a dark shadow on our already overburdened healthcare system. Phishing, ransomware, third-party risks, and medical device security attacks were just some of the rising threats affecting the sector in 2021, and they will likely continue to rise in 2022.
SC Unlocks: Healthcare Cybersecurity Risk, will give you the industry leading insights you need to combat these persistent attacks, and mitigate risk to protect your business in the future.
UNLOCKS: FINANCIAL CYBERSECURITY RISK
Nation-state activity, versatile, slippery strategies and Big Game Hunting – the threats are real, dangerous and ever-changing. And speed is the defining factor. This is cyber-security in 2019.
Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join our webinar to find out
Interview - Email security: How can we protect ourselves by leveraging AI?
Some cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...
2018 appeared to be a good year for cyber security defenders. There was an absence of high-profile events that were observed in 2017, such as WannaCry and NotPetya. But why? Are the defenders winning the battle in the cyber arms race?
Heading into 2019, the volume—and sophistication—of email threats is growing.
Threat intelligence comes from a variety of disparate sources, with organisations need to pull them together to get a unified picture of the threat landscape; increasingly this can be achieved using automation and AI to maximise usage of scarce expert human resources for decision making and response.
Phishing, a phact of life - how to minimise its impact
Phishing has been around almost as long as the internet, but its still going strong and getting more sophisticated. Why? Because it works.
Every vendor is pushing a threat intelligence feed, program, and/or product. How does a lean organisation separate the hype from the actual value that threat intelligence can bring to a lean security team?
An error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence