Why organisations need to focus on resilience and recovery, not just cyber defence
Cyber attacks are now inevitable. Cybersecurity leaders and their boards have to prepare for when, not if, a breach happens.
This means shifting from a focus on defence to resilience.
In this webcast, we look at the changing cybersecurity threat, and why CISOs are moving to resilience and recovery; the role of incident response, recovery planning, and testing; and the importance of human factors in cyber resilience.
In this webinar, we will look at the growing threat to Microsoft 365 environments, including from configuration tampering and drift. And we will discuss how organisations can restore both data and tenant configurations after an incident, and apply proper controls and configurations across their Microsoft 365 estates.
What makes an effective attack surface management strategy, and how to monitor every potential entry point and attack vector.
In this webinar, we will look at what makes an effective attack surface management strategy. Which tools and tactics work best, and what you should be doing now to best protect your organisations’ crown jewels.
In this webinar we will explore how SaaS adoption makes it easier for adversaries to exploit vulnerabilities, and steps to strengthen your SaaS security.
Discussing the current trends in cloud security, focusing on the challenges of hybrid environments
In this live webinar, join security specialists from OPSWAT to discuss the current trends in cloud security, focusing on the challenges of hybrid environments, including diminished visibility and weakened threat detection.
Streamlining the lifecycle of joiners, movers, and leavers using no-code automation
The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive. In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.
Key takeaways:
Understanding the importance of securing the joiners, movers and leavers process
Exploring successful attacks that occurred due to errors in managing these transitions
Join ManageEngine and learn why your enterprise needs identity risk assessments to pinpoint and prioritize security risks. In this on-demand webinar you will learn how to use identity threat detection and response tools to detect and respond to identity-related threats faster.
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
For most organisations, Active Directory (AD) is the key to identity and access management, which means it is vital that it stays operational and secure. Unfortunately, AD faces a surplus of risks every single day. Whether from ever-frequent cyber and ransomware attacks or critical misconfigurations, effective AD cybersecurity risk management can be a daunting endeavour.
Join us for this FREE live webinar on 14 June, where we'll discuss the threats and potential risks you face in your AD environment. See for yourself how to measure AD risk using a risk register (5x5) as well as learn ways you can mitigate those risks to ensure true cyber resilience.
SC Unlocks: Financial Cybersecurity Risk, will bring together senior stakeholders from across the industry to discuss how the mounting pressure on financial institutions, along with the need to adapt to the new and growing requirements of the market, has resulted in the evolution of ever more complex threats.
SC Unlocks: Insurance & Assurance aims to provide delegates with practical and business critical tools on how cybersecurity within the Insurance space works. The briefing will explore the unique challenges of the insurance sector, including how cybersecurity insurance (aka cyber liability insurance) can help reduce liability, strategies for risk management/ transfer, regulatory oversight and cyber asset valuations.
SC Unlocks: Zero Trust will bring cybersecurity professionals together to learn more around how to implement a zero trust model, and its benefits. The conference will show how a Zero Trust approach puts security at the heart of everything, and look to both ask/answer whether this the way forward for all businesses and can we ever eliminate risk.
SC Unlocks: Ransomware will be a platform for cybersecurity professionals to learn more about the magnitude and depth of recent attacks and how to deal with them as and when they happen to you. The conference will cover how malicious software continues to extort money from businesses and their staff, and we will discuss when/if ever it is appropriate to pay the ransom.
Across two days, SC Media's Annual Digital Congress will provide a platform for cybersecurity leaders to come together for a mixture of thought leadership and strategy sharing panel discussions, as well as workshop style sessions with actionable takeaways for you and your business.
Women in Cybersecurity is an opportunity to recognise leading women in cybersecurity, learn from their stories and host discussions that look to inspire better gender diversity in the cybersecurity sector.
This event will help you discover the true value of gender diversity within cybersecurity.
Healthcare cybersecurity threats continue to cast a dark shadow on our already overburdened healthcare system. Phishing, ransomware, third-party risks, and medical device security attacks were just some of the rising threats affecting the sector in 2021, and they will likely continue to rise in 2022.
SC Unlocks: Healthcare Cybersecurity Risk, will give you the industry leading insights you need to combat these persistent attacks, and mitigate risk to protect your business in the future.
Join this SC Media UK webinar, in partnership with BeyondTrust, to discover that six popular beliefs about Privileged Access Management (PAM) are, in fact, wrong.
Nation-state activity, versatile, slippery strategies and Big Game Hunting – the threats are real, dangerous and ever-changing. And speed is the defining factor. This is cyber-security in 2019.
Is Zero Trust really achievable given the complexity in financial service organisations, especially considering limited staff, mergers and acquisitions and compliance pressures? Join our webinar to find out
Some cynics in the cyber-security industry will tell you that your staff are your biggest risk factor, but for those same staff, their biggest risk factor is often their in-box - and a security team that expects them to be security experts...
2018 appeared to be a good year for cyber security defenders. There was an absence of high-profile events that were observed in 2017, such as WannaCry and NotPetya. But why? Are the defenders winning the battle in the cyber arms race?
Threat intelligence comes from a variety of disparate sources, with organisations need to pull them together to get a unified picture of the threat landscape; increasingly this can be achieved using automation and AI to maximise usage of scarce expert human resources for decision making and response.
Every vendor is pushing a threat intelligence feed, program, and/or product. How does a lean organisation separate the hype from the actual value that threat intelligence can bring to a lean security team?
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.